ACM SIGACT News
Perfect cryptographic security from partially independent channels
STOC '91 Proceedings of the twenty-third annual ACM symposium on Theory of computing
Elements of information theory
Elements of information theory
Intercepting mobile communications: the insecurity of 802.11
Proceedings of the 7th annual international conference on Mobile computing and networking
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
Introduction to Cryptography: With Coding Theory
Introduction to Cryptography: With Coding Theory
Microwave Mobile Communications
Microwave Mobile Communications
Cryptoanalysis of the Cellular Encryption Algorithm
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Security problems in 802.11-based networks
Communications of the ACM - Wireless networking security
Security flaws in 802.11 data link protocols
Communications of the ACM - Wireless networking security
Impact of radio irregularity on wireless sensor networks
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Wireless Communications
Wireless Communications
Secret-key agreement over unauthenticated public channels .I. Definitions and a completeness result
IEEE Transactions on Information Theory
Secure space-time communication
IEEE Transactions on Information Theory
Robust location distinction using temporal link signatures
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Advancing wireless link signatures for location distinction
Proceedings of the 14th ACM international conference on Mobile computing and networking
Wireless device identification with radiometric signatures
Proceedings of the 14th ACM international conference on Mobile computing and networking
Radio-telepathy: extracting a secret key from an unauthenticated wireless channel
Proceedings of the 14th ACM international conference on Mobile computing and networking
Jamming for good: a fresh approach to authentic communication in WSNs
Proceedings of the second ACM conference on Wireless network security
On the effectiveness of secret key extraction from wireless signal strength in real environments
Proceedings of the 15th annual international conference on Mobile computing and networking
Channel-based detection of Sybil attacks in wireless networks
IEEE Transactions on Information Forensics and Security
Distributed detection with censoring sensors under physical layer secrecy
IEEE Transactions on Signal Processing
Detecting spoofing attacks in mobile wireless environments
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
A channel-based hypothesis testing approach to enhance user authentication in wireless networks
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
Adaptive security protocol selection for mobile computing
Journal of Network and Computer Applications
On channel-based user authentication for mobile terminals
Asilomar'09 Proceedings of the 43rd Asilomar conference on Signals, systems and computers
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Vulnerabilities of wireless key exchange based on channel reciprocity
WISA'10 Proceedings of the 11th international conference on Information security applications
Aegis: physical space security for wireless networks with smart antennas
IEEE/ACM Transactions on Networking (TON)
On passive inference attacks against physical-layer key extraction?
Proceedings of the Fourth European Workshop on System Security
CRMA: collision-resistant multiple access
MobiCom '11 Proceedings of the 17th annual international conference on Mobile computing and networking
Poster: mimicry attacks against wireless link signature
Proceedings of the 18th ACM conference on Computer and communications security
Securing data provenance in body area networks using lightweight wireless link fingerprints
Proceedings of the 3rd international workshop on Trustworthy embedded devices
Hi-index | 0.00 |
Although conventional cryptographic security mechanisms are essential to the overall problem of securing wireless networks, these techniques do not directly leverage the unique properties of the wireless domain to address security threats. The properties of the wireless medium are a powerful source of domain-specific information that can complement and enhance traditional security mechanisms. In this paper, we propose to utilize the fact that the radio channel decorre-lates rapidly in space, time and frequency in order to to establish new forms of authentication and confidentiality that operate at the physical layer and can be used to facilitate cross-layer security paradigms. Specifically, for authentication services, we illustrate two channel probing techniques that can be used to verify the authenticity of a transmitter. Similarly, for confidentiality, we examine several strategies for establishing shared secrets/keys between two communicators using the wireless medium. These strategies range from extracting keys from channel state information, to utilizing the channel variability to secretly disseminate keys. We then validate the feasibility of using physical layer techniques for securing wireless systems by presenting results from experiments involving the USRP/GNURadio software defined radio platform.