Investigation of signal and message manipulations on the wireless channel

Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We explore the suitability of Dolev-Yao-based attacker models for the security analysis of wireless communication. The Dolev-Yao model is commonly used for wireline and wireless networks. It is defined on abstract messages exchanged between entities and includes arbitrary, real-time modification of messages by the attacker. In this work, we aim at understanding and evaluating the conditions under which these real-time, covert low-energy signal modifications can be successful. In particular, we focus on the following signal and message manipulation techniques: symbol flipping and signal annihilation. We analyze these techniques theoretically, by simulations, and experiments and show their feasibility for particular wireless channels and scenarios.

Original languageEnglish (US)
Title of host publicationComputer Security, ESORICS 2011 - 16th European Symposium on Research in Computer Security, Proceedings
Pages40-59
Number of pages20
DOIs
StatePublished - 2011
Event16th European Symposium on Research in Computer Security, ESORICS 2011 - Leuven, Belgium
Duration: Sep 12 2011Sep 14 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6879 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other16th European Symposium on Research in Computer Security, ESORICS 2011
CountryBelgium
CityLeuven
Period9/12/119/14/11

Keywords

  • Adversarial Interference
  • Signal Manipulation
  • Wireless Security

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Investigation of signal and message manipulations on the wireless channel'. Together they form a unique fingerprint.

  • Cite this

    Pöpper, C., Tippenhauer, N. O., Danev, B., & Capkun, S. (2011). Investigation of signal and message manipulations on the wireless channel. In Computer Security, ESORICS 2011 - 16th European Symposium on Research in Computer Security, Proceedings (pp. 40-59). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6879 LNCS). https://doi.org/10.1007/978-3-642-23822-2_3