Shen et al., 2015 - Google Patents
No time to demodulate-fast physical layer verification of friendly jammingShen et al., 2015
View PDF- Document ID
- 8025480871546644167
- Author
- Shen W
- Liu Y
- He X
- Dai H
- Ning P
- Publication year
- Publication venue
- MILCOM 2015-2015 IEEE Military Communications Conference
External Links
Snippet
Jamming attacks are well-known threats to wireless communications, but on the other hand they provide insights for researchers to design novel approaches to protect wireless communications. In recent years, friendly jamming is used by a number of research works to …
- 230000005540 biological transmission 0 abstract description 53
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/001—Modulated-carrier systems using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B1/00—Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
- H04B1/69—Spread spectrum techniques
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/0014—Carrier regulation
- H04L2027/0083—Signalling arrangements
- H04L2027/0089—In-band signals
- H04L2027/0093—Intermittant signals
- H04L2027/0095—Intermittant signals in a preamble or similar structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04K—SECRET COMMUNICATION; JAMMING OF COMMUNICATION
- H04K1/00—Secret communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B17/00—Monitoring; Testing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shen et al. | Ally friendly jamming: How to jam your enemy and maintain your own wireless connectivity at the same time | |
Li et al. | Securing wireless systems via lower layer enforcements | |
Popper et al. | Anti-jamming broadcast communication using uncoordinated spread spectrum techniques | |
Pöpper et al. | Investigation of signal and message manipulations on the wireless channel | |
Zou et al. | Securing physical-layer communications for cognitive radio networks | |
Du et al. | Physical layer challenge-response authentication in wireless networks with relay | |
Jin et al. | Zero pre-shared secret key establishment in the presence of jammers | |
Liu et al. | Enhanced wireless channel authentication using time-synched link signature | |
Flury et al. | Effectiveness of distance-decreasing attacks against impulse radio ranging | |
Fang et al. | Where are you from? Confusing location distinction using virtual multipath camouflage | |
Leu et al. | Message time of arrival codes: A fundamental primitive for secure distance measurement | |
Steinmetzer et al. | Lockpicking physical layer key exchange: Weak adversary models invite the thief | |
Fang et al. | Mimicry attacks against wireless link signature and new defense using time-synched link signature | |
Liu et al. | USD-FH: Jamming-resistant wireless communication using frequency hopping with uncoordinated seed disclosure | |
Fang et al. | Virtual multipath attack and defense for location distinction in wireless networks | |
Zhang et al. | On the effects of distance-decreasing attacks on cryptographically protected GNSS signals | |
Shen et al. | No time to demodulate-fast physical layer verification of friendly jamming | |
Xie et al. | Lightweight secure localization approach in wireless sensor networks | |
Jin et al. | A reassessment on friendly jamming efficiency | |
Yu et al. | On effective localization attacks against internet threat monitors | |
Song et al. | Enhancement of frequency-based wormhole attack detection | |
Rouissi et al. | A hybrid DS-FH-THSS approach anti-jamming in Wireless Sensor Networks | |
Zenger et al. | Constructive and destructive aspects of adaptive wormholes for the 5g tactile internet | |
Crosara et al. | Performance evaluation of an indistinguishability based attack against spreading code secured GNSS signals | |
Hao | Wireless device authentication techniques using physical-layer device fingerprint |