Show simple item record

dc.contributor.authorSchulz, Matthias
dc.contributor.authorLoch, Adrian 
dc.contributor.authorHollick, Matthias 
dc.date.accessioned2021-07-13T09:27:05Z
dc.date.available2021-07-13T09:27:05Z
dc.date.issued2016-07-18
dc.identifier.urihttp://hdl.handle.net/20.500.12761/229
dc.description.abstractAfter being widely studied in theory, physical layer security schemes are getting closer to enter the consumer market. Still, a thorough practical analysis of their resilience against attacks is missing. In this work, we use software-defined radios to implement such a physical layer security scheme, namely, orthogonal blinding. To this end, we use orthogonal frequency-division multiplexing (OFDM) as a physical layer, similarly to WiFi. In orthogonal blinding, a multi-antenna transmitter overlays the data it transmits with noise in such a way that every node except the intended receiver is disturbed by the noise. Still, our known-plaintext attack can extract the data signal at an eavesdropper by means of an adaptive filter trained using a few known data symbols. Our demonstrator illustrates the iterative training process at the symbol level, thus showing the practicability of the attack.
dc.titleDemonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems
dc.typeconference object
dc.conference.date18-20 July 2016
dc.conference.placeDarmstadt, Germany
dc.conference.titleThe 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2016)*
dc.event.typeconference
dc.pres.typedemo
dc.subject.keywordPhysical layer security
dc.subject.keywordorthogonal blinding
dc.subject.keywordknown-plaintext attack
dc.description.refereedTRUE
dc.description.statuspub
dc.eprint.idhttp://eprints.networks.imdea.org/id/eprint/1345


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record