2014
DOI: 10.1002/wcm.2500
|View full text |Cite
|
Sign up to set email alerts
|

Physical layer orthogonal frequency‐division multiplexing acquisition and timing synchronization security

Abstract: Orthogonal frequency-division multiplexing (OFDM) has become the manifest modulation choice for 4G standards. Timing acquisition and carrier frequency offset synchronization are prerequisite to OFDM demodulation and must be performed often. Most of the OFDM methods for synchronization were not designed with security in mind. In particular, we analyze the performance of a maximum likelihood synchronization estimator against highly correlated jamming attacks. We present a series of attacks against OFDM timing ac… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 17 publications
(32 reference statements)
0
8
0
Order By: Relevance
“…5, timing synchronization is a critical component of the Wi-Fi receiver to decode the data packet. Various jamming attacks have been proposed to thwart the signal timing acquisition and disrupt the start-of-packet detection procedure, such as false preamble attack, preamble nulling attack, and preamble warping attack [32], [52], [53]. These attacks were sophisticatedly designed to thwart the timing synchronization process at a Wi-Fi receiver.…”
Section: B Jamming Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…5, timing synchronization is a critical component of the Wi-Fi receiver to decode the data packet. Various jamming attacks have been proposed to thwart the signal timing acquisition and disrupt the start-of-packet detection procedure, such as false preamble attack, preamble nulling attack, and preamble warping attack [32], [52], [53]. These attacks were sophisticatedly designed to thwart the timing synchronization process at a Wi-Fi receiver.…”
Section: B Jamming Attacksmentioning
confidence: 99%
“…These attacks were sophisticatedly designed to thwart the timing synchronization process at a Wi-Fi receiver. False preamble attack [52], [53], also known as preamble spoofing, is a simple method devised to falsely manipulate timing synchronization output injecting the same preamble signal as that in legitimate Wi-Fi packets. By doing so, a Wi-Fi receiver will not be capable of decoding the desired data packet as it will fail in the correlation peak detection.…”
Section: B Jamming Attacksmentioning
confidence: 99%
“…Constant, deceptive, and random jamming models achieve a high level of DoS by excessively transmitting over the channel, but exhibit poor energy efficiency and high detection probability [22]. On the other hand, energy-efficient reactive jamming attacks select and target a (part of a) packet based on traffic analysis, protocol semantics, or publicity of some fields [3], [4], [8]- [10], [20]. These attacks may fail to significantly corrupt ongoing transmissions if, for example, channel hopping, randomization, and coding are used to hide the transmission features.…”
Section: Related Workmentioning
confidence: 99%
“…In contrast, our proposed attack lasts for less than the duration of a pilot symbol jamming and corrupts the channel estimation without jamming pilots. Jamming against timing acquisition in OFDM systems and some countermeasures were discussed in [8], [11], [12]. However, OFDM systems are more sensitive to FO than timing errors.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation