TY - GEN
T1 - Investigation of signal and message manipulations on the wireless channel
AU - Pöpper, Christina
AU - Tippenhauer, Nils Ole
AU - Danev, Boris
AU - Capkun, Srdjan
PY - 2011
Y1 - 2011
N2 - We explore the suitability of Dolev-Yao-based attacker models for the security analysis of wireless communication. The Dolev-Yao model is commonly used for wireline and wireless networks. It is defined on abstract messages exchanged between entities and includes arbitrary, real-time modification of messages by the attacker. In this work, we aim at understanding and evaluating the conditions under which these real-time, covert low-energy signal modifications can be successful. In particular, we focus on the following signal and message manipulation techniques: symbol flipping and signal annihilation. We analyze these techniques theoretically, by simulations, and experiments and show their feasibility for particular wireless channels and scenarios.
AB - We explore the suitability of Dolev-Yao-based attacker models for the security analysis of wireless communication. The Dolev-Yao model is commonly used for wireline and wireless networks. It is defined on abstract messages exchanged between entities and includes arbitrary, real-time modification of messages by the attacker. In this work, we aim at understanding and evaluating the conditions under which these real-time, covert low-energy signal modifications can be successful. In particular, we focus on the following signal and message manipulation techniques: symbol flipping and signal annihilation. We analyze these techniques theoretically, by simulations, and experiments and show their feasibility for particular wireless channels and scenarios.
KW - Adversarial Interference
KW - Signal Manipulation
KW - Wireless Security
UR - http://www.scopus.com/inward/record.url?scp=80053005536&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=80053005536&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-23822-2_3
DO - 10.1007/978-3-642-23822-2_3
M3 - Conference contribution
AN - SCOPUS:80053005536
SN - 9783642238215
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 40
EP - 59
BT - Computer Security, ESORICS 2011 - 16th European Symposium on Research in Computer Security, Proceedings
PB - Springer Verlag
T2 - 16th European Symposium on Research in Computer Security, ESORICS 2011
Y2 - 12 September 2011 through 14 September 2011
ER -