Investigation of signal and message manipulations on the wireless channel

Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We explore the suitability of Dolev-Yao-based attacker models for the security analysis of wireless communication. The Dolev-Yao model is commonly used for wireline and wireless networks. It is defined on abstract messages exchanged between entities and includes arbitrary, real-time modification of messages by the attacker. In this work, we aim at understanding and evaluating the conditions under which these real-time, covert low-energy signal modifications can be successful. In particular, we focus on the following signal and message manipulation techniques: symbol flipping and signal annihilation. We analyze these techniques theoretically, by simulations, and experiments and show their feasibility for particular wireless channels and scenarios.

Original languageEnglish (US)
Title of host publicationComputer Security, ESORICS 2011 - 16th European Symposium on Research in Computer Security, Proceedings
PublisherSpringer Verlag
Pages40-59
Number of pages20
ISBN (Print)9783642238215
DOIs
StatePublished - 2011
Event16th European Symposium on Research in Computer Security, ESORICS 2011 - Leuven, Belgium
Duration: Sep 12 2011Sep 14 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6879 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other16th European Symposium on Research in Computer Security, ESORICS 2011
Country/TerritoryBelgium
CityLeuven
Period9/12/119/14/11

Keywords

  • Adversarial Interference
  • Signal Manipulation
  • Wireless Security

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Investigation of signal and message manipulations on the wireless channel'. Together they form a unique fingerprint.

Cite this