Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2046707.2093497acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
poster

Poster: mimicry attacks against wireless link signature

Published: 17 October 2011 Publication History

Abstract

Wireless link signature is a physical layer authentication mechanism, which uses the multi-path effect between a transmitter and a receiver to provide authentication of wireless signals. We identify a new attack, called mimicry attack, against the wireless link signature scheme in [7]. It is assumed in the past that an attacker cannot "spoof" an arbitrary link signature and that the attacker will not have the same link signature at the receiver unless it is at exactly the same location as the legitimate transmitter. However, we show that an attacker can forge an arbitrary link signature as long as it knows the legitimate signal at the receiver's location, and the attacker does not have to be at exactly the same location as the legitimate transmitter in order to forge its link signature.

References

[1]
GNU Radio - The GNU Software Radio. http://www.gnu.org/software/gnuradio/.
[2]
V. Brik, S. Banerjee, M. Gruteser, and S. Oh. Wireless device identification with radiometric signatures. In Proceedings of the 14th ACM International Conference on Mobile Computing and Networking (MobiCom '08), pages 116--127, 2008.
[3]
A. Goldsmith. Wireless Communications. Cambridge University Press, New York, NY, USA, 2005.
[4]
Z. Li, W. Xu, R. Miller, and W. Trappe. Securing wireless systems via lower layer enforcements. In In Proceedings of ACM Workshop on Wireless Security (WiSe'06), 2006.
[5]
E. R. LLC. The USRP product family products and daughter boards. http://www.ettus.com/products. Accessed in April 2011.
[6]
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. Radio-telepathy: extracting a secret key from an unauthenticated wireless channel. In Proceedings of the 14th ACM International Conference on Mobile Computing and Networking (MobiCom '08), pages 128--139, 2008.
[7]
N. Patwari and S. K. Kasera. Robust location distinction using temporal link signatures. In MobiCom '07: Proceedings of the 13th annual ACM international conference on Mobile computing and networking, pages 111--122, New York, NY, USA, 2007. ACM.
[8]
K. Rasmussen, C. Castelluccia, T. Heydt-Benjamin, and S. Capkun. Proximity-based access control for implantable medical devices. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09), 2009.
[9]
R. Safaya. A multipath channel estimation algorithm using a kalman filter. http://www.ittc.ku.edu/research/thesis/documents/rupul_safaya_thesis.pdf .
[10]
K. S. Shanmugan and A. M. Breipohl. Random signals: detection, estimation, and data analysis. Wiley, May 1988.
[11]
J. Zhang, M. H. Firooz, N. Patwari, and S. K. Kasera. Advancing wireless link signatures for location distinction. In MobiCom '08: Proceedings of the 14th ACM international conference on Mobile computing and networking, New York, NY, USA, 2008. ACM.

Cited By

View all
  • (2023)Exquisite Feature Selection for Machine Learning Powered Probing Attack DetectionICC 2023 - IEEE International Conference on Communications10.1109/ICC45041.2023.10278886(783-789)Online publication date: 28-May-2023
  • (2018)Vulnerability Analysis and Spoof Scheme on AoA-Based WLAN Location SystemsCloud Computing and Security10.1007/978-3-030-00021-9_19(199-208)Online publication date: 26-Sep-2018
  • (2017)Virtual Multipath Attack and Defense for Location Distinction in Wireless NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2016.254951916:2(566-580)Online publication date: 1-Feb-2017
  • Show More Cited By

Index Terms

  1. Poster: mimicry attacks against wireless link signature

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CCS '11: Proceedings of the 18th ACM conference on Computer and communications security
      October 2011
      742 pages
      ISBN:9781450309486
      DOI:10.1145/2046707

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 17 October 2011

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. attacks
      2. link signature
      3. wireless security

      Qualifiers

      • Poster

      Conference

      CCS'11
      Sponsor:

      Acceptance Rates

      CCS '11 Paper Acceptance Rate 60 of 429 submissions, 14%;
      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

      Upcoming Conference

      CCS '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)7
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 09 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)Exquisite Feature Selection for Machine Learning Powered Probing Attack DetectionICC 2023 - IEEE International Conference on Communications10.1109/ICC45041.2023.10278886(783-789)Online publication date: 28-May-2023
      • (2018)Vulnerability Analysis and Spoof Scheme on AoA-Based WLAN Location SystemsCloud Computing and Security10.1007/978-3-030-00021-9_19(199-208)Online publication date: 26-Sep-2018
      • (2017)Virtual Multipath Attack and Defense for Location Distinction in Wireless NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2016.254951916:2(566-580)Online publication date: 1-Feb-2017
      • (2016)Analog man-in-the-middle attack against link-based packet source identificationProceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing10.1145/2942358.2942361(331-340)Online publication date: 5-Jul-2016
      • (2016)Toward Proper Guard Zones for Link SignatureIEEE Transactions on Wireless Communications10.1109/TWC.2015.249862115:3(2104-2117)Online publication date: Mar-2016
      • (2016)Mimicry Attacks Against Wireless Link Signature and New Defense Using Time-Synched Link SignatureIEEE Transactions on Information Forensics and Security10.1109/TIFS.2016.254130711:7(1515-1527)Online publication date: 1-Jul-2016
      • (2014)Vulnerability and Protection of Channel State Information in Multiuser MIMO NetworksProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security10.1145/2660267.2660272(775-786)Online publication date: 3-Nov-2014
      • (2014)Where are you from?Proceedings of the 20th annual international conference on Mobile computing and networking10.1145/2639108.2639117(225-236)Online publication date: 7-Sep-2014
      • (2014)Physical layer challenge-response authentication in wireless networks with relayIEEE INFOCOM 2014 - IEEE Conference on Computer Communications10.1109/INFOCOM.2014.6848060(1276-1284)Online publication date: Apr-2014
      • (2014)The security of link signature: A view from channel models2014 IEEE Conference on Communications and Network Security10.1109/CNS.2014.6997473(103-108)Online publication date: Oct-2014
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media