dc.contributor.author |
Tayebi, A |
en |
dc.contributor.author |
Berber, Stevan |
en |
dc.contributor.author |
Swain, Akshya |
en |
dc.coverage.spatial |
Massey University, New Zealand |
en |
dc.date.accessioned |
2017-08-03T00:32:23Z |
en |
dc.date.issued |
2016-03-21 |
en |
dc.identifier.citation |
2015 9th International Conference on Sensing Technology (ICST 2015), Massey University, New Zealand, 08 Dec 2015 - 10 Dec 2015. Proceedings of the International Conference on Sensing Technology, ICST. IEEE. 128-132. 21 Mar 2016 |
en |
dc.identifier.isbn |
9781479963140 |
en |
dc.identifier.issn |
2156-8065 |
en |
dc.identifier.uri |
http://hdl.handle.net/2292/34728 |
en |
dc.description.abstract |
This study proposes, a new impersonation attack, called Syncim, against chip synchronization in wireless sensor network. In this attack, the adversary tries to impersonate the pilot signal. Thus, the victim node would be synchronized with the adversary instead of the legitimate transmitter. When this attack is successfully performed, the adversary can hijack the connection and perform a man in the middle attack. The effects of this attack are mathematically analyzed and the minimum signal power required by the adversary to perform Syncim is derived. It has been shown that in order to perform this attack, the delay between the adversity signal and the legitimate transmitter should be less than half a chip duration. |
en |
dc.publisher |
IEEE |
en |
dc.relation.ispartof |
2015 9th International Conference on Sensing Technology (ICST 2015) |
en |
dc.relation.ispartofseries |
Proceedings of the International Conference on Sensing Technology, ICST |
en |
dc.rights |
Items in ResearchSpace are protected by copyright, with all rights reserved, unless otherwise indicated. Previously published items are made available in accordance with the copyright policy of the publisher. |
en |
dc.rights.uri |
https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm |
en |
dc.title |
Syncim: A new impersonation attack against chip synchronization in WSN |
en |
dc.type |
Conference Item |
en |
dc.identifier.doi |
10.1109/ICSensT.2015.7438377 |
en |
pubs.begin-page |
128 |
en |
dc.rights.holder |
Copyright: IEEE |
en |
pubs.end-page |
132 |
en |
pubs.finish-date |
2015-12-10 |
en |
pubs.publication-status |
Published |
en |
pubs.start-date |
2015-12-08 |
en |
dc.rights.accessrights |
http://purl.org/eprint/accessRights/RestrictedAccess |
en |
pubs.subtype |
Proceedings |
en |
pubs.elements-id |
530915 |
en |
pubs.org-id |
Engineering |
en |
pubs.org-id |
Department of Electrical, Computer and Software Engineering |
en |
dc.identifier.eissn |
2156-8073 |
en |
pubs.record-created-at-source-date |
2017-08-03 |
en |