Authors
Christina Pöpper, Nils Ole Tippenhauer, Boris Danev, Srdjan Capkun
Publication date
2011
Conference
Computer Security–ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings 16
Pages
40-59
Publisher
Springer Berlin Heidelberg
Description
We explore the suitability of Dolev-Yao-based attacker models for the security analysis of wireless communication. The Dolev-Yao model is commonly used for wireline and wireless networks. It is defined on abstract messages exchanged between entities and includes arbitrary, real-time modification of messages by the attacker. In this work, we aim at understanding and evaluating the conditions under which these real-time, covert low-energy signal modifications can be successful. In particular, we focus on the following signal and message manipulation techniques: symbol flipping and signal annihilation. We analyze these techniques theoretically, by simulations, and experiments and show their feasibility for particular wireless channels and scenarios.
Total citations
20112012201320142015201620172018201920202021202220232024171048111111188114101
Scholar articles
C Pöpper, NO Tippenhauer, B Danev, S Capkun - Computer Security–ESORICS 2011: 16th European …, 2011