[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Shen et al., 2015 - Google Patents

No time to demodulate-fast physical layer verification of friendly jamming

Shen et al., 2015

View PDF
Document ID
8025480871546644167
Author
Shen W
Liu Y
He X
Dai H
Ning P
Publication year
Publication venue
MILCOM 2015-2015 IEEE Military Communications Conference

External Links

Snippet

Jamming attacks are well-known threats to wireless communications, but on the other hand they provide insights for researchers to design novel approaches to protect wireless communications. In recent years, friendly jamming is used by a number of research works to …
Continue reading at citeseerx.ist.psu.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/001Modulated-carrier systems using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/003Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/69Spread spectrum techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L27/00Modulated-carrier systems
    • H04L27/0014Carrier regulation
    • H04L2027/0083Signalling arrangements
    • H04L2027/0089In-band signals
    • H04L2027/0093Intermittant signals
    • H04L2027/0095Intermittant signals in a preamble or similar structure
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04KSECRET COMMUNICATION; JAMMING OF COMMUNICATION
    • H04K1/00Secret communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing

Similar Documents

Publication Publication Date Title
Shen et al. Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time
Li et al. Securing wireless systems via lower layer enforcements
Popper et al. Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
Pöpper et al. Investigation of signal and message manipulations on the wireless channel
Zou et al. Securing physical-layer communications for cognitive radio networks
Du et al. Physical layer challenge-response authentication in wireless networks with relay
Jin et al. Zero pre-shared secret key establishment in the presence of jammers
Liu et al. Enhanced wireless channel authentication using time-synched link signature
Flury et al. Effectiveness of distance-decreasing attacks against impulse radio ranging
Fang et al. Where are you from? Confusing location distinction using virtual multipath camouflage
Leu et al. Message time of arrival codes: A fundamental primitive for secure distance measurement
Steinmetzer et al. Lockpicking physical layer key exchange: Weak adversary models invite the thief
Fang et al. Mimicry attacks against wireless link signature and new defense using time-synched link signature
Liu et al. USD-FH: Jamming-resistant wireless communication using frequency hopping with uncoordinated seed disclosure
Fang et al. Virtual multipath attack and defense for location distinction in wireless networks
Zhang et al. On the effects of distance-decreasing attacks on cryptographically protected GNSS signals
Shen et al. No time to demodulate-fast physical layer verification of friendly jamming
Xie et al. Lightweight secure localization approach in wireless sensor networks
Jin et al. A reassessment on friendly jamming efficiency
Yu et al. On effective localization attacks against internet threat monitors
Song et al. Enhancement of frequency-based wormhole attack detection
Rouissi et al. A hybrid DS-FH-THSS approach anti-jamming in Wireless Sensor Networks
Zenger et al. Constructive and destructive aspects of adaptive wormholes for the 5g tactile internet
Crosara et al. Performance evaluation of an indistinguishability based attack against spreading code secured GNSS signals
Hao Wireless device authentication techniques using physical-layer device fingerprint