The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2016 IEEE International Conference on Communications Workshops (ICC) 2016
DOI: 10.1109/iccw.2016.7503773
|View full text |Cite
|
Sign up to set email alerts
|

Preventing relay attacks and providing perfect forward secrecy using PHYSEC on 8-bit µC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…Further, we show how our technique can deal with the most powerful attacker who manipulates the physical channel that A and B are using for key extraction and authentication. The only assumption is that E is located at a distance of further [22] describe in their paper how to actually achieve the property perfect forward secrecy with their proposed scheme on resource constrained transceiver platforms.…”
Section: Channel-based Key Extraction (Cbke)mentioning
confidence: 99%
“…Further, we show how our technique can deal with the most powerful attacker who manipulates the physical channel that A and B are using for key extraction and authentication. The only assumption is that E is located at a distance of further [22] describe in their paper how to actually achieve the property perfect forward secrecy with their proposed scheme on resource constrained transceiver platforms.…”
Section: Channel-based Key Extraction (Cbke)mentioning
confidence: 99%
“…The earliest case of utilizing the channel to detect DF relay attacks found was by C.T. Zenger et al, where they utilized the quantization of the received-signal strength (RSS) between two parties to detect if a wormhole (DF relay) attack is occurring [31]. Since the small-scale fading effects on the RSS should be reciprocal, a relay would result in a different quantization between the legitimate parties.…”
Section: Relevant Work and Motivationsmentioning
confidence: 99%
“…Based on the claim that a relay attacker violates channel reciprocity between legitimate nodes A and B, previous works have suggested to examine the channel response to detect relay attacks [31,33,58]. The attack detection mechanism is constructed from an examination of channel symmetry using a dissimilarity metric 𝑑 on pairs of bidirectional channel magnitude responses |𝐻 AB (𝑓 )| and |𝐻 BA (𝑓 )|.…”
Section: Channel Reciprocity-based Detectionmentioning
confidence: 99%