Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








558 Hits in 6.9 sec

Secure Transmission against Pilot Spoofing and Phishing Attack

Anusha Ramprasad, Jayavarshini Thirumalai, Jhon Sneha, Arokia Sundaram, Manjana Karthikeyan
2018 Manjana Karthikeyan International Journal of Innovations & Advancement in Computer Science IJIACS   unpublished
Spoofing attack poses a serious threat as they represent a form of identity compromise.  ...  The prevention of these two attacks can be attained using NA Algorithm.  ...  The proposed system has an intention for detecting the pilot spoofing attack and minimizing its damages, a tendency to style a two way training based scheme is introduced.  ... 
fatcat:ekaliomv65h6fmjb2pz6swumum

Secure Packet Transmission Against Pilot Spoofing and Phishing Attack

B Eshwar, Gvs Rupesh
International Journal of Computer Technology & Applications   unpublished
With the intention of detecting the pilot spoofing attack and minimising its damages, we design a two-way training-based scheme.  ...  The pilot spoofing attack is one kind of active eavesdropping activities conducted by a malicious user during the channel training phase.  ...  spoofing attack based on the phase difference of MODULES FOR PILOT SPOOFING ATTACK: Cookie Management :- Where the attacker uses packet sniffing to read network traffic between two parties to steal  ... 
fatcat:22imsktpmrf5thnox64zzwuoja

Spatial spectrum approach for pilot spoofing attack detection in MIMO systems

Lina Ning, Bin Li, Xiang Wang, Xiaoming Liu, Chenglin Zhao
2021 ETRI Journal  
First, the spoofing attack in the uplink stage is detected by a threshold derived from the predefined false alarm based on the estimated spatial spectrum.  ...  In this study, a spatial spectrum method is proposed to cope with the pilot spoofing attack (PSA) problem by exploiting the of uplink-downlink channel reciprocity in time-division-duplex multiple-input  ...  The contributions of the present study can be summarized as follows: • The proposed scheme provides an SSM to detect Eve based on a two-way training method.  ... 
doi:10.4218/etrij.2019-0504 fatcat:fs3p237tv5gajipnci4dt5qkxq

A Survey on Impersonation Attack in Wireless Networks

R. Regan, J. Martin Leo Manickam
2017 International Journal of Security and Its Applications  
Impersonation attacks are also known as spoofing attacks. The attacker assumes the identification of one more node in the network, as a result receiving messages directed to the node it fakes.  ...  mechanisms, discuss various security protocol that prevent and detect impersonation attack in wireless network.  ...  In this paper, we have proposed a new detection method against such impersonation attacks using Bloom Filters and a Secret-Sharing-Scheme-based Dispersed Data Transfer method.  ... 
doi:10.14257/ijsia.2017.11.5.04 fatcat:sad6s7ki4ngsjhxjlpbxu5mnda

Detecting ADS-B Spoofing Attacks using Deep Neural Networks [article]

Xuhang Ying, Joanna Mazer, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran
2019 arXiv   pre-print
In this paper, we introduce SODA - a two-stage Deep Neural Network (DNN)-based spoofing detector for ADS-B that consists of a message classifier and an aircraft classifier.  ...  Our experimental results show that SODA detects ground-based spoofing attacks with a probability of 99.34%, while having a very small false alarm rate (i.e., 0.43%).  ...  We classify the ADS-B spoofing attacks into two categories: ground-based and aircraft-based.  ... 
arXiv:1904.09969v1 fatcat:bri3h5yngfepxf66tddafhdhm4

On Pilot Spoofing Attack in Massive MIMO Systems: Detection and Countermeasure

Weiyang Xu, Chang Yuan, Shengbo Xu, Hien Quoc Ngo, Wei Xiang
2020 IEEE Transactions on Information Forensics and Security  
Index Terms-Massive MIMO, physical layer security, channel estimation, pilot spoofing attack, secrecy rate. I.  ...  By exploiting the difference in channel estimation in two training phases, a double channel training based scheme is proposed to combat the PSA and uplink jamming simultaneously [24] .  ...  For pilot matrix X, its (k, i)-th entry satisfies E{|x k,i | 2 } = 1. While for the modifiedX = ΞX, whereX = [X A , WX B ], its (k, i)-th entry satisfies Given (72) and (73) , (9) is attainable.  ... 
doi:10.1109/tifs.2020.3036805 fatcat:n2fiww46w5eojdientpuydjqvi

Pilot Spoofing Attack by Multiple Eavesdroppers [article]

Ke-Wen Huang, Hui-Ming Wang, Yongpeng Wu, Robert Schober
2018 arXiv   pre-print
In this paper, we investigate the design of a pilot spoofing attack (PSA) carried out by multiple single-antenna eavesdroppers (Eves) in a downlink time-division duplex (TDD) system, where a multiple antenna  ...  The two resulting optimization problems can be unified into a more general non-convex optimization problem, and we propose an efficient algorithm based on the minorization-maximization (MM) method and  ...  In [27] , the authors proposed a two-way training scheme to detect the PSA.  ... 
arXiv:1807.08905v1 fatcat:vj33ffvkzbcvhf6nt7ya4bc6eq

A Survey of Security in UAVs and FANETs: Issues, Threats, Analysis of Attacks, and Solutions [article]

Ozlem Ceviz, Pinar Sadioglu, Sevil Sen
2023 arXiv   pre-print
Hence, this study transcends a standard review by integrating an attack analysis based on extensive simulations.  ...  This survey seeks to provide a comprehensive perspective on security within the domain of UAVs and FANETs.  ...  The signature-based method was tested against two known attack variants and a new type.  ... 
arXiv:2306.14281v3 fatcat:7md47g72hna7rkkguvs4z6jmgu

Multiple Antennas Secure Transmission under Pilot Spoofing and Jamming Attack [article]

Hui-Ming Wang, Ke-Wen Huang, Theodoros A. Tsiftsis
2018 arXiv   pre-print
In this paper, we propose a random channel training (RCT) based secure downlink transmission framework for a time division duplex (TDD) multiple antennas base station (BS).  ...  However, channel training procedure is vulnerable to the pilot spoofing attack (PSA) or pilot jamming attack (PJA) by an active eavesdropper (Eve), which inevitably results in severe private information  ...  In fact, intelligent active Eve can greatly improve its wiretapping performance by attacking the channel training phase of legitimate links, e.g., pilot spoofing attack (PSA) and pilot jamming attack (  ... 
arXiv:1801.04104v1 fatcat:ecahafpvzfbttefvyzpkwlb4vm

A Product Channel Attack to Wireless Physical Layer Security [article]

Gonzalo J. Anaya-Lopez, Gerardo Gomez, F. Javier Lopez-Martinez
2020 arXiv   pre-print
This technique is based on the transmission of a slowly-varying random symbol by the eavesdropper during its uplink transmission, so that the equivalent fading channel observed at the base station (BS)  ...  We propose a novel attack that compromises the physical layer security of downlink (DL) communications in wireless systems.  ...  The BS operates in two modes for DL transmission, referred to as standard and secure modes.  ... 
arXiv:2007.08162v1 fatcat:j6hilz5emzhqpojtn2f22v6tfa

A Survey on Security Attacks and Defense Techniques for Connected and Autonomous Vehicles [article]

Minh Pham, Kaiqi Xiong
2020 arXiv   pre-print
However, CAVs will face significant security challenges because many of their components are vulnerable to attacks, and a successful attack on a CAV may have significant impacts on other CAVs and infrastructures  ...  This survey first presents a comprehensive overview of security attacks and their corresponding countermeasures on CAVs.  ...  Alimohammadi et al. (2015) [168] proposed a secure protocol based on a light weight group signature scheme.  ... 
arXiv:2007.08041v1 fatcat:enczuyzanjhbpk4wx33eu75uay

Shoulder Surfing attack in graphical password authentication [article]

Arash Habibi Lashkari, Samaneh Farmand, Dr. Omar Bin Zakaria, Dr. Rosli Saleh
2009 arXiv   pre-print
In this paper we will present a survey on graphical password schemes from 2005 till 2009 which are proposed to be resistant against shoulder surfing attacks.  ...  To overcome the vulnerabilities of traditional methods, visual or graphical password schemes have been developed as possible alternative solutions to text based scheme.  ...  ACKNOWLEDGMENT We would like to express our appreciation to our parents, all the teachers and lecturers who help us to understand the importance of knowledge and show us the best way to gain it.  ... 
arXiv:0912.0951v1 fatcat:p64wazlpxjderm65icddxswo7i

Automated Labeling and Learning for Physical Layer Authentication against Clone Node and Sybil Attacks in Industrial Wireless Edge Networks

Songlin Chen, Zhibo Pang, Hong Wen, Kan Yu, Tengyue Zhang, Yueming Lu
2020 IEEE Transactions on Industrial Informatics  
In this article, a scheme to detect both clone and Sybil attacks by using channel-based machine learning is proposed.  ...  Specifically, by combining with edge devices, we apply a threshold detection method based on channel differences to provide offline training sample sets with labels for the machine learning algorithm,  ...  Subsequently, a large number of cloned nodes are deployed by the attacker in the industrial wireless network, which seriously threaten the industrial network security in a way of amending routing information  ... 
doi:10.1109/tii.2020.2963962 fatcat:zhpzzmka45ckjjkgzpas4oot34

Random-Training-Assisted Pilot Spoofing Detection and Secure Transmission [article]

Xiaowen Tian, Ming Li, Qian Liu
2016 arXiv   pre-print
If the existence of the pilot spoofing attack is identified, a zero-forcing (ZF)-based secure transmission scheme is proposed to protect the confidential information from the active eavesdropper.  ...  Extensive simulation results demonstrate that the proposed RTA scheme can achieve efficient pilot spoofing detection, accurate channel estimation, and secure transmission.  ...  To this end, in [24] a two-way training detector was proposed to not only detect the spoofing attack but also avoid the information leakage by a secure transmission scheme.  ... 
arXiv:1609.00225v1 fatcat:hnw35z6jofddhhdkiss5mslxpe

Secret key generation based on private pilot under man-in-the-middle attack

Yu Huang, Liang Jin, Na Li, Zhou Zhong, Xiaoming Xu
2017 Science China Information Sciences  
Secret key generation based on private pilot under man-in-the-middle attack.  ...  Keywords private pilot, man-in-the-middle attack, secret key generation, physical layer security Citation Huang Y, Jin L, Li N, et al.  ...  Thus, the proposed SKG scheme with private pilot is secure against passive eavesdroppers.  ... 
doi:10.1007/s11432-017-9195-3 fatcat:mfx4n535szcjxk34pjqbydlsim
« Previous Showing results 1 — 15 out of 558 results