Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Securing wireless systems via lower layer enforcements
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Detecting identity-based attacks in wireless networks using signalprints
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Experimental study of concurrent transmission in wireless sensor networks
Proceedings of the 4th international conference on Embedded networked sensor systems
Robust key generation from signal envelopes in wireless networks
Proceedings of the 14th ACM conference on Computer and communications security
Wireless client puzzles in IEEE 802.11 networks: security by wireless
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
Secure code update for embedded devices via proofs of secure erasure
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Short paper: reactive jamming in wireless networks: how realistic is the threat?
Proceedings of the fourth ACM conference on Wireless network security
They can hear your heartbeats: non-invasive security for implantable medical devices
Proceedings of the ACM SIGCOMM 2011 conference
WiFire: a firewall for wireless networks
Proceedings of the ACM SIGCOMM 2011 conference
Practical receipt authentication for branchless banking
Proceedings of the 3rd ACM Symposium on Computing for Development
Defend your home!: jamming unsolicited messages in the smart home
Proceedings of the 2nd ACM workshop on Hot topics on wireless network security and privacy
Dhwani: secure peer-to-peer acoustic NFC
Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM
Hi-index | 0.00 |
While properties of wireless communications are often considered as a disadvantage from a security perspective, this work demonstrates how multipath propagation, a broadcast medium, and frequency jamming can be used as valuable security primitives. Instead of conventional message authentication by receiving, verifying, and then discarding fake data, sensor nodes are prevented from receiving fake data at all. The erratic nature of signal propagation distributes the jamming activity over the network which hinders an adversary in predicting jamming nodes and avoids selective battery-depletion attacks. By conducting real-world measurements, we justify the feasibility of such a security design and provide details on implementing it within a realistic wireless sensor network.