A Study of Injection and Jamming Attacks in Wireless Secret Sharing Systems

被引:4
作者
Chorti, Arsenia [1 ]
机构
[1] Sch Comp Sci & Elect Engn, Wivenhoe Pk, Colchester CO4 3SQ, Essex, England
来源
PROCEEDINGS OF THE 2ND WORKSHOP ON COMMUNICATION SECURITY: CRYPTOGRAPHY AND PHYSICAL LAYER SECURITY | 2018年 / 447卷
关键词
PHYSICAL-LAYER SECURITY; UNAUTHENTICATED PUBLIC CHANNELS; KEY AGREEMENT; INFORMATION; RANDOMNESS; NETWORKS;
D O I
10.1007/978-3-319-59265-7_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secret key generation (SKG) schemes have been shown to be vulnerable to denial of service (DoS) attacks in the form of jamming and to man in the middle attacks implemented as injection attacks. In this paper, a comprehensive study on the impact of correlated and uncorrelated jamming and injection attacks in wireless SKG systems is presented. First, two optimal signalling schemes for the legitimate users are proposed and the impact of injection attacks as well as counter-measures are investigated. Finally, it is demonstrated that the jammer should inject either correlated jamming when imperfect channel state information (CSI) regarding the main channel is at their disposal, or, uncorrelated jamming when the main channel CSI is completely unknown.
引用
收藏
页码:1 / 14
页数:14
相关论文
共 31 条
[1]   The capacity of discrete-time memoryless Rayleigh-Fading channels [J].
Abou-Faycal, IC ;
Trott, MD ;
Shamai, S .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (04) :1290-1301
[2]   COMMON RANDOMNESS IN INFORMATION-THEORY AND CRYPTOGRAPHY .1. SECRET SHARING [J].
AHLSWEDE, R ;
CSISZAR, I .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1121-1132
[3]  
[Anonymous], 1997, P ALL C COMM CONTR C
[4]  
[Anonymous], 2011, Physical-layer security:from information theory to security engineering, DOI DOI 10.1017/CBO9780511977985
[5]   Secret Key Establishment Using Temporally and Spatially Correlated Wireless Channel Coefficients [J].
Chen, Chan ;
Jensen, Michael A. .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (02) :205-215
[6]   Secrecy capacities for multiple terminals [J].
Csiszár, I ;
Narayan, P .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2004, 50 (12) :3047-3061
[7]  
Eberz Simon, 2012, Computer Security - ESORICS 2012. Proceedings 17th European Symposium on Research in Computer Security, P235, DOI 10.1007/978-3-642-33167-1_14
[8]   Wireless Communications under Broadband Reactive Jamming Attacks [J].
Fang, Song ;
Liu, Yao ;
Ning, Peng .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (03) :394-408
[9]   Physical Layer Security in Downlink Multi-Antenna Cellular Networks [J].
Geraci, Giovanni ;
Dhillon, Harpreet S. ;
Andrews, Jeffrey G. ;
Yuan, Jinhong ;
Collings, Iain B. .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2014, 62 (06) :2006-2021
[10]   On the Effectiveness of Secret Key Extraction from Wireless Signal Strength in Real Environments [J].
Jana, Suman ;
Premnath, Sriram Nandha ;
Clark, Mike ;
Kasera, Sneha K. ;
Patwari, Neal ;
Krishnamurthy, Srikanth V. .
FIFTEENTH ACM INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING (MOBICOM 2009), 2009, :321-332