A survey: Spoofing attacks in physical layer security

Increasing demand on wireless communications also increases the issues related to communication security. Among different security solutions, physical layer security have recently been gaining many interests by the researchers. In this paper, a survey study is provided in one of the most critical attacks, namely spoofing attacks. When a legitimate transmitter stops sending a signal to a legitimate receiver, the spoofer starts to transmit a deceiving signal to the same legitimate receiver by acting as if it is the legitimate transmitter. The aim of the spoofer is to deceive the legitimate receiver. Within this concept, we first review the detection methods and countermeasures to spoofing attacks. To be able to evaluate the proposed techniques, we discuss different metrics provided in the literature. Then, we conclude the paper with the open issues.

[1]  A. Bachorek,et al.  Enabling authentic transmissions in WSNs — turning jamming against the attacker , 2008, 2008 4th Workshop on Secure Network Protocols.

[2]  Kevin Fu,et al.  They can hear your heartbeats: non-invasive security for implantable medical devices , 2011, SIGCOMM.

[3]  Kouichi Sakurai,et al.  A Differential Game Approach to Mitigating Primary User Emulation Attacks in Cognitive Radio Networks , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.

[4]  Pardeep Kumar,et al.  Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.

[5]  Ryan W. Thomas,et al.  A Bayesian Game Analysis of Emulation Attacks in Dynamic Spectrum Access Networks , 2010, 2010 IEEE Symposium on New Frontiers in Dynamic Spectrum (DySPAN).

[6]  Jeffrey H. Reed,et al.  Defense against Primary User Emulation Attacks in Cognitive Radio Networks , 2008, IEEE Journal on Selected Areas in Communications.

[7]  Larry J. Greenstein,et al.  Channel-based spoofing detection in frequency-selective rayleigh channels , 2009, IEEE Transactions on Wireless Communications.

[8]  Ting Wang,et al.  Analysis on perfect location spoofing attacks using beamforming , 2013, 2013 Proceedings IEEE INFOCOM.

[9]  Meng Wu,et al.  A secure authentication scheme for integration of cellular networks and MANETs , 2008, 2008 International Conference on Neural Networks and Signal Processing.

[10]  Song Han,et al.  Cognitive radio network security: A survey , 2012, J. Netw. Comput. Appl..

[11]  Zhu Han,et al.  Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems—Part II: Unknown Channel Statistics , 2010, IEEE Transactions on Wireless Communications.

[12]  Richard P. Martin,et al.  The limits of localization using signal strength: a comparative study , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..

[13]  H. T. Kung,et al.  Determining RF angle of arrival using COTS antenna arrays: A field evaluation , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.

[14]  Petri Mähönen,et al.  Understanding conditions that lead to emulation attacks in dynamic spectrum access , 2011, IEEE Communications Magazine.

[15]  Xianbin Wang,et al.  A two dimensional quantization algorithm for CIR-based physical layer authentication , 2013, 2013 IEEE International Conference on Communications (ICC).

[16]  J. Sobana,et al.  Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2014 .

[17]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[18]  Jie Xiong,et al.  SecureAngle: improving wireless security using angle-of-arrival information , 2010, Hotnets-IX.

[19]  Zhu Han,et al.  Dogfight in Spectrum: Combating Primary User Emulation Attacks in Cognitive Radio Systems, Part I: Known Channel Statistics , 2010, IEEE Transactions on Wireless Communications.

[20]  Richard P. Martin,et al.  Detecting and Localizing Wireless Spoofing Attacks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[21]  李辉,et al.  TDOA-based Sybil attack detection scheme for wireless sensor networks , 2008 .

[22]  K.J.R. Liu,et al.  Signal processing techniques in network-aided positioning: a survey of state-of-the-art positioning designs , 2005, IEEE Signal Processing Magazine.

[23]  Shamik Sengupta,et al.  Primary user emulation attack in dynamic spectrum access networks: a game-theoretic approach , 2012, IET Commun..

[24]  Sneha Kumar Kasera,et al.  Advancing wireless link signatures for location distinction , 2008, MobiCom '08.

[25]  Rosdiadee Nordin,et al.  Recent Advances in Wireless Indoor Localization Techniques and System , 2013, J. Comput. Networks Commun..

[26]  Hüseyin Arslan,et al.  Impersonation attack identification for secure communication , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[27]  S. Anand,et al.  An Analytical Model for Primary User Emulation Attacks in Cognitive Radio Networks , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[28]  Murat Demirbas,et al.  An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).

[29]  Mario Gerla,et al.  Physical layer security in wireless smart grid , 2012, IEEE Communications Magazine.