Inference Attacks on Physical Layer Channel State Information

被引:0
|
作者
Walther, Paul [1 ]
Strufe, Thorsten [2 ,3 ]
机构
[1] Tech Univ Dresden, Chair Privacy & Secur, Dresden, Germany
[2] Tech Univ Dresden, Karlsruhe Inst Technol KIT, CeTI, Dresden, Germany
[3] Tech Univ Dresden, Ctr Tactile Internet, CeTI, Dresden, Germany
关键词
D O I
10.1109/TrustCom50675.2020.00125
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In Physical Layer Security, knowing the reciprocal state information of the legitimate terminals' wireless channel is considered a shared secret. Although questioned in recent works, the basic assumption is that an eavesdropper, residing more than half of a wavelength away from the legitimate terminals, is unable to even obtain estimates that are correlated to the state information of the legitimate channel. In this work, we present a Machine Learning based attack that does not require knowledge about the environment or terminal positions, but is solely based on the eavesdropper's measurements. It still successfully infers the legitimate channel state information as represented in impulse responses. We show the effectiveness of our attack by evaluating it on two sets of real world ultra wideband channel impulse responses, for which our attack predictions can achieve higher correlations than even the measurements at the legitimate channel.
引用
收藏
页码:936 / 943
页数:8
相关论文
共 50 条
  • [41] Side-Channel Inference Attacks on Mobile Keypads Using Smartwatches
    Maiti, Anindya
    Jadliwala, Murtuza
    He, Jibo
    Bilogrevic, Igor
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2018, 17 (09) : 2180 - 2194
  • [42] Analysis of side information impact on the physical layer security performances in wireless wiretap channel
    Pakravan, Saeid
    Hodtani, Ghosheh Abed
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (01)
  • [43] Impact of Imperfect Channel State Information on the Physical Layer Security in D2D Wireless Networks Using Untrusted Relays
    Izanlou, Marzieh
    Mohammadi, Abbas
    Dosaranian-Moghadam, Mohamad
    WIRELESS PERSONAL COMMUNICATIONS, 2021, 116 (01) : 341 - 368
  • [44] Impact of Imperfect Channel State Information on the Physical Layer Security in D2D Wireless Networks Using Untrusted Relays
    Marzieh Izanlou
    Abbas Mohammadi
    Mohamad Dosaranian-Moghadam
    Wireless Personal Communications, 2021, 116 : 341 - 368
  • [45] A tutorial on physical security and side-channel attacks
    Koeune, F
    Standaert, FX
    FOUNDATIONS OF SECURITY ANALYSIS AND DESIGN III, 2005, 3655 : 78 - 108
  • [46] Preventing Wormhole Attacks Using Physical Layer Authentication
    Jain, Shalabh
    Baras, John S.
    2012 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2012,
  • [47] Formal verification for security and attacks in IoT physical layer
    Toman Z.H.
    Hamel L.
    Toman S.H.
    Graiet M.
    Valadares D.C.G.
    Journal of Reliable Intelligent Environments, 2024, 10 (1) : 73 - 91
  • [48] Detection of Jamming Attacks for the Physical-Layer Authentication
    Tan, Haijun
    Li, Zhuoyuan
    Xie, Ning
    Lu, Jian
    Niyato, Dusit
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22 (12) : 9579 - 9594
  • [49] Channel Independent Physical Layer Security
    Ankarali, Z. Esat
    Yilmaz, M. Harun
    Hafez, Mohammed
    Arslan, Huseyin
    2016 IEEE 17TH ANNUAL WIRELESS AND MICROWAVE TECHNOLOGY CONFERENCE (WAMICON), 2016,
  • [50] On the Performance of k-Anonymity Against Inference Attacks With Background Information
    Zhao, Ping
    Jiang, Hongbo
    Wang, Chen
    Huang, Haojun
    Liu, Gaoyang
    Yang, Yang
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (01) : 808 - 819