Cognitive Radio from Hell: Flipping Attack on Direct-Sequence Spread Spectrum

04/03/2018
by   J. Harshan, et al.
0

In this paper, we introduce a strong adversarial attack, referred to as the flipping attack, on Direct-Sequence Spread Spectrum (DSSS) systems. In this attack, the attacker, which is appropriately positioned between the transmitter and the receiver, instantaneously flips the transmitted symbols in the air at 50 jamming attack, this attack, when perfectly executed, cannot be detected at the receiver using signal-to-noise-ratio measurements. However, this attack necessitates the attacker to perfectly know the realizations of all the channels in the model. We first introduce the consequences of the flipping attack on narrowband frequency-flat channels, and subsequently discuss its feasibility in wideband frequency-selective channels. From the legitimate users' perspective, we present a method to detect this attack and also propose heuristics to improve the error-performance under the attack. We emphasize that future cyber-physical systems that employ DSSS should design transceivers to detect the proposed flipping attack, and then apply appropriate countermeasures.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/26/2019

Spectrum Data Poisoning with Adversarial Deep Learning

Machine learning has been widely applied in wireless communications. How...
research
08/06/2018

Signal Jamming Attacks Against Communication-Based Train Control: Attack Impact and Countermeasure

We study the impact of signal jamming attacks against the communication ...
research
06/26/2022

Don't Look Up: Ubiquitous Data Exfiltration Pathways in Commercial Spaces

We show that as a side effect of building code requirements, almost all ...
research
03/27/2019

Convolution Attack on Frequency-Hopping by Full-Duplex Radios

We propose a new adversarial attack on frequency-hopping based wireless ...
research
04/10/2018

PowerHammer: Exfiltrating Data from Air-Gapped Computers through Power Lines

In this paper we provide an implementation, evaluation, and analysis of ...
research
12/20/2021

TFDPM: Attack detection for cyber-physical systems with diffusion probabilistic models

With the development of AIoT, data-driven attack detection methods for c...
research
07/10/2021

Attack-Aware Synchronization-Free Data Timestamping in LoRaWAN

Low-power wide-area network technologies such as LoRaWAN are promising f...

Please sign up or login with your details

Forgot password? Click here to reset