检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:王少禹 黄开枝[1] 许晓明 马克明[1] 陈亚军[1] WANG Shaoyu;HUANG Kaizhi;XU Xiaoming;MA Keming;CHEN Yajun(Information Engineering University,Zhengzhou 450001,China)
出 处:《电子与信息学报》2021年第11期3141-3148,共8页Journal of Electronics & Information Technology
基 金:国家自然科学基金(61701538,61871404,61521003)。
摘 要:现有物理层认证机制依赖合法信道状态信息(CSI)的私有性,一旦攻击者能够操控或窃取合法信道,物理层认证机制就会面临被攻破的威胁。针对上述缺陷,该文提出一种中间人导频攻击方法(MITM),通过控制合法双方的信道测量过程对物理层认证机制进行攻击。首先对中间人导频攻击系统进行建模,并给出一种中间人导频攻击的渐进无感接入策略,该策略允许攻击者能够顺利接入合法通信双方;在攻击者顺利接入后,可对两种基本的物理层认证机制发起攻击:针对基于CSI的比较认证机制,可以实施拒绝服务攻击和仿冒接入攻击;针对基于CSI的加密认证机制,可以实现对信道信息的窃取,从而进一步破解认证向量。该攻击方法适用于一般的公开导频无线通信系统,要求攻击者能够对合法双方的导频发送过程进行同步。仿真分析验证了渐进无感接入策略、拒绝服务攻击、仿冒接入攻击、窃取信道信息并破解认证向量等多种攻击方式的有效性。The existing physical layer authentication mechanism relies on the privacy of the legitimate channel.Once the attacker can manipulate or obtain legitimate channel information,the physical layer authentication mechanism will face the threat of being compromised.To overcome the above-mentioned shortcomings,a Man-In-The-Middle(MITM)pilot attack method is proposed,which attacks the physical layer authentication mechanism by controlling the channel measurement process of the legitimate parties.Firstly,the man-in-themiddle pilot attack system is modeled,and a progressive and non-sense access strategy for MITM pilot attack is given.This strategy allows the attacker to access smoothly legitimate communication.After the attacker accesses successfully,he can launch attacks on two basic physical layer authentication mechanisms:For CSIbased comparative authentication mechanisms,denial of service attacks and counterfeit access attacks can be implemented;For the CSI-based encryption authentication mechanism,the channel information can be stolen,thereby further cracking the authentication vector.This attack method is suitable for general public pilot wireless communication systems,and requires the attacker to be able to synchronize the pilot sending process of the legitimate two parties.Simulation analysis verifies the effectiveness of multiple attack methods such as the progressive and non-sense access strategy,denial of service attack,counterfeit access attack,or cracking authentication vector.
分 类 号:TN911.4[电子电信—通信与信息系统] TN915.08[电子电信—信息与通信工程]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.222.136.245