DocumentCode
686154
Title
Impersonation attack identification for secure communication
Author
Yilmaz, Mustafa Harun ; Arslan, Huseyin
Author_Institution
Dept. of Electr. Eng., Univ. of South Florida, Tampa, FL, USA
fYear
2013
fDate
9-13 Dec. 2013
Firstpage
1275
Lastpage
1279
Abstract
Security possesses a significant role in wireless communication. While the studies about secure communication are performed through the upper layers, recent trends shift attention to security in physical layer. In this study, we propose a solution about how to identify the impersonation attacks. If illegitimate transmitter is further away from the receiver when compared to legitimate transmitter, we can detect the spoofing signal by utilizing the hypothesis test which can be carried out depending on the power delay profile of the channel. After setting the hypothesis test, we look at the probability of detection and probability of false alarm of the received signal. It is shown that if the impersonation attack is carried out from further distance, it can be identified with high probability of detection.
Keywords
radio receivers; radio transmitters; radiocommunication; telecommunication security; hypothesis test; illegitimate transmitter; impersonation attack identification; physical layer; receiver; secure communication; wireless communication; Delays; Physical layer; Receivers; Security; Signal to noise ratio; Transmitters; Wireless communication; Impersonation attack; physical layer security; power delay profile; probability of detection; probability of false alarm;
fLanguage
English
Publisher
ieee
Conference_Titel
Globecom Workshops (GC Wkshps), 2013 IEEE
Conference_Location
Atlanta, GA
Type
conf
DOI
10.1109/GLOCOMW.2013.6825169
Filename
6825169
Link To Document