دانلود رایگان مقاله لاتین یکپارچگی لایه فیزیکی برای پیام بی سیم از سایت الزویر
عنوان فارسی مقاله:
یکپارچگی لایه فیزیکی برای پیام های بی سیم
عنوان انگلیسی مقاله:
Physical-layer integrity for wireless messages
سال انتشار : 2016
برای دانلود رایگان مقاله یکپارچگی لایه فیزیکی برای پیام بی سیماینجا کلیک نمایید.
مقدمه انگلیسی مقاله:
1. Introduction
Message integrity commonly refers to the integrity of the data in a message exchanged between a source and a destination. Message integrity protection mechanisms such as message authentication codes [1] ensure that the receiver can detect if the message data was generated or manipulated by unauthorized parties. Message authentication codes leverage cryptographic primitives such as cryptographic hash functions. While message integrity covers the logical data content of messages, other manipulations during the transmission of the message cannot be detected. For example, relay [2] and delay attacks [3] can be mounted without changing the data content of the target message. In this paper, we introduce the security notion of physical-layer message integrity that, unlike message integrity that is related to the data layer, relates physical-layer properties of the message, such as perceived angle-of-arrival, signal strength, bit-error-rate, spectrum, and time-of-arrival. Informally, we define physical-layer integrity as a message property that is preserved if the message is not tampered with in transmission over the channel.In particular, we concentrate on the aspect of message temporal integrity, which is the fundamental property for time-of-arrival based secure ranging, secure localization, and time synchronization. This property is different from freshness, which is concerned with messages not being replayed and re-used multiple times; instead, temporal integrity is concerned with messages being neither delayed nor advanced during their transmission. We show that although message arrival time advancement attacks can be prevented using conventional cryptographic techniques, e. g., by making parts of messages unpredictable to the attacker, message delay attacks are difficult to prevent or detect (e.g., assuming the common Dolev–Yao attacker model [4]). We then show that attacks on temporal integrity of messages can be detected, under a realistic attacker model. We propose a protocol that enables two mutually trusted devices to verify if the messages they exchange were advanced or delayed in transmission. We call that a message temporal integrity (MTI) protocol. Our protocol leverages a combination by combining distance bounding [5–8] with on-off keying modulation that enables detection of delay attacks. Advancement attacks are prevented by enforcing message freshness. The detection of manipulation of a message’s physical-layer characteristics helps to solve open problems in wireless networks. Examples include secure tight time synchronization, secure ranging, and secure localization. For example, temporal integrity.
برای دانلود رایگان مقاله یکپارچگی لایه فیزیکی برای پیام بی سیماینجا کلیک نمایید.
کلمات کلیدی:
Physical-layer integrity for wireless messages - ETH E-Citations e-citations.ethbib.ethz.ch/view/pub:180709?q=(keywords:integrity) Aug 2, 2016 - Physical-layer integrity for wireless messages ... Publication Place, Amsterdam. Publication Date, 2016-11. Keyword(s), Physical-layer integrity Publications 2016 – System Security Group | ETH Zurich www.syssec.ethz.ch/research/publications/pub2016.html Verifying Proximity in Wireless Systems in IEEE ... Verena: End-to-End Integrity Protection for Web Applications ... Physical-Layer Integrity for Wireless Messages [PDF]Physical-Layer Security Aspects of Wireless ... - ETH E-Collection e-collection.library.ethz.ch/eserv/eth:5920/eth-5920-02.pdf by NO Tippenhauer - 2012 - Cited by 7 - Related articles The security of wireless localization protocols relies on the integrity of the location result. .... 4 Physical-Layer Integrity of Wireless Messages. 67. 4.1 Problem ... The Physical Layer Integrity Check in Wireless Relay System ... www.ece.iastate.edu/files/2011/02/xudong-liu.pdf transmitting unbreakable encrypted messages, many physical layer ... So a physical layer integrity check scheme is proposed in this paper for wireless relay. PHYVOS: Physical layer voting for secure and fast cooperation - IEEE ... ieeexplore.ieee.org/document/7346834/ by B Hu - 2015 - Related articles Distributed wireless networks often employ voting to perform critical network functions ... In this paper, we propose a fast PHY-layer voting scheme called PHYVOS, ... without employing cryptography-based authentication and message integrity ... Handbook of Research on Wireless Security - Google Books Result https://books.google.com/books?isbn=159904899X Yan Zhang, Jun Zheng, Miao Ma - 2008 - Computers Furthermore, the DES encryption mode includes no message integrity or replay ... which specifies the physical layer, as well as higher protocol stack layers. Security, Privacy, Trust, and Resource Management in Mobile and ... https://books.google.com/books?isbn=1466646926 Rawat, Danda B. - 2013 - Computers Integrity is a critical requirement in wireless networks, because of the potential vulnerabilities ... Majordataintegrity attacks are message modification andjamming attacks. ... Jamming is widely used to execute DoS attacks at the physical layer.