• DocumentCode
    3777404
  • Title

    Identification and prevention of impersonation attack based on a new flag byte

  • Author

    Tang Shang; Li Yong Gui

  • Author_Institution
    PLA University of Science and Technology, College of Communications Engineering, Nanjing, China
  • Volume
    1
  • fYear
    2015
  • Firstpage
    972
  • Lastpage
    976
  • Abstract
    Security plays an important role in wireless communication. While the cryptographic system is widely used in wireless communication, recent trends shift attention to security in some new ways. In this study, we propose a new strategy about how to identify and defense the impersonation attacks. The strategy utilize the transmission data information to generate the differential flag byte, establishing the correlation of that current flag byte of transmission data frame was determined by the relevant parameter of last frame. After establishing the generating equation, we analyze the limitations of an attacker in time and space. It is shown that in the stable environment, the user can identify the attack by setting the appropriate threshold.
  • Keywords
    "Receivers","Wireless communication","Security","Physical layer","Signal to noise ratio","Jamming","Mathematical model"
  • Publisher
    ieee
  • Conference_Titel
    Computer Science and Network Technology (ICCSNT), 2015 4th International Conference on
  • Type

    conf

  • DOI
    10.1109/ICCSNT.2015.7490899
  • Filename
    7490899