• DocumentCode
    686154
  • Title

    Impersonation attack identification for secure communication

  • Author

    Yilmaz, Mustafa Harun ; Arslan, Huseyin

  • Author_Institution
    Dept. of Electr. Eng., Univ. of South Florida, Tampa, FL, USA
  • fYear
    2013
  • fDate
    9-13 Dec. 2013
  • Firstpage
    1275
  • Lastpage
    1279
  • Abstract
    Security possesses a significant role in wireless communication. While the studies about secure communication are performed through the upper layers, recent trends shift attention to security in physical layer. In this study, we propose a solution about how to identify the impersonation attacks. If illegitimate transmitter is further away from the receiver when compared to legitimate transmitter, we can detect the spoofing signal by utilizing the hypothesis test which can be carried out depending on the power delay profile of the channel. After setting the hypothesis test, we look at the probability of detection and probability of false alarm of the received signal. It is shown that if the impersonation attack is carried out from further distance, it can be identified with high probability of detection.
  • Keywords
    radio receivers; radio transmitters; radiocommunication; telecommunication security; hypothesis test; illegitimate transmitter; impersonation attack identification; physical layer; receiver; secure communication; wireless communication; Delays; Physical layer; Receivers; Security; Signal to noise ratio; Transmitters; Wireless communication; Impersonation attack; physical layer security; power delay profile; probability of detection; probability of false alarm;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Globecom Workshops (GC Wkshps), 2013 IEEE
  • Conference_Location
    Atlanta, GA
  • Type

    conf

  • DOI
    10.1109/GLOCOMW.2013.6825169
  • Filename
    6825169