On physical-layer identification of wireless devices

B Danev, D Zanetti, S Capkun - ACM Computing Surveys (CSUR), 2012 - dl.acm.org
Physical-layer device identification aims at identifying wireless devices during radio
communication by exploiting unique characteristics of their analog (radio) circuitry. This work …

[PDF][PDF] Relay attacks on passive keyless entry and start systems in modern cars

A Francillon, B Danev… - Proceedings of the …, 2011 - research-collection.ethz.ch
We demonstrate relay attacks on Passive Keyless Entry and Start (PKES) systems used in
modern cars. We build two efficient and inexpensive attack realizations, wired and wireless …

Secure vehicular communication systems: design and architecture

P Papadimitratos, L Buttyan, T Holczer… - IEEE …, 2008 - ieeexplore.ieee.org
Significant developments have taken place over the past few years in the area of vehicular
communication systems. Now, it is well understood in the community that security and …

Enabling cyber‐physical communication in 5G cellular networks: challenges, spatial spectrum sensing, and cyber‐security

R Atat, L Liu, H Chen, J Wu, H Li… - IET Cyber‐Physical …, 2017 - Wiley Online Library
Cyber‐physical systems (CPS) help create new services and applications by revolutionising
our world in different fields through their tight interactions and automated decisions. This is …

Securearray: Improving wifi security with fine-grained physical-layer information

J **ong, K Jamieson - Proceedings of the 19th annual international …, 2013 - dl.acm.org
Despite the important role that WiFi networks play in home and enterprise networks they are
relatively weak from a security standpoint. With easily available directional antennas …

On attacker models and profiles for cyber-physical systems

M Rocchetto, NO Tippenhauer - … 26-30, 2016, Proceedings, Part II 21, 2016 - Springer
Attacker models are a fundamental part of research on security of any system. For different
application scenarios, suitable attacker models have to be chosen to allow comprehensive …

Neighbor discovery in traditional wireless networks and cognitive radio networks: Basics, taxonomy, challenges and future research directions

AA Khan, MH Rehmani, Y Saleem - Journal of Network and Computer …, 2015 - Elsevier
Cognitive radio network is designed to opportunistically exploit the licensed band. To deploy
a cognitive radio network, nodes need to perform the neighbor discovery process in order to …

A survey of wormhole-based attacks and their countermeasures in wireless sensor networks

M Meghdadi, S Ozdemir, I Güler - IETE technical review, 2011 - Taylor & Francis
In wormhole attacks, attackers create a low-latency link between two points in the network.
This can be achieved by either compromising two or more sensor nodes of the network or …

Channel-based physical layer authentication

C Pei, N Zhang, XS Shen… - 2014 IEEE Global …, 2014 - ieeexplore.ieee.org
In this paper, we study channel-based authentication, where the receiver can identify and
authenticate the senders through channel vectors estimated from their frames. The …

Cooperative location privacy in vehicular networks: Why simple mix zones are not enough

M Khodaei, P Papadimitratos - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
Vehicular communications disclose rich information about the vehicles and their
whereabouts. Pseudonymous authentication secures communication while enhancing user …