Discrete-time signal processing (2nd ed.)
Discrete-time signal processing (2nd ed.)
Denial of Service in Sensor Networks
Computer
Broadcast Anti-Jamming Systems
ICON '99 Proceedings of the 7th IEEE International Conference on Networks
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
On link layer denial of service in data wireless LANs: Research Articles
Wireless Communications & Mobile Computing
Fundamentals of wireless communication
Fundamentals of wireless communication
Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels
SP '06 Proceedings of the 2006 IEEE Symposium on Security and Privacy
Experimental study of concurrent transmission in wireless sensor networks
Proceedings of the 4th international conference on Embedded networked sensor systems
Channel surfing: defending wireless sensor networks from jamming and interference
Proceedings of the 4th international conference on Embedded networked sensor systems
Wormhole-Based Antijamming Techniques in Sensor Networks
IEEE Transactions on Mobile Computing
Exploiting the capture effect for collision detection and recovery
EmNets '05 Proceedings of the 2nd IEEE workshop on Embedded Networked Sensors
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Zero pre-shared secret key establishment in the presence of jammers
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
Attacks on public WLAN-based positioning systems
Proceedings of the 7th international conference on Mobile systems, applications, and services
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
CSF '09 Proceedings of the 2009 22nd IEEE Computer Security Foundations Symposium
On the effectiveness of secret key extraction from wireless signal strength in real environments
Proceedings of the 15th annual international conference on Mobile computing and networking
Detection of reactive jamming in sensor networks
ACM Transactions on Sensor Networks (TOSN)
Randomized differential DSSS: jamming-resistant wireless broadcast communication
INFOCOM'10 Proceedings of the 29th conference on Information communications
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure
Proceedings of the 26th Annual Computer Security Applications Conference
Short paper: reactive jamming in wireless networks: how realistic is the threat?
Proceedings of the fourth ACM conference on Wireless network security
Modern Communications Jamming Principles and Techniques
Modern Communications Jamming Principles and Techniques
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Redundancy offset narrow spectrum: countermeasure for signal-cancellation based jamming
Proceedings of the 11th ACM international symposium on Mobility management and wireless access
Experimental analysis of attacks on next generation air traffic communication
ACNS'13 Proceedings of the 11th international conference on Applied Cryptography and Network Security
Hi-index | 0.00 |
We explore the suitability of Dolev-Yao-based attacker models for the security analysis of wireless communication. The Dolev-Yao model is commonly used for wireline and wireless networks. It is defined on abstract messages exchanged between entities and includes arbitrary, real-time modification of messages by the attacker. In this work, we aim at understanding and evaluating the conditions under which these real-time, covert low-energy signal modifications can be successful. In particular, we focus on the following signal and message manipulation techniques: symbol flipping and signal annihilation. We analyze these techniques theoretically, by simulations, and experiments and show their feasibility for particular wireless channels and scenarios.