Inference Attacks on Physical Layer Channel State Information

被引:0
|
作者
Walther, Paul [1 ]
Strufe, Thorsten [2 ,3 ]
机构
[1] Tech Univ Dresden, Chair Privacy & Secur, Dresden, Germany
[2] Tech Univ Dresden, Karlsruhe Inst Technol KIT, CeTI, Dresden, Germany
[3] Tech Univ Dresden, Ctr Tactile Internet, CeTI, Dresden, Germany
关键词
D O I
10.1109/TrustCom50675.2020.00125
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In Physical Layer Security, knowing the reciprocal state information of the legitimate terminals' wireless channel is considered a shared secret. Although questioned in recent works, the basic assumption is that an eavesdropper, residing more than half of a wavelength away from the legitimate terminals, is unable to even obtain estimates that are correlated to the state information of the legitimate channel. In this work, we present a Machine Learning based attack that does not require knowledge about the environment or terminal positions, but is solely based on the eavesdropper's measurements. It still successfully infers the legitimate channel state information as represented in impulse responses. We show the effectiveness of our attack by evaluating it on two sets of real world ultra wideband channel impulse responses, for which our attack predictions can achieve higher correlations than even the measurements at the legitimate channel.
引用
收藏
页码:936 / 943
页数:8
相关论文
共 50 条
  • [31] A Survey: Spoofing Attacks in Physical Layer Security
    Yilmaz, Mustafa Harun
    Arslan, Huseyin
    2015 IEEE 40TH LOCAL COMPUTER NETWORKS CONFERENCE WORKSHOPS (LCN WORKSHOPS), 2015, : 812 - 817
  • [32] Review of Authentication Algorithms for Physical Layer Attacks
    Salunke, Mahendra Balkrishna
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 126 - 134
  • [33] Simulation of 802.11 Physical Layer Attacks in MANET
    Sari, Arif
    Rahnama, Behnam
    2013 FIFTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS (CICSYN), 2013, : 334 - 337
  • [34] Physical Layer Attacks on Unlinkability in Wireless LANs
    Bauer, Kevin
    McCoy, Damon
    Greenstein, Ben
    Grunwald, Dirk
    Sicker, Douglas
    PRIVACY ENHANCING TECHNOLOGIES, PROCEEDINGS, 2009, 5672 : 108 - +
  • [35] Outage Performance of Physical Layer Security for Multi-hop Underlay Cognitive Radio Networks with Imperfect Channel State Information
    Shim, Kyusung
    Do, Nhu Tri
    An, Beongku
    Nam, Sang-Yep
    2016 INTERNATIONAL CONFERENCE ON ELECTRONICS, INFORMATION, AND COMMUNICATIONS (ICEIC), 2016,
  • [36] SurFi: Detecting Surveillance Camera Looping Attacks with Wi-Fi Channel State Information
    Lakshmanan, Nitya
    Bang, Inkyu
    Kang, Min Suk
    Han, Jun
    Lee, Jong Taek
    PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 239 - 244
  • [37] Protecting individual information against inference attacks in data publishing
    Li, Chen
    Shirani-Mehr, Houtan
    Yang, Xiaochun
    ADVANCES IN DATABASES: CONCEPTS, SYSTEMS AND APPLICATIONS, 2007, 4443 : 422 - +
  • [38] Prevention of Inference Attacks for Private Information in Social Networking Sites
    Praveena, A.
    Smys, S.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INVENTIVE SYSTEMS AND CONTROL (ICISC 2017), 2017, : 837 - 843
  • [39] Optimal cross-layer power allocation with channel and queue state information
    Chen, Wei
    Cao, Zhi-Gang
    Fan, Ping-Yi
    Letaief, K.B.
    Tongxin Xuebao/Journal on Communications, 2007, 28 (08): : 16 - 23
  • [40] Physical Layer Secure Information Exchange Protocol for MIMO Ad hoc Networks Against Passive Attacks
    Liu, Qiao
    Gong, Guang
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,