Physical-layer integrity for wireless messages

نویسندگان

  • Nils Ole Tippenhauer
  • Kasper Bonne Rasmussen
  • Srdjan Capkun
چکیده

In this work, we discuss physical layer message manipulation attacks, in which an attacker changes physical-layer properties of an original wireless message. Instead of targeting the data content of the message, those attacks target message properties such as time-of-arrival, signal strength, angle-of-arrival, and others. As such attacks do not change the data content, they do not violate the message’s data integrity. Instead, we introduce the notion of physicallayer message integrity (PMI), that describes the absence of manipulations for physical-layer message characteristics. Among the different physical-layer characteristics, we focus on delay attacks in which an attacker delays a message sent from victim A to a nearby victim B. Such attacks can be used on time-synchronization, distance measurement, and other time-sensitive measurements such as phasor measurements in power grids. In that context, we speak of message temporal integrity (MTI) as characteristic targeted by the attack. Informally, MTI is preserved if the message is neither advanced nor delayed in transmission. We discuss how to detect attacks on MTI, and propose a message temporal integrity protocol based on special message encoding, modulation, and detection.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The crypto-aided physical layer integrity check in cooperative relaying communication

In the cooperative relaying communication, the system has to defend itself against the eavesdropper which may undermines the message integrity by sending the modified messages. We propose a physical layer integrity check scheme for cooperative relaying communication, where a source broadcast the signals to both destination target and an untrustworthy relay node. The approach exploits physical l...

متن کامل

Securing Layer-2 Path Selection in Wireless Mesh Networks

The current draft standard of 802.11s has defined routing for Wireless Mesh Networks (WMNs) in layer-2 and to differentiate from layer-3 routing, it termed layer-2 routing as path selection. The layer-2 path selection (LPS) mechanism is fully specified in the draft of IEEE 802.11s for WMNs. However, routing with security provision is not specified in the standard. Our study identifies that the ...

متن کامل

MLCA: A Multi-Level Clustering Algorithm for Routing in Wireless Sensor Networks

Energy constraint is the biggest challenge in wireless sensor networks because the power supply of each sensor node is a battery that is not rechargeable or replaceable due to the applications of these networks. One of the successful methods for saving energy in these networks is clustering. It has caused that cluster-based routing algorithms are successful routing algorithm for these networks....

متن کامل

A Comparison between Different Meta-Heuristic Techniques in Power Allocation for Physical Layer Security

Node cooperation can protect wireless networks from eavesdropping by using the physical characteristics of wireless channels rather than cryptographic methods. Allocating the proper amount of power to cooperative nodes is a challenging task. In this paper, we use three cooperative nodes, one as relay to increase throughput at the destination and two friendly jammers to degrade eavesdropper&rsqu...

متن کامل

Applications of Game Theory for Physical Layer Security

This chapter provides a comprehensive review of the domain of game theory based physical layer security in wireless communications. By exploiting the wireless channel characteristic and secure cooperation of nodes, physical layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers, without relying on higher-layer encry...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computer Networks

دوره 109  شماره 

صفحات  -

تاریخ انتشار 2016