Wireless Spoofing-Attack Prevention Using Radio-Propagation Characteristics

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

抄録

A spoofing attack is a critical issue in wireless communication in embedded systems in which a malicious transmitter outside a system attempts to be genuine. As a countermeasure against this, we propose a device-authentication method based on position identification using radio-propagation characteristics (RPCs). Since RPCs are natural phenomena, this method does not depend on information processing such as encryption technology. We call the space from which attacks achieve success "attack space". By formulating the relationship between combinations of transceivers and the attack space, this method can be used in embedded systems. In this research, we consider two RPCs, the received signal strength ratio (RSSR) and the time difference of arrival (TDoA), and construct the attack-space model which use these RPCs simultaneously for preventing wireless spoofing-attacks. We explain the results of a validity evaluation for the proposed model based on radio-wave-propagation simulation assuming free space and a noisy environment.

元の言語英語
ホスト出版物のタイトルProceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017
出版者Institute of Electrical and Electronics Engineers Inc.
ページ502-510
ページ数9
ISBN(電子版)9781538619551
DOI
出版物ステータス出版済み - 3 29 2018
イベント15th IEEE International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017 - Orlando, 米国
継続期間: 11 6 201711 11 2017

出版物シリーズ

名前Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017
2018-January

その他

その他15th IEEE International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017
米国
Orlando
期間11/6/1711/11/17

Fingerprint

Radio transmission
Radio
Embedded systems
Space Simulation
Radio Waves
Radio waves
Automatic Data Processing
Transceivers
Reproducibility of Results
Wave propagation
Authentication
Cryptography
Transmitters
Technology
Equipment and Supplies
Communication
Research

All Science Journal Classification (ASJC) codes

  • Safety, Risk, Reliability and Quality
  • Health Informatics
  • Artificial Intelligence
  • Computer Networks and Communications
  • Hardware and Architecture
  • Computer Science Applications
  • Information Systems

これを引用

Sonoyama, M., Ono, T., Muta, O., Kanaya, H., & Koji, I. (2018). Wireless Spoofing-Attack Prevention Using Radio-Propagation Characteristics. : Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017 (pp. 502-510). (Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017; 巻数 2018-January). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.94

Wireless Spoofing-Attack Prevention Using Radio-Propagation Characteristics. / Sonoyama, Mihiro; Ono, Takatsugu; Muta, Osamu; Kanaya, Haruichi; Koji, Inoue.

Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017. Institute of Electrical and Electronics Engineers Inc., 2018. p. 502-510 (Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017; 巻 2018-January).

研究成果: 著書/レポートタイプへの貢献会議での発言

Sonoyama, M, Ono, T, Muta, O, Kanaya, H & Koji, I 2018, Wireless Spoofing-Attack Prevention Using Radio-Propagation Characteristics. : Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017. Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017, 巻. 2018-January, Institute of Electrical and Electronics Engineers Inc., pp. 502-510, 15th IEEE International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017, Orlando, 米国, 11/6/17. https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.94
Sonoyama M, Ono T, Muta O, Kanaya H, Koji I. Wireless Spoofing-Attack Prevention Using Radio-Propagation Characteristics. : Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017. Institute of Electrical and Electronics Engineers Inc. 2018. p. 502-510. (Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017). https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2017.94
Sonoyama, Mihiro ; Ono, Takatsugu ; Muta, Osamu ; Kanaya, Haruichi ; Koji, Inoue. / Wireless Spoofing-Attack Prevention Using Radio-Propagation Characteristics. Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017. Institute of Electrical and Electronics Engineers Inc., 2018. pp. 502-510 (Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017).
@inproceedings{732ed56dbaf841f3acb97e5ab2fc2f39,
title = "Wireless Spoofing-Attack Prevention Using Radio-Propagation Characteristics",
abstract = "A spoofing attack is a critical issue in wireless communication in embedded systems in which a malicious transmitter outside a system attempts to be genuine. As a countermeasure against this, we propose a device-authentication method based on position identification using radio-propagation characteristics (RPCs). Since RPCs are natural phenomena, this method does not depend on information processing such as encryption technology. We call the space from which attacks achieve success {"}attack space{"}. By formulating the relationship between combinations of transceivers and the attack space, this method can be used in embedded systems. In this research, we consider two RPCs, the received signal strength ratio (RSSR) and the time difference of arrival (TDoA), and construct the attack-space model which use these RPCs simultaneously for preventing wireless spoofing-attacks. We explain the results of a validity evaluation for the proposed model based on radio-wave-propagation simulation assuming free space and a noisy environment.",
author = "Mihiro Sonoyama and Takatsugu Ono and Osamu Muta and Haruichi Kanaya and Inoue Koji",
year = "2018",
month = "3",
day = "29",
doi = "10.1109/DASC-PICom-DataCom-CyberSciTec.2017.94",
language = "English",
series = "Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "502--510",
booktitle = "Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017",
address = "United States",

}

TY - GEN

T1 - Wireless Spoofing-Attack Prevention Using Radio-Propagation Characteristics

AU - Sonoyama, Mihiro

AU - Ono, Takatsugu

AU - Muta, Osamu

AU - Kanaya, Haruichi

AU - Koji, Inoue

PY - 2018/3/29

Y1 - 2018/3/29

N2 - A spoofing attack is a critical issue in wireless communication in embedded systems in which a malicious transmitter outside a system attempts to be genuine. As a countermeasure against this, we propose a device-authentication method based on position identification using radio-propagation characteristics (RPCs). Since RPCs are natural phenomena, this method does not depend on information processing such as encryption technology. We call the space from which attacks achieve success "attack space". By formulating the relationship between combinations of transceivers and the attack space, this method can be used in embedded systems. In this research, we consider two RPCs, the received signal strength ratio (RSSR) and the time difference of arrival (TDoA), and construct the attack-space model which use these RPCs simultaneously for preventing wireless spoofing-attacks. We explain the results of a validity evaluation for the proposed model based on radio-wave-propagation simulation assuming free space and a noisy environment.

AB - A spoofing attack is a critical issue in wireless communication in embedded systems in which a malicious transmitter outside a system attempts to be genuine. As a countermeasure against this, we propose a device-authentication method based on position identification using radio-propagation characteristics (RPCs). Since RPCs are natural phenomena, this method does not depend on information processing such as encryption technology. We call the space from which attacks achieve success "attack space". By formulating the relationship between combinations of transceivers and the attack space, this method can be used in embedded systems. In this research, we consider two RPCs, the received signal strength ratio (RSSR) and the time difference of arrival (TDoA), and construct the attack-space model which use these RPCs simultaneously for preventing wireless spoofing-attacks. We explain the results of a validity evaluation for the proposed model based on radio-wave-propagation simulation assuming free space and a noisy environment.

UR - http://www.scopus.com/inward/record.url?scp=85048139640&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85048139640&partnerID=8YFLogxK

U2 - 10.1109/DASC-PICom-DataCom-CyberSciTec.2017.94

DO - 10.1109/DASC-PICom-DataCom-CyberSciTec.2017.94

M3 - Conference contribution

T3 - Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017

SP - 502

EP - 510

BT - Proceedings - 2017 IEEE 15th International Conference on Dependable, Autonomic and Secure Computing, 2017 IEEE 15th International Conference on Pervasive Intelligence and Computing, 2017 IEEE 3rd International Conference on Big Data Intelligence and Computing and 2017 IEEE Cyber Science and Technology Congress, DASC-PICom-DataCom-CyberSciTec 2017

PB - Institute of Electrical and Electronics Engineers Inc.

ER -