Syncim: A new impersonation attack against chip synchronization in WSN

Show simple item record

dc.contributor.author Tayebi, A en
dc.contributor.author Berber, Stevan en
dc.contributor.author Swain, Akshya en
dc.coverage.spatial Massey University, New Zealand en
dc.date.accessioned 2017-08-03T00:32:23Z en
dc.date.issued 2016-03-21 en
dc.identifier.citation 2015 9th International Conference on Sensing Technology (ICST 2015), Massey University, New Zealand, 08 Dec 2015 - 10 Dec 2015. Proceedings of the International Conference on Sensing Technology, ICST. IEEE. 128-132. 21 Mar 2016 en
dc.identifier.isbn 9781479963140 en
dc.identifier.issn 2156-8065 en
dc.identifier.uri http://hdl.handle.net/2292/34728 en
dc.description.abstract This study proposes, a new impersonation attack, called Syncim, against chip synchronization in wireless sensor network. In this attack, the adversary tries to impersonate the pilot signal. Thus, the victim node would be synchronized with the adversary instead of the legitimate transmitter. When this attack is successfully performed, the adversary can hijack the connection and perform a man in the middle attack. The effects of this attack are mathematically analyzed and the minimum signal power required by the adversary to perform Syncim is derived. It has been shown that in order to perform this attack, the delay between the adversity signal and the legitimate transmitter should be less than half a chip duration. en
dc.publisher IEEE en
dc.relation.ispartof 2015 9th International Conference on Sensing Technology (ICST 2015) en
dc.relation.ispartofseries Proceedings of the International Conference on Sensing Technology, ICST en
dc.rights Items in ResearchSpace are protected by copyright, with all rights reserved, unless otherwise indicated. Previously published items are made available in accordance with the copyright policy of the publisher. en
dc.rights.uri https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm en
dc.title Syncim: A new impersonation attack against chip synchronization in WSN en
dc.type Conference Item en
dc.identifier.doi 10.1109/ICSensT.2015.7438377 en
pubs.begin-page 128 en
dc.rights.holder Copyright: IEEE en
pubs.end-page 132 en
pubs.finish-date 2015-12-10 en
pubs.publication-status Published en
pubs.start-date 2015-12-08 en
dc.rights.accessrights http://purl.org/eprint/accessRights/RestrictedAccess en
pubs.subtype Proceedings en
pubs.elements-id 530915 en
pubs.org-id Engineering en
pubs.org-id Department of Electrical, Computer and Software Engineering en
dc.identifier.eissn 2156-8073 en
pubs.record-created-at-source-date 2017-08-03 en


Files in this item

There are no files associated with this item.

Find Full text

This item appears in the following Collection(s)

Show simple item record

Share

Search ResearchSpace


Browse

Statistics