TU Darmstadt / ULB / TUbiblio

Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems

Schulz, Matthias ; Loch, Adrian ; Hollick, Matthias (2014)
Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems.
San Diego
Konferenzveröffentlichung, Bibliographie

Kurzbeschreibung (Abstract)

Physical layer security schemes for wireless communication systems have been broadly studied from an information theory point of view. In contrast, there is a dearth of attack methodologies to analyze the achievable security on the physical layer. To address this issue, we develop a novel attack model for physical layer security schemes, which is the equivalent to known-plaintext attacks in cryptoanalysis. In particular, we concentrate on analyzing the security of orthogonal blinding schemes that disturb an eavesdropper’s signal reception using artificial noise transmission. We discuss the theory underlying our attack methodology and develop an adaptive filter trained by known-plaintext symbols to degrade the secrecy of orthogonal blinding. By means of simulation and measurements on real wireless channels using software-defined radios with OFDM transceivers, we obtain the operating area of our attack and evaluate the achievable secrecy degradation. We are able to reduce the secrecy of orthogonal blinding schemes to Symbol Error Rates (SERs) below 10% at an eavesdropper, with a knowledge of only a 3% of the symbols transmitted in typical WLAN frames.

Typ des Eintrags: Konferenzveröffentlichung
Erschienen: 2014
Autor(en): Schulz, Matthias ; Loch, Adrian ; Hollick, Matthias
Art des Eintrags: Bibliographie
Titel: Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems
Sprache: Englisch
Publikationsjahr: Februar 2014
Buchtitel: Proceedings of the Network and Distributed System Security Symposium (NDSS 2014)
Veranstaltungsort: San Diego
Kurzbeschreibung (Abstract):

Physical layer security schemes for wireless communication systems have been broadly studied from an information theory point of view. In contrast, there is a dearth of attack methodologies to analyze the achievable security on the physical layer. To address this issue, we develop a novel attack model for physical layer security schemes, which is the equivalent to known-plaintext attacks in cryptoanalysis. In particular, we concentrate on analyzing the security of orthogonal blinding schemes that disturb an eavesdropper’s signal reception using artificial noise transmission. We discuss the theory underlying our attack methodology and develop an adaptive filter trained by known-plaintext symbols to degrade the secrecy of orthogonal blinding. By means of simulation and measurements on real wireless channels using software-defined radios with OFDM transceivers, we obtain the operating area of our attack and evaluate the achievable secrecy degradation. We are able to reduce the secrecy of orthogonal blinding schemes to Symbol Error Rates (SERs) below 10% at an eavesdropper, with a knowledge of only a 3% of the symbols transmitted in typical WLAN frames.

ID-Nummer: TUD-CS-2014-0091
Fachbereich(e)/-gebiet(e): 20 Fachbereich Informatik
20 Fachbereich Informatik > Sichere Mobile Netze
LOEWE
LOEWE > LOEWE-Zentren
LOEWE > LOEWE-Zentren > CASED – Center for Advanced Security Research Darmstadt
Hinterlegungsdatum: 31 Dez 2016 11:08
Letzte Änderung: 10 Jun 2021 06:12
PPN:
Export:
Suche nach Titel in: TUfind oder in Google
Frage zum Eintrag Frage zum Eintrag

Optionen (nur für Redakteure)
Redaktionelle Details anzeigen Redaktionelle Details anzeigen