Securing Emerging Wireless Systems: Lower-layer Approaches

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the lower-layer approaches as a foundation towards secure and reliable wireless systems. Whereas most of the references typically address cryptographic attacks by using conventional "network security" approches for securing wireless systems, the proposed book will be differentiated from the rest of the market by its focus on non-cryptographic attacks that cannot easily be addressed by using traditional methods, and further by presenting a collection of defense mechanisms that operate at the lower-layers of the protocol stack and can defend wireless systems before the effects of attacks propagate up to higher-level applications and services. The book will focus on fundamental security problems that involve properties unique to wireless systems, such as the characteristics of radio propagation, or the location of communicating entities, or the properties of the medium access control layer. Specifically, the book provides detection mechanisms and highlights defense strategies that cope with threats to wireless localization infrastructure, attacks on wireless networks that exploit entity identity (i.e. spoofing attacks), jamming and radio interference that can undermine the availability of wireless communications, and privacy threats where an adversary seeks to infer spatial and temporal contextual information surrounding wireless communications. Additionally, the authors explore new paradigms of physical layer security for wireless systems, which can support authentication and confidentiality services by exploiting fading properties unique to wireless communications.

Author(s): Yingying Chen, Wenyuan Xu, Wade Trappe, YanYong Zhang
Edition: 1st Edition. 2nd Printing.
Year: 2008

Language: English
Pages: 380

Contents......Page 12
Preface......Page 8
1. Introduction......Page 20
1.1 Book Overview......Page 22
I. Secure Localization......Page 28
2.1 Introduction......Page 30
2.2 Wireless Localization......Page 32
2.3 Secure Localization......Page 34
2.4 Location-based Access Control......Page 37
2.5 Coping with Identity Fraud......Page 38
2.6 Conclusion......Page 39
3.1 Introduction......Page 42
3.2 Localization Algorithms......Page 45
3.3 Conducting Signal Strength Attacks......Page 48
3.4 Measuring Attack Susceptibility......Page 51
3.5 Experimental Results......Page 55
3.6 Discussion about Hölder Metrics......Page 74
3.7 Conclusion......Page 75
4.1 Introduction......Page 78
4.2 Feasibility of Attacks......Page 79
4.3 Generalized Attack Detection Model......Page 82
4.4 Using Least Squares......Page 83
4.5 Distance In Signal Space......Page 88
4.6 Other Test Statistics......Page 93
4.7 Discussion......Page 96
4.8 Conclusion......Page 97
5.1 Introduction......Page 100
5.2 Robust Localization: Living with Bad Guys......Page 101
5.3 Robust Methods for Triangulation......Page 102
5.4 Robust Methods for RF-Based Fingerprinting......Page 111
5.5 Conclusion......Page 114
6.1 Introduction......Page 116
6.2 Overview of Inverted Sensor Networks......Page 117
6.3 Spatio-Temporal Access Control Model......Page 119
6.4 Centralized Mechanisms for STAC......Page 126
6.5 Decentralized Approach for STAC through Inverted Sensor Networks......Page 129
6.6 Discussion on the operation of inverted sensor networks......Page 136
6.7 Conclusion......Page 139
II. Defending Against Wireless Spoofing Attacks......Page 140
7.1 Introduction......Page 142
7.2 Strategy Overview......Page 143
7.3 Forge-resistant Relationships via Auxiliary Fields......Page 145
7.4 Forge-resistant Relationships via Intrinsic Properties......Page 154
7.5 Enhanced Detectors using Multi-Level Classification......Page 157
7.6 Experimental Validation on the ORBIT Wireless Testbed......Page 159
7.7 Conclusion......Page 171
8.1 Introduction......Page 174
8.2 Feasibility of Attacks......Page 175
8.3 Attack Detector......Page 178
8.5 Architecture Design......Page 182
8.6 Discussion......Page 188
8.7 Conclusion......Page 190
III. Defending Against Radio Interference......Page 192
9.1 Introduction......Page 194
9.2 Interference Case Studies......Page 195
9.3 Defense: Detection and Evasion......Page 206
9.4 Channel Surfing Overview......Page 208
9.5 Spatial Retreats......Page 214
9.6 Conclusion......Page 219
10.1 Introduction......Page 220
10.2 Theoretical Analysis on the Effectiveness of Jamming......Page 221
10.3 System Study on Jamming/Interference Models and their Effectiveness......Page 225
10.4 Conclusion......Page 231
11.1 Introduction......Page 234
11.2 Basic Statistics for Detecting Jamming Attacks and Radio Interference......Page 235
11.3 Jamming Detection with Consistency Checks......Page 243
11.4 Conclusion......Page 250
12.1 Introduction......Page 252
12.2 System Models......Page 253
12.3 Channel Surfing Overview......Page 255
12.4 Channel Surfing Strategies......Page 258
12.5 Sensor Testbed and Metrics......Page 268
12.6 Experimental Results......Page 273
12.7 Conclusion......Page 283
IV. Preserving Privacy in Wireless Networks......Page 284
13.1 Introduction......Page 286
13.2 Asset Monitoring Sensor Networks......Page 288
13.3 Privacy Protection for a Stationary Source......Page 292
13.4 Privacy Protection for a Mobile Source......Page 305
13.5 Conclusion......Page 308
14.1 Introduction......Page 310
14.2 Overview of Temporal Privacy in Sensor Networks......Page 311
14.3 Temporal Privacy Formulation......Page 314
14.4 Queuing Analysis of Privacy-Enhancing Buffering......Page 318
14.5 RCAD: Rate-Controlled Adaptive Delaying......Page 322
14.6 Evaluating RCAD Using Simulations......Page 323
14.7 Conclusion......Page 331
15.1 Introduction......Page 332
15.2 Alice, Bob and Eve Get Physical......Page 333
15.3 PHY-Enhanced Authentication......Page 335
15.4 PHY-Enhanced Confidentiality......Page 340
15.5 Experimental Validation......Page 345
15.6 Conclusion......Page 350
16. Concluding Remarks......Page 352
References......Page 356
C......Page 376
J......Page 377
P......Page 378
T......Page 379
Z......Page 380