Physical Layer Telecommunications Security Issue 1.0 PDF
Physical Layer Telecommunications Security Issue 1.0 PDF
Telecommunications
Security
Knowledge Area
Issue 1.0
Srdjan Čapkun ETH Zurich
EDITOR
George Danezis University College London
Awais Rashid University of Bristol
REVIEWERS
Robert Piechocki University of Bristol
Kasper Rasmussen University of Oxford
The Cyber Security Body Of Knowledge
www.cybok.org
COPYRIGHT
© Crown Copyright, The National Cyber Security Centre 2019. This information is licensed
under the Open Government Licence v3.0. To view this licence, visit:
http://www.nationalarchives.gov.uk/doc/open-government-licence/
When you use this information under the Open Government Licence, you should include the
following attribution: CyBOK © Crown Copyright, The National Cyber Security Centre 2018, li-
censed under the Open Government Licence: http://www.nationalarchives.gov.uk/doc/open-
government-licence/.
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of
education, training, course development, professional development etc. to contact it at con-
[email protected] to let the project know how they are using CyBOK.
Issue 1.0 is a stable public release of the Physical Layer & Telecommunications Security
Knowledge Area. However, it should be noted that a fully-collated CyBOK document which
includes all of the Knowledge Areas is anticipated to be released by the end of July 2019. This
will likely include updated page layout and formatting of the individual Knowledge Areas
INTRODUCTION
This Knowledge Area is a review of the most relevant topics in wireless physical layer security.
The physical phenomenon utilized by the techniques presented in this Knowledge Area is the
radiation of electromagnetic waves. The frequencies considered hereinafter consist of the
entire spectrum that ranges from a few Hertz to frequencies beyond those of visible light
(optical spectrum). This Knowledge Area covers concepts and techniques that exploit the
way these signals propagate through the air and other transmission media. It is organised
into sections that describe security mechanisms for wireless communication methods as
well as some implications of unintended radio frequency emanations.
Since most frequencies used for wireless communication reside in the radio frequency spec-
trum and follow the well-understood laws of radio propagation theory, the majority of this
Knowledge Area is dedicated to security concepts based on physical aspects of radio fre-
quency transmission. The chapter therefore starts with an explanation of the fundamental
concepts and main techniques that were developed to make use of the wireless communi-
cation layer for confidentiality, integrity, access control and covert communication. These
techniques mainly use properties of physical layer modulations and signal propagation to
enhance the security of systems.
After having presented schemes to secure the wireless channel, the Knowledge Area contin-
ues with a review of security issues related to the wireless physical layer, focusing on those
aspects that make wireless communication systems different from wired systems. Most no-
tably, signal jamming, signal annihilation and jamming resilience. The section on jamming
is followed by a review of techniques capable of performing physical device identification
(i.e., device fingerprinting) by extracting unique characteristics from the device’s (analogue)
circuitry.
Following this, the chapter continues to present approaches for performing secure distance
measurements and secure positioning based on electromagnetic waves. Protocols for dis-
tance measurements and positioning are designed in order to thwart threats on the physical
layer as well as the logical layer. Those attack vectors are covered in detail, together with
defense strategies and the requirements for secure position verification.
Then, the Knowledge Area covers unintentional wireless emanations from devices such as
from computer displays and summarises wireless side-channel attacks studied in literature.
This is followed by a review on spoofing of analogue sensors. Unintentional emissions are
in their nature different from wireless communication systems, especially because these
interactions are not structured. They are not designed to carry information, however, they
also make use of—or can be affected by—electromagnetic waves.
Finally, after having treated the fundamental concepts of wireless physical security, this Knowl-
edge Area presents a selection of existing communication technologies and discusses their
security mechanisms. It explains design choices and highlights potential shortcomings while
referring to the principles described in the earlier sections. Included are examples from near-
field communication and wireless communication in the aviation industry, followed by the
security considerations of cellular networks. Security of global navigation systems and of
terrestrial positioning systems is covered last since the security goals of such systems are
different from communication systems and are mainly related to position spoofing resilience.
CONTENT
1 PHYSICAL LAYER SCHEMES FOR CONFIDENTIALITY,
INTEGRITY AND ACCESS CONTROL
[1, 2, 3, 4, 5, 6]
Securing wireless networks is challenging due to the shared broadcast medium which makes
it easy for remote adversaries to eavesdrop, modify and block the communication between
devices. However, wireless communication also offers some unique opportunities. Radio
signals are affected by reflection, diffraction, and scattering, all of which contribute to a com-
plex multi-path behaviour of communicated signals. The channel response, as measured at
the receiver, can therefore be modelled as having frequency and position dependent random
components. In addition, within the short time span and in the absence of interference, com-
municating parties will measure highly correlated channel responses. These responses can
therefore be used as shared randomness, unavailable to the adversary, and form a basis of
secure communication.
It should be noted that modern-day cryptography provides many different protocols to as-
sure the confidentiality, integrity and authenticity of data transmitted using radio signals. If
the communicating parties are associated with each other or share a mutual secret, cryp-
tographic protocols can effectively establish secure communication by making use of cryp-
tographic keying material. However, if mere information exchange is not the only goal of
a wireless system (e.g., in a positioning system), or if no pre-shared secrets are available,
cryptographic protocols operating at higher layers of the protocol stack are not sufficient
and physical-layer constructs can be viable solutions. The main physical layer schemes are
presented in the following sections.
Information Reconciliation Phase: Since the quantisation phase is likely to result in disagree-
ing sequences at Alice and Bob, they need to reconcile their sequences to correct for any
errors. This is typically done leveraging error correcting codes and privacy amplification
techniques. Most schemes use simple level-crossing algorithms for quantisation and do
not use coding techniques. However, if the key derivation uses methods based on channel
states whose distributions are not necessarily symmetric, more sophisticated quantisation
methods, such as approximating the channel fading phenomena as a Gaussian source, or
(multi-level) coding is needed [2].
Key Verification Phase: In this last phase, communicating parties confirm that they estab-
lished a shared secret key. If this step fails, the parties need to restart key establishment.
Most of the research in physical-layer techniques has been concerned with the choice of
channel properties and of the quantisation technique. Even if physical-layer key establish-
ment techniques seem attractive, many of them have been shown to be vulnerable to active,
physically distributed and multi-antenna adversaries. However, in a number of scenarios
where the devices are mobile, and where the attacker is restricted, they can be a valuable
replacement or enhancement to traditional public-key key establishment techniques.
4. Repeated
processing gain of transmission
the spread-spectrum communication. This gain is the ratio by which in-
terference can be suppressed relative to the original signal, and is computed as a ratio of
the spread signal radio frequency bandwidth to the un-spread information (baseband) band-
width. 22
edly selects a fresh, randomly selected spreading sequence from the public set and spreads
the message with this sequence. Hence, UDSSS neither requires message fragmentation
at the sender nor message reassembly at the receivers. The receivers record the signal on
the channel and despread the message by applying sequences from the public set, using a
trial-and-error approach. The receivers are not synchronised to the beginning of the sender’s
message and thus record for (at least) twice the message transmission time. After the sam-
pling, the receiver tries to decode the data in the buffer by using code sequences from the
set and by applying a sliding-window protocol.
3 PHYSICAL-LAYER IDENTIFICATION
[15]
Physical-Layer Identification techniques enable the identification of wireless devices by unique
characteristics of their analogue (radio) circuitry; this type of identification is also referred to
as Radio Fingerprinting. More precisely, physical-layer device identification is the process of
fingerprinting the analogue circuitry of a device by analysing the device’s communication at
the physical layer for the purpose of identifying a device or a class of devices. This type of
identification is possible due to hardware imperfections in the analogue circuitry introduced
at the manufacturing process. These imperfections are remotely measurable as they appear
in the transmitted signals. While more precise manufacturing and quality control could min-
imise such artefacts, it is often impractical due to significantly higher production costs.
Physical-layer device identification systems aim at identifying (or verifying the identity of) de-
vices or their affiliation classes, such as their manufacturer. Such systems can be viewed
as pattern recognition systems typically composed of: an acquisition setup to acquire sig-
nals from devices under identification, also referred to as identification signals, a feature ex-
traction module to obtain identification-relevant information from the acquired signals, also
referred to as fingerprints, and a fingerprint matcher for comparing fingerprints and notify-
ing the application system requesting the identification of the comparison results. Typically,
there are two modules in an identification system: one for enrollment and one for identifica-
tion. During enrollment, signals are captured either from each device or each (set of) class-
representative device(s) considered by the application system. Fingerprints obtained from
the feature extraction module are then stored in a database (each fingerprint may be linked
with some form of unique ID representing the associated device or class). During identifica-
tion, fingerprints obtained from the devices under identification are compared with reference
fingerprints stored during enrollment. The task of the identification module can be twofold:
either recognise (identify) a device or its affiliation class from among many enrolled devices
or classes (1:N comparisons), or verify that a device identity or class matches a claimed
identity or class (1:1 comparison).
The identification module uses statistical methods to perform the matching of the finger-
prints. These methods are classifiers trained with Machine Learning techniques during the
enrollment phase. If the module has to verify a 1:1 comparison, the classifier is referred to
as binary. It tries to verify a newly acquired signal against a stored reference pattern estab-
lished during enrollment. If the classifier performs a 1:N comparison, on the other hand, it
attempts to find the reference pattern in a data base which best matches with the acquired
signal. Often, these classifiers are designed to return a list of candidates ranked according
to a similarity metric or likelihood that denotes the confidence for a match.
tacks it is important to avoid predefined or fixed data during the time critical phase of the
distance estimation scheme.
In addition to having the response packet dependent on the challenge signal, the way in which
these challenge and response data are encoded in the radio signals affects the security guar-
antees provided by the ranging or localisation system. An attacker can predict the bit (early
detect) even before receiving the symbol completely. Furthermore, the attacker can leverage
the robustness property of modern receivers and transmit arbitrary signal until the correct
symbol is predicted. Once the bit is predicted (e.g., early-detection), the attacker stops trans-
mitting the arbitrary signal and switches to transmitting the bit corresponding to the predicted
symbol, i.e., the attacker ’commits’ to the predicted symbol, commonly known as late com-
mit. In such a scenario, the attacker needn’t wait for the entire series of pulses to be received
before detecting the data being transmitted. After just a time period, the attacker would be
able to correctly predict the symbol.
As described previously, round-trip time-of-flight systems are implemented either using chirp
or impulse radio ultrawideband signals. Due to their long symbol lengths, both implementa-
tions have been shown to be vulnerable to early-detect and late-commit attacks. In the case
of chirp-based systems, an attacker can decrease the distance by more than 160 m and in
some scenarios even up to 700 m. Although IR-UWB pulses are of short duration (typically
2–3 ns long), data symbols are typically composed of a series of UWB pulses. Furthermore,
IEEE 802.15.4a IR-UWB standard allows long symbol lengths ranging from 32 ns to as large
as 8µs. Therefore, even the smallest symbol length of 32 ns allows an attacker to reduce the
distance by as much as 10 m by performing early-detect and late-commit attacks. Thus, it
is clear that in order to guarantee proximity and secure a wireless proximity system against
early detect and late-commit attacks, it is necessary to keep the symbol length as short as
possible.
Design of a physical layer for secure distance measurement remains an open topic. However,
research so far has yielded some guiding principles for its design. Only radio RTT with single-
pulse or multi-pulse UWB modulation has been shown to be secure against physical layer
attacks. As a result, the IEEE 802.15.4z working group started the standardization of a new
physical layer for UWB secure distance measurement.
The first attempt at formalizing the requirements for secure distance measurement based on
the Time of Arrival (ToA) of transmitted messages can be found in [23]. Said work presents
a formal definition of Message Time of Arrival Codes (MTACs), the core primitive in the con-
struction of systems for secure ToA measurement. If implemented correctly, MTACs provide
the ability to withstand reduction and enlargement attacks on distance measurements. It is
shown that systems based on UWB modulation can be implemented such that the stated
security requirements are met and therefore constitute examples of MTAC schemes.
x
V1 V2
y
P P
V3
Figure 2: If the computed location of the prover is in the verification triangle, the verifiers
conclude that this is a correct location. To spoof the position of prover inside the triangle,
the attacker would need to reduce at least one of the distance bounds.
sition (within some distance and position error bounds) falls within the verification trian-
gle/pyramid, the verifiers accept it as valid. Given that the prover is untrusted, it can enlarge
any of the measured distances, but cannot reduce them since this is prevented by the use of
distance bounding protocols. Like in the case of secure positioning, the geometry of the tri-
angle/pyramid then prevents the prover from claiming a false position. Unlike in the case of
secure positioning, position verification is vulnerable to cloning attacks, in which the prover
shares its key to its clones. These clones can then be strategically placed to the verifiers
and fake any position by enlarging distances to each individual verifier. This attack can be
possibly addressed by tamper resistant hardware or device fingerprinting.
Another approach to secure positioning and position verification is to prevent the attacker
from deterministically spoofing the computed position by making the positions of the veri-
fiers unpredictable for the attacker (either a malicious prover or an external attacker). Verifier
positions can therefore be hidden or the verifiers can be mobile. When the verifiers are hid-
den they should only listen to the beacons sent by the nodes to not disclose their positions.
Upon receiving the beacons, the base stations compute the nodes location with TDOA and
check if this location is consistent with the time differences.
through analogue video cables and through high-speed Digital Serial Interface (DVI) cables.
However, more recent works show that such emanations are not restricted to cables and, to
aggravate the situation, compromising emissions are not necessarily caused by analogue or
digital displays only.
Some attacks described in research showed that high-frequency sounds caused by vibration
of electronic components (capacitors and coils) in the computer’s voltage regulation circuit
can be used to infer prime factors and therefore derive RSA encryption keys. Sounds ema-
nating from key presses on a keyboard were used to infer what a user is typing. The resulting
vibrations can, for instance, be sensed by the accelerometer of a phone located nearby. Fi-
nally, reflections from different objects in the vicinity of computer screens, such as spoons,
bottles and user’s retina were used to infer information show on a display.
The increasing availability of phones that integrate high quality sensors, such as cameras,
microphones and accelerometers makes it easier to mount successful attacks since no ded-
icated sensor equipment needs to be covertly put in place.
To avoid unwanted signal emissions, devices can be held at a distance, can be shielded and
signals that are transmitted should be filtered in order to remove high-frequency components
that might reflect switching activity in the circuitry. Moreover, it is generally advised to place a
return wire close to the transmission wire in order to avoid exploitation of the return current.
In general, wires and communication systems bearing confidential information should be
separated (air-gapped) from non-confidential systems.
fence strategies include, for example, (analogue) shielding of the devices, measuring signal
contamination using various metrics, or accommodating dedicated EMI monitors to detect
and flag suspicious sensor readings.
A promising strategy that follows the approach of quantifying signal contamination to detect
EMI sensor spoofing is presented in [34]. The sensor output can be turned on and off accord-
ing to a pattern unknown to the attacker. Adversarial EMI in the wires between sensor and
the circuitry converting the reading to a digital value, i.e., the ADC, can be detected during
the times the sensor is off since the sensor output should be at a known level. In case there
are fluctuations in the readings, an attack is detected. Such an approach is thought to be
especially effective when used to protect powered or non-powered passive sensors. It has
been demonstrated to successfully thwart EMI attacks against a microphone and a temper-
ature sensor system. The only modification required is the addition of an electronic switch
that can be operated by the control unit or microcontroller to turn the sensor on and off. A
similar sensor spoofing detection scheme can be implemented for active sensors, such as
ultrasonic and infrared sensors, by incorporating a challenge-response like mechanism into
the measurement acquisition process [36]. An active sensor often has an emitting element
and a receiving element. The emitter releases a signal that is reflected and captured by the re-
ceiver. Based on the properties of the received signal, the sensor can infer information about
the entity or the object that reflected the signal. The emitter can be turned off randomly and
during that time the receiver should not be able to register any incoming signal. Otherwise,
an attack is detected and the sensor reading is discarded.
assumption can not be verified reliably using NFC protocols. The distance can be made al-
most arbitrarily large by relaying messages between NFC-enabled devices. The attack works
as follows: The benign NFC devices are made to believe that they are communicating with
each other, but they are actually exchanging data with a modified smartphone. An adversary
can strategically place a smartphone next to each benign NFC device while the smartphones
themselves use a communication method that can cover long distances, such as WiFi. They
simply forward the messages the benign devices are sending to each other. Such an attack
is also referred to as a wormhole attack where communicating parties are tricked into as-
suming that they are closer than they actually are. This is a problem that cannot be solved
using techniques on the logical layer or on the data layer.
Obviously, most of the described attacks can be mitigated by shielding the NFC devices or
enhance the protocol with two-factor authentication, for example. Such mechanisms unfor-
tunately transfer security-relevant decisions to the user of an NFC system. Countermeasures
that do not impose user burden can roughly be categorised into physical layer methods and
the augmentation with context- or device-specific identifiers [37].
Protocol augmentation entails context-aware NFC devices that incorporate location informa-
tion into the NFC system to verify proximity. The location sensing can be implemented with
the help of a variety of different services, each with its own accuracy and granularity. Con-
ceivable are, for instance, GNSS/GPS based proximity verification or leveraging the cell-ID
of the base station to which the NFC device is currently closest in order to infer a notion of
proximity.
Physical layer methods that have been suggested in research literature are timing restric-
tions and distance bounding. Enforcing strict timing restraints on the protocol messages
can be understood as a crude form of distance bounding. As discussed in Section 4.1, dis-
tance bounding determines an upper bound on the physical distance between two commu-
nicating devices. While distance bounding is considered the most effective approach, it still
remains to be shown if secure distance bounding can be implemented in practice for small
NFC-enabled devices.
transponder messages. A sophisticated attacker could even fully distort the view ATC has
on its airspace.
Multilateration (MLAT) can be seen as a technology that mitigates some of the shortcom-
ings of unauthenticated ADS-B and is therefore usually deployed in conjunction with ADS-B.
MLAT does not rely on the transmitted information encapsulated in the message, but makes
use of the physical and geometrical constellation between the transmitter (i.e., transpon-
der of the aircraft) and several receivers. MLAT systems extract physical layer properties
from the received messages. The time of arrival of a message is recorded at different co-
located receivers and, using the propagation speed of the signal, the location of the aircraft’s
transponder can be estimated. Multilateration techniques infer the aircraft’s location even
if the contents of the ADS-B messages are incorrect and thus MLAT provides a means to
crosscheck the location information disseminated by the aircraft’s transponder.
Although MLAT offers additional security based on physical layer properties, a distributed ad-
versary can still manipulate ADS-B messages. In addition to altering the location information,
an attacker can modify or inject signals that affect the time-of-arrival measurement at the re-
ceivers. If the attacker has access to multiple distributed antennas and is able to coordinate
adversarial signal emission precisely, attacks similar to those on standard ADS-B are feasi-
ble. However, the more receivers used to record the signals, the more difficult such attacks
become. Unfortunately, MLAT is not always an effective solution in aviation as strategic re-
ceiver placement is crucial and time of arrival calculations can be susceptible to multi-path
interference [38].
sal) Subscriber Identity Modules their International Mobile Subscriber Identity (IMSI) number
and its related secret key. IMSI and the keys are used to authenticate subscribers as well
as to generate the necessary shared secrets to protect the communication to the cellular
network.
2G security focused on the confidentiality of the wireless link between the mobile station
and the base station. This was achieved through the authentication via a challenge-response
protocol, 2G Authentication and Key Agreement (AKA). This protocol is executed each time
when a mobile station initiates a billable operation. 2G AKA achieved authentication based
on a long term key Ki shared between the subscriber SIM card and the network. This key is
used by the network to authenticate the subscriber and to derive a session key Kc . This is
done within in a challenge response protocol, executed between the SGSN and the mobile
station. Before the execution of the protocol, SGSN receives from the HLR the Kc , a random
value RAN D and an expected response XRES. Both Kc and XRES are generated within
the HLR based on RAN D and Ki . When the mobile station attempts to authenticate to the
network it is sent RAN D. To authenticate, the mobile station combines its long term key Ki
(stored on its SIM card) with the received RAN D to generate RES and Kc . The mobile station
sends RES to the SGSN which compares it to XRES. If the two values match, the mobile
station is authenticated to the network. The SGSN then sends the Kc to the base station to
which the mobile station is connected in order to protect the mobile to base station wireless
link.
2G AKA offered very limited protection. It used inadequate key size (56-64 bits), and weak
authentication and key generation algorithms (A3,A5 and A8) which were, once released, bro-
ken, allowing for eavesdropping and message forgery. Furthermore, AKA was designed to
provide only one-way authentication of the mobile station to the network. Since the network
did not authenticate to the mobile stations this enabled attacks by fake base stations violat-
ing users location privacy and confidentiality of their communication.
In order to address the 2G security shortcomings, 3G networks introduced new 3G Authenti-
cation and Key Agreement (3G AKA) procedures. 3G AKA replaced the weak cryptographic
algorithms that were used in 2G and provided mutual authentication between the network
and the mobile stations. Like in 2G, the goal of the protocol is the authentication (now mu-
tual) of the network and the mobile station. The input into the protocol is a secret key K
shared between the HLR and the subscriber. The outcome of the protocol are two keys, the
encryption/confidentiality key CK and the integrity key IK. The generation of two keys al-
lows the network and the mobile station to protect the integrity and confidentiality of their
communication using two different keys, in line with common security practices. CK and IK
are each 128 bits long which is considered adequate.
The authentication and key derivation is performed as follows. The HLR first generates the
random challenge RAN D, from it the expected response XRES, the keys CK and IK and
the authentication token AU T N . It then sends these values to the SGSN. The SGSN sends
the RAN D as well as the AU T N to the mobile station (also denoted as User Equipment (UE)),
which will then use its long term key K to generate the response RES and to verify if AU T N
was generated by the HLR. The AU T N is from the shared key and the counter maintained by
both the HLR and the mobile station. Upon receiving the RES from the mobile station, SGSN
will compare it with the XRES and if they match, will forward the CK and IK to the base
station. The base and mobile station can now use these keys to protect their communication.
3G, however, still didn’t resolve the vulnerabilities within the operator’s networks. CK and
IK are transmitted between different entities in the network. They are transmitted between
SGSN and the associated base station as well as between different base stations during
mobility. This allows network attackers to record these keys and therefore eavesdrop on
wireless connections.
4G (LTE) security architecture preserved many of the core elements of 2G and 3G networks,
but aimed to address the shortcomings of 3G in terms of the protection of the in-network
traffic through the protection of network links and redistribution of different roles. For ex-
ample, the long term key storage was moved from the HLR to the Home Subscriber Server
(HSS). Mobility management was moved from the SGSN to the Mobility Management Engine
(MME).
5G security architecture evolves 4G but follows a similar set of principles and entities. 5G
introduces a new versions of Authentication and Key Agreement (AKA) protocols that was
designed to fix the issues found in 4G, however with mixed success [41].
Figure 3: Seamless takeover attack on GPS. The spoofing aligns its signal with the legitimate
signal and slowly increase the transmit power. Once receiver locks on to attacker’s signal, he
starts to manipulate it.
Non-Coherent and Modified Message Contents: In this type of attack, the attacker’s signals
are both unsynchronised and contain different navigation message data in comparison to
the authentic signals. Attackers who use GPS signal generators to execute the spoofing
attack typically fall under this category. An attacker with a little know-how can execute a
spoofing attack using these simulators due to their low complexity, portability and ease of
use. Some advanced GPS signal generators are even capable of recording and replaying
signals, however not in real-time. In other words, the attacker uses the simulator to record at
one particular time in a given location and later replays it. Since they are replayed at a later
time, the attacker’s signals are not coherent and contain different navigation message data
than the legitimate signals currently being received.
Non-Coherent but Unmodified Message Contents: In this type of attack, the navigation mes-
sage contents of the transmitted spoofing signals are identical to the legitimate GPS signals
currently being received. However, the attacker temporally shifts the spoofing signal thereby
manipulating the spoofing signal time of arrival at the target receiver. For example, attack-
ers capable of real-time recording and replaying of GPS signals fall under this category as
they will have the same navigation contents as that of the legitimate GPS signals, however
shifted in time. The location or time offset caused by such an attack on the target receiver
depends on the time delay introduced both by the attacker and due to the propagation time
of the relayed signal. The attacker can precompute these delays and successfully spoof a
receiver to a desired location.
Coherent but Modified Message Contents: The attacker generates spoofing signals that are
synchronised to the authentic GPS signals. However, the contents of the navigation mes-
sages are not the same as that of the currently seen authentic signals. For instance, Phase-
Coherent Signal Synthesisers are capable of generating spoofing signals with the same code
phase as the legitimate GPS signal that the target receiver is currently locked on to. Addi-
tionally, the attacker modifies the contents of the navigation message in real-time (and with
minimal delay) and replays it to the target receiver. A variety of commercial GPS receivers
were shown to be vulnerable to this attack and in some cases, it even caused permanent
damage to the receivers.
Coherent and Unmodified Message Contents: Here, the attacker does not modify the con-
tents of the navigation message and is completely synchronised to the authentic GPS sig-
nals. Even though the receiver locks on to the attacker’s spoofing signals (due to the higher
power), there is no change in the location or time computed by the target receiver. Therefore,
this is not an attack in itself but is an important first step in executing the seamless takeover
attack.
The seamless takeover attack is considered one of the strongest attacks in literature. In a
majority of applications, the target receiver is already locked on to the legitimate GPS satel-
lite signals. The main steps are highlighted in Figure 3. The goal of an attacker is to force
the receiver to stop tracking the authentic GPS signals and lock onto the spoofing signals
without causing any signal disruption or data loss. This is because the target receiver can
potentially detect the attack based on the abrupt loss of GPS signal. In a seamless takeover
attack, first, the attacker transmits spoofing signals that are synchronised with the legitimate
satellite signals and are at a power level lower than the received satellite signals. The receiver
is still locked on to the legitimate satellite signals due to the higher power and hence there is
no change in the ships route. The attacker then gradually increases the power of the spoof-
ing signals until the target receiver stops tracking the authentic signal and locks on to the
spoofing signals. Note that during this takeover, the receiver does not see any loss of lock,
in other words, the takeover was seamless. Even though the target receiver is now locked on
to the attacker, there is still no change in the route as the spoofing signals are both coherent
with the legitimate satellite signals as well as there is no modification to the contents of the
navigation message itself. Now, the attacker begins to manipulate the spoofing signal such
that the receiver computes a false location and begins to alter its course. The attacker can
either slowly introduce a temporal shift from the legitimate signals or directly manipulate the
navigation message contents to slowly deviate the course of the ship to a hostile destination.
If an attacker controls all the signals that arrive at the receiver’s antenna(s) the receiver can-
not detect spoofing. However, if the attack is remote, and the attacker cannot fully control
the signals at the receiver, anomaly detection techniques can be used to detect spoofing. In
particular, Automatic Gain Control (AGC) values, Received Signal Strength (RSS) from individ-
ual satellites, carrier phase values, estimated noise floor levels, number of visible satellites
all can be used to detect spoofing. Particularly interesting are techniques based on tracking
and analysis of autocorrelation peaks that are used for the detection of GNSS signals. Dis-
tortion, the number and the behaviour over time of these peaks can be used to detect even
the most sophisticated seamless takeover attacks.
The detection of GNSS spoofing can be improved if spoofing signals are simultaneously re-
ceived by several receivers. This can be used for the detection of spoofing as well as for
spoofer localisation. If the receivers know their mutual distances (e.g., are placed at fixed
distances), the spoofer needs to preserve those distances when performing the spoofing at-
tack. When a single spoofer broadcasts its signals, it will result in all receivers being spoofed
to the same position, therefore enabling detection. This basic detection technique can be
generalised to several receivers, allowing even the detection of distributed spoofers.
Finally, GNSS spoofing can be made harder through the authentication and hiding of GNSS
signals. Although currently civilian GNSS systems do not support authentication, digital sig-
natures as well as hash-based signatures such as TESLA can be added to prevent the at-
tacker from generating GNSS signals. This would, however, not prevent all spoofing attacks
since the attacker can still selectively delay navigation messages and therefore modify the
computed position. This attack can be prevented by the use of spreading with delayed key
disclosure. Even this approach still does not fully prevent against spoofing by broadband
receivers that are able to relay full GNSS frequency band between locations.
Military GPS signals are authenticated, and try to achieve low-probability of intercept as well
as jamming resilience via the use of secret spreading codes. This approach prevents some
of the spoofing attacks, but still fails to fully prevent record-and-relay attacks. In addition,
this approach does not scale well since secret spreading codes need to be distributed to all
intended receivers, increasing the likelihood of their leakage and reducing usability.
In conclusion, although newly proposed and deployed countermeasures make it more dif-
ficult for the attacker to spoof GNS systems like GPS, currently no measure fully prevents
spoofing under strong attacker models. This is an area of active research.
CONCLUSION
As we have shown in this knowledge area, the wireless physical layer presents both chal-
lenges and opportunities. Challenges typically come from the broadcast nature of wireless
communication and from it not being protected against confidentiality and integrity viola-
tions. Physical layer is typically application agnostic. Opportunities stem from the stochas-
tic nature of the channel as well as from its robustness to fine-grained manipulations. Under
different attacker models, physical layer can support both highly usable and secure solutions.
Key Other
Topic
references references
1 Physical Layer Schemes for Confidentiality, Integrity and Access Control
[42, 43, 44,
1.1 Key Establishment based on Channel Reciprocity [1, 2, 3]
45, 46, 47]
[48, 49, 50,
1.2 MIMO-supported Approaches: Orthogonal Blinding, Zero-Forcing [1, 5]
51]
[52, 53, 54,
1.3 Secrecy Capacity [7, 8, 10, 9]
55]
[56, 57, 58,
1.4 Friendly Jamming [1, 4]
59]
1.5 Using Physical Layer to Protect Data Integrity [1, 6] [60]
1.6 Low Probability of Intercept and Covert Communication [1] [61, 62, 63]
[64, 65, 66,
2 Jamming and Jamming-Resilient Communication [11, 12]
67]
3 Physical-Layer Identification [15] [68, 69, 70]
4 Distance Bounding and Secure Positioning
[71, 24, 72,
4.1 Distance Bounding Protocols [16, 17, 18]
73, 74, 75]
[76, 77, 78,
4.2 Distance Measurement Techniques [16, 20]
79]
[16][20, 19, [80, 81, 82,
4.3 Physical Layer Attacks on Secure Distance Measurement
21] 25, 83]
[84, 85, 86,
4.4 Secure Positioning [22]
87, 88]
5 Compromising Emanations and Sensor Spoofing
[26, 27, 28, [89, 90, 91,
5.1 Compromising Emanations
29, 30] 92, 93]
[31, 32, 33, [94, 95, 96,
5.2 Sensor Compromise
34, 36] 97, 98]
6 Physical Layer Security of Selected Communication Technologies
6.1 Near-field communication (NFC) [37] [99, 100, 101]
[102, 103,
6.2 Air Traffic Communication Networks [38]
104, 105]
[106, 107,
6.3 Cellular Networks [39]
108]
[109, 110, 111,
6.4 GNSS Security and Spoofing Attacks [40]
112, 113]
ACKNOWLEDGEMENTS
The author would like to specially thank Marc Roeschlin for his valuable input. Thanks to
Aanjhan Ranganathan, Davide Zanetti, Boris Danev, Christina Popper, Kasper Rasmussen
and Nils Tippenhauer for allowing the reproduction of selected text and figures from their
publications within this document.
REFERENCES
[1] R. Liu and W. Trappe, Securing Wireless Communications at the Physical Layer, 1st ed.
Springer Publishing Company, Incorporated, 2009.
[2] C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. B. Mandayam, “Information-
theoretically secret key generation for fading wireless channels,” IEEE Transactions on
Information Forensics and Security, vol. 5, no. 2, pp. 240–254, 2010.
[3] S. Eberz, M. Strohmeier, M. Wilhelm, and I. Martinovic, “A practical man-in-the-middle
attack on signal-based key generation protocols,” in Computer Security – ESORICS 2012,
S. Foresti, M. Yung, and F. Martinelli, Eds. Berlin, Heidelberg: Springer Berlin Heidel-
berg, 2012, pp. 235–252.
[4] S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu, “They can hear your heart-
beats: Non-invasive security for implantable medical devices,” in Proceedings of the
ACM SIGCOMM 2011 Conference, ser. SIGCOMM ’11. New York, NY, USA: ACM, 2011,
pp. 2–13.
[5] N. Anand, S.-J. Lee, and E. W. Knightly, “Strobe: Actively securing wireless communi-
cations using zero-forcing beamforming,” in 2012 Proceedings IEEE INFOCOM, March
2012, pp. 720–728.
[6] S. Čapkun, M. Čagalj, R. Rengaswamy, I. Tsigkogiannis, J.-P. Hubaux, and M. Srivas-
tava, “Integrity codes: Message integrity protection and authentication over insecure
channels,” IEEE Transactions on Dependable and Secure Computing, vol. 5, no. 4, pp.
208–223, Oct 2008.
[7] C. E. Shannon, “Communication theory of secrecy systems,” Bell system technical jour-
nal, vol. 28, no. 4, pp. 656–715, 1949.
[8] A. D. Wyner, “The wire-tap channel,” Bell system technical journal, vol. 54, no. 8, pp.
1355–1387, 1975.
[9] I. Csiszár and J. Korner, “Broadcast channels with confidential messages,” IEEE trans-
actions on information theory, vol. 24, no. 3, pp. 339–348, 1978.
[10] M. Bloch, J. Barros, M. R. Rodrigues, and S. W. McLaughlin, “Wireless information-
theoretic security,” IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2515–
2534, 2008.
[11] D. Adamy, EW 101: a first course in electronic warfare. Artech House, 2001.
[12] C. Popper, “On secure wireless communication under adversarial interference,” PhD
thesis, ETH Zurich, 2011.
[13] C. Pöpper, N. O. Tippenhauer, B. Danev, and S. Čapkun, “Investigation of signal and
message manipulations on the wireless channel,” in Proceedings of the European Sym-
posium on Research in Computer Security, 2011.
[14] H. Yang, S. Bae, M. Son, H. Kim, S. M. Kim, and Y. Kim, “Hiding in plain
signal: Physical signal overshadowing attack on LTE,” in 28th USENIX Security
Symposium (USENIX Security 19). Santa Clara, CA: USENIX Association, Aug. 2019,
pp. 55–72. [Online]. Available: https://www.usenix.org/conference/usenixsecurity19/
presentation/yang-hojoon
[15] B. Danev, D. Zanetti, and S. Capkun, “On physical-layer identification of wireless de-
vices,” ACM Comput. Surv., vol. 45, no. 1, pp. 6:1–6:29, Dec. 2012.
[16] G. Avoine, M. A. Bingöl, I. Boureanu, S. čapkun, G. Hancke, S. Kardaş, C. H. Kim, C. Lau-
radoux, B. Martin, J. Munilla, A. Peinado, K. B. Rasmussen, D. Singelée, A. Tchamkerten,
R. Trujillo-Rasua, and S. Vaudenay, “Security of distance-bounding: A survey,” ACM Com-
put. Surv., vol. 51, no. 5, pp. 94:1–94:33, Sep. 2018.
[17] T. Beth and Y. Desmedt, “Identification tokens—or: Solving the chess grandmaster prob-
lem,” in Conference on the Theory and Application of Cryptography. Springer, 1990, pp.
169–176.
[18] S. Brands and D. Chaum, “Distance-bounding protocols,” in Workshop on the Theory and
Application of of Cryptographic Techniques. Springer, 1993, pp. 344–359.
[19] J. Clulow, G. P. Hancke, M. G. Kuhn, and T. Moore, “So near and yet so far: Distance-
bounding attacks in wireless networks,” in Security and Privacy in Ad-Hoc and Sensor
Networks, L. Buttyán, V. D. Gligor, and D. Westhoff, Eds. Berlin, Heidelberg: Springer
Berlin Heidelberg, 2006, pp. 83–97.
[20] A. Ranganathan and S. Capkun, “Are we really close? Verifying proximity in wireless
systems,” IEEE Security & Privacy, vol. 15, no. 3, pp. 52–58, 2017.
[21] M. Singh, P. Leu, and S. Capkun, “UWB with pulse reordering: Securing ranging against
relay and physical layer attacks.” IACR Cryptology ePrint Archive, vol. 2017, p. 1240, 2017.
[22] S. Capkun and J.-P. Hubaux, “Secure positioning in wireless networks,” IEEE Journal on
Selected Areas in Communications, vol. 24, no. 2, pp. 221–232, Feb 2006.
[23] P. Leu, M. Singh, M. Roeschlin, K. G. Paterson, and S. Capkun, “Message time of arrival
codes: A fundamental primitive for secure distance measurement,” IEEE Symposium
on Security and Privacy, 2020.
[24] G. P. Hancke and M. G. Kuhn, “An RFID distance bounding protocol,” in First International
Conference on Security and Privacy for Emerging Areas in Communications Networks
(SECURECOMM’05). IEEE, 2005, pp. 67–73.
[25] M. Poturalski, M. Flury, P. Papadimitratos, J.-P. Hubaux, and J.-Y. Le Boudec, “Distance
bounding with IEEE 802.15. 4a: Attacks and countermeasures,” IEEE Transactions on
Wireless Communications, vol. 10, no. 4, pp. 1334–1344, 2011.
[26] M. G. Kuhn and C. M. G. Kuhn, “Compromising emanations: Eavesdropping risks of
computer displays,” 2003.
[27] M. G. Kuhn, “Electromagnetic eavesdropping risks of flat-panel displays,” in Interna-
tional Workshop on Privacy Enhancing Technologies. Springer, 2004, pp. 88–107.
[28] M. Backes, T. Chen, M. Duermuth, H. P. A. Lensch, and M. Welk, “Tempest in a teapot:
Compromising reflections revisited,” in 2009 30th IEEE Symposium on Security and Pri-
vacy, May 2009, pp. 315–327.
[29] D. Genkin, A. Shamir, and E. Tromer, “RSA key extraction via low-bandwidth acoustic
cryptanalysis,” in Advances in Cryptology – CRYPTO 2014, J. A. Garay and R. Gennaro,
Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014, pp. 444–461.
[30] P. Marquardt, A. Verma, H. Carter, and P. Traynor, “(sp)iPhone: decoding vibrations from
nearby keyboards using mobile phone accelerometers,” in Proceedings of the 18th ACM
conference on Computer and communications security. ACM, 2011, pp. 551–562.
[31] D. F. Kune, J. Backes, S. S. Clark, D. Kramer, M. Reynolds, K. Fu, Y. Kim, and W. Xu,
“Ghost talk: Mitigating emi signal injection attacks against analog sensors,” in 2013
IEEE Symposium on Security and Privacy, May 2013, pp. 145–159.
[32] G. Zhang, C. Yan, X. Ji, T. Zhang, T. Zhang, and W. Xu, “DolphinAttack: Inaudible voice
commands,” in Proceedings of the 2017 ACM SIGSAC Conference on Computer and
Communications Security. ACM, 2017, pp. 103–117.
[33] T. Trippel, O. Weisse, W. Xu, P. Honeyman, and K. Fu, “WALNUT: Waging doubt on the in-
tegrity of MEMS accelerometers with acoustic injection attacks,” in 2017 IEEE European
Symposium on Security and Privacy (EuroS&P), April 2017, pp. 3–18.
[34] Y. Zhang and K. Rasmussen, “Detection of electromagnetic interference attacks on
sensor systems,” in IEEE Symposium on Security and Privacy (S&P), May 2020.
[35] W. van Eck, “Electromagnetic radiation from video display units: An eavesdropping
risk?” Computers & Security, vol. 4, no. 4, pp. 269 – 286, 1985. [Online]. Available:
http://www.sciencedirect.com/science/article/pii/016740488590046X
[36] Y. Shoukry, P. Martin, Y. Yona, S. Diggavi, and M. Srivastava, “Pycra: Physical challenge-
response authentication for active sensors under spoofing attacks,” in Proceedings of
the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM,
2015, pp. 1004–1015.
[37] L. Francis, G. P. Hancke, K. Mayes, and K. Markantonakis, “Practical relay attack on
contactless transactions by using NFC mobile phones.” IACR Cryptology ePrint Archive,
vol. 2011, p. 618, 2011.
[38] M. Strohmeier, “Security in next generation air traffic communication networks,” Ph.D.
dissertation, University of Oxford, 2016.
[39] D. Forsberg, G. Horn, W.-D. Moeller, and V. Niemi, LTE Security, 2nd ed. Wiley Publishing,
2012.
[40] A. Ranganathan, “Physical-layer techniques for secure proximity verification and local-
ization,” PhD thesis, ETH Zurich, 2016.
[41] D. Basin, J. Dreier, L. Hirschi, S. Radomirovic, R. Sasse, and V. Stettler, “A formal
analysis of 5G authentication,” in Proceedings of the 2018 ACM SIGSAC Conference on
Computer and Communications Security, ser. CCS ’18. New York, NY, USA: ACM, 2018,
pp. 1383–1396. [Online]. Available: http://doi.acm.org/10.1145/3243734.3243846
[42] S. N. Premnath, S. Jana, J. Croft, P. L. Gowda, M. Clark, S. K. Kasera, N. Patwari, and
S. V. Krishnamurthy, “Secret key extraction from wireless signal strength in real envi-
ronments,” IEEE Transactions on mobile Computing, vol. 12, no. 5, pp. 917–930, 2012.
[43] S. Mathur, R. Miller, A. Varshavsky, W. Trappe, and N. Mandayam, “Proximate: proximity-
based secure pairing using ambient wireless signals,” in Proceedings of the 9th inter-
national conference on Mobile systems, applications, and services. ACM, 2011, pp.
211–224.
[44] J. Zhang, T. Q. Duong, A. Marshall, and R. Woods, “Key generation from wireless chan-
nels: A review,” Ieee access, vol. 4, pp. 614–626, 2016.
[45] J. Zhang, A. Marshall, R. Woods, and T. Q. Duong, “Efficient key generation by exploiting
randomness from channel responses of individual OFDM subcarriers,” IEEE Transac-
tions on Communications, vol. 64, no. 6, pp. 2578–2588, 2016.
[46] B. Azimi-Sadjadi, A. Kiayias, A. Mercado, and B. Yener, “Robust key generation from
signal envelopes in wireless networks,” in Proceedings of the 14th ACM conference on
Computer and communications security. ACM, 2007, pp. 401–410.
[47] M. Strasser, C. Popper, S. Capkun, and M. Cagalj, “Jamming-resistant key establish-
ment using uncoordinated frequency hopping,” in 2008 IEEE Symposium on Security
and Privacy (sp 2008). IEEE, 2008, pp. 64–78.
[48] D. W. K. Ng, E. S. Lo, and R. Schober, “Robust beamforming for secure communication in
systems with wireless information and power transfer,” IEEE Transactions on Wireless
Communications, vol. 13, no. 8, pp. 4599–4615, 2014.
[49] Y. Zheng, M. Schulz, W. Lou, Y. T. Hou, and M. Hollick, “Profiling the strength of physical-
layer security: A study in orthogonal blinding,” in Proceedings of the 9th ACM Confer-
ence on Security & Privacy in Wireless and Mobile Networks. ACM, 2016, pp. 21–30.
[50] M. Schulz, A. Loch, and M. Hollick, “Practical known-plaintext attacks against physi-
cal layer security in wireless mimo systems.” in The Network and Distributed System
Security Symposium (NDSS), 2014.
[51] P. Robyns, P. Quax, and W. Lamotte, “PHY-layer security is no alternative to cryptogra-
phy,” in Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and
Mobile Networks. ACM, 2017, pp. 160–162.
[52] H. Mahdavifar and A. Vardy, “Achieving the secrecy capacity of wiretap channels using
[69] T. J. Bihl, K. W. Bauer, and M. A. Temple, “Feature selection for RF fingerprinting with
multiple discriminant analysis and using zigbee device emissions,” IEEE Transactions
on Information Forensics and Security, vol. 11, no. 8, pp. 1862–1874, 2016.
[70] T. D. Vo-Huu, T. D. Vo-Huu, and G. Noubir, “Fingerprinting Wi-Fi devices using software
defined radios,” in Proceedings of the 9th ACM Conference on Security & Privacy in Wire-
less and Mobile Networks. ACM, 2016, pp. 3–14.
[71] S. Capkun, K. El Defrawy, and G. Tsudik, “Group distance bounding protocols,” in Inter-
national Conference on Trust and Trustworthy Computing. Springer, 2011, pp. 302–312.
[72] N. O. Tippenhauer and S. Čapkun, “Id-based secure distance bounding and localization,”
in European Symposium on Research in Computer Security. Springer, 2009, pp. 621–
636.
[73] M. Kuhn, H. Luecken, and N. O. Tippenhauer, “UWB impulse radio based distance bound-
ing,” in 2010 7th Workshop on Positioning, Navigation and Communication. IEEE, 2010,
pp. 28–37.
[74] L. Bussard and W. Bagga, “Distance-bounding proof of knowledge to avoid real-time
attacks,” in IFIP International Information Security Conference. Springer, 2005, pp. 223–
238.
[75] D. Singelée and B. Preneel, “Distance bounding in noisy environments,” in European
Workshop on Security in Ad-hoc and Sensor Networks. Springer, 2007, pp. 101–115.
[76] K. B. Rasmussen and S. Capkun, “Realization of RF distance bounding.” in USENIX Se-
curity Symposium, 2010, pp. 389–402.
[77] A. Ranganathan, N. O. Tippenhauer, B. Škorić, D. Singelée, and S. Čapkun, “Design and
implementation of a terrorist fraud resilient distance bounding system,” in European
Symposium on Research in Computer Security. Springer, 2012, pp. 415–432.
[78] N. O. Tippenhauer, H. Luecken, M. Kuhn, and S. Capkun, “UWB rapid-bit-exchange sys-
tem for distance bounding,” in Proceedings of the 8th ACM Conference on Security &
Privacy in Wireless and Mobile Networks. ACM, 2015, p. 2.
[79] S. Drimer, S. J. Murdoch et al., “Keep your enemies close: Distance bounding against
smartcard relay attacks.” in USENIX security symposium, vol. 312, 2007.
[80] C. Cremers, K. B. Rasmussen, B. Schmidt, and S. Capkun, “Distance hijacking attacks on
distance bounding protocols,” in 2012 IEEE Symposium on Security and Privacy. IEEE,
2012, pp. 113–127.
[81] G. P. Hancke and M. G. Kuhn, “Attacks on time-of-flight distance bounding channels,”
in Proceedings of the first ACM conference on Wireless network security. ACM, 2008,
pp. 194–202.
[82] K. B. Rasmussen and S. Čapkun, “Location privacy of distance bounding protocols,” in
Proceedings of the 15th ACM conference on Computer and communications security.
ACM, 2008, pp. 149–160.
[83] M. Flury, M. Poturalski, P. Papadimitratos, J.-P. Hubaux, and J.-Y. Le Boudec, “Effective-
ness of distance-decreasing attacks against impulse radio ranging,” in Proceedings of
the third ACM conference on Wireless network security. ACM, 2010, pp. 117–128.
[84] R. Shokri, M. Poturalski, G. Ravot, P. Papadimitratos, and J.-P. Hubaux, “A practical se-
cure neighbor verification protocol for wireless sensor networks,” in Proceedings of the
second ACM conference on Wireless network security. ACM, 2009, pp. 193–200.
[85] S. Čapkun and J.-P. Hubaux, “Secure positioning of wireless devices with application
to sensor networks,” in IEEE infocom, no. CONF, 2005.
[86] J. T. Chiang, J. J. Haas, and Y.-C. Hu, “Secure and precise location verification using dis-
tance bounding and simultaneous multilateration,” in Proceedings of the second ACM
conference on Wireless network security. ACM, 2009, pp. 181–192.
[87] N. Basilico, N. Gatti, M. Monga, and S. Sicari, “Security games for node localization
through verifiable multilateration,” IEEE Transactions on Dependable and Secure Com-
puting, vol. 11, no. 1, pp. 72–85, 2013.
[88] L. Lazos, R. Poovendran, and S. Čapkun, “Rope: robust position estimation in wireless
sensor networks,” in Proceedings of the 4th international symposium on Information
processing in sensor networks. IEEE Press, 2005, p. 43.
[89] M. Backes, M. Dürmuth, S. Gerling, M. Pinkal, and C. Sporleder, “Acoustic side-channel
attacks on printers.” in USENIX Security symposium, 2010, pp. 307–322.
[90] D. Balzarotti, M. Cova, and G. Vigna, “Clearshot: Eavesdropping on keyboard input from
video,” in 2008 IEEE Symposium on Security and Privacy (sp 2008). IEEE, 2008, pp. 170–
183.
[91] M. Backes, M. Dürmuth, and D. Unruh, “Compromising reflections-or-how to read lcd
monitors around the corner,” in 2008 IEEE Symposium on Security and Privacy (sp 2008).
IEEE, 2008, pp. 158–169.
[92] R. Raguram, A. M. White, D. Goswami, F. Monrose, and J.-M. Frahm, “iSpy: automatic
reconstruction of typed input from compromising reflections,” in Proceedings of the
18th ACM conference on Computer and communications security. ACM, 2011, pp. 527–
536.
[93] X. Liu, Z. Zhou, W. Diao, Z. Li, and K. Zhang, “When good becomes evil: Keystroke infer-
ence with smartwatch,” in Proceedings of the 22nd ACM SIGSAC Conference on Com-
puter and Communications Security. ACM, 2015, pp. 1273–1285.
[94] C. Kasmi and J. L. Esteves, “IEMI threats for information security: Remote command
injection on modern smartphones,” IEEE Transactions on Electromagnetic Compatibility,
vol. 57, no. 6, pp. 1752–1755, 2015.
[95] Y. Park, Y. Son, H. Shin, D. Kim, and Y. Kim, “This ain’t your dose: Sensor spoofing attack
on medical infusion pump,” in 10th USENIX Workshop on Offensive Technologies (WOOT
16), 2016.
[96] K. B. Rasmussen, C. Castelluccia, T. S. Heydt-Benjamin, and S. Capkun, “Proximity-
based access control for implantable medical devices,” in Proceedings of the 16th ACM
conference on Computer and communications security. ACM, 2009, pp. 410–419.
[97] J. Selvaraj, G. Y. Dayanıklı, N. P. Gaunkar, D. Ware, R. M. Gerdes, M. Mina et al., “Electro-
magnetic induction attacks against embedded systems,” in Proceedings of the 2018 on
Asia Conference on Computer and Communications Security. ACM, 2018, pp. 499–510.
[98] Y. Son, H. Shin, D. Kim, Y. Park, J. Noh, K. Choi, J. Choi, and Y. Kim, “Rocking drones with
intentional sound noise on gyroscopic sensors,” in 24th USENIX Security Symposium
(USENIX Security 15), 2015, pp. 881–896.
[99] G. Madlmayr, J. Langer, C. Kantner, and J. Scharinger, “NFC devices: Security and
privacy,” in 2008 Third International Conference on Availability, Reliability and Security.
IEEE, 2008, pp. 642–647.
[100] S. Burkard, “Near field communication in smartphones,” Dep. of Telecommunication
Systems, Service-centric Networking, Berlin Institute of Technology, Germany, 2012.
[101] N. Alexiou, S. Basagiannis, and S. Petridou, “Security analysis of NFC relay attacks us-
ing probabilistic model checking,” in 2014 International Wireless Communications and
Mobile Computing Conference (IWCMC). IEEE, 2014, pp. 524–529.
[102] A. Costin and A. Francillon, “Ghost in the air (traffic): On insecurity of ADS-B protocol
and practical attacks on ADS-B devices,” Black Hat USA, pp. 1–12, 2012.
[103] M. Schäfer, V. Lenders, and I. Martinovic, “Experimental analysis of attacks on next gen-
eration air traffic communication,” in International Conference on Applied Cryptography
and Network Security. Springer, 2013, pp. 253–271.
[104] M. Smith, D. Moser, M. Strohmeier, V. Lenders, and I. Martinovic, “Economy class crypto:
Exploring weak cipher usage in avionic communications via ACARS,” in International
Conference on Financial Cryptography and Data Security. Springer, 2017, pp. 285–301.
[105] M. Strohmeier, V. Lenders, and I. Martinovic, “Intrusion detection for airborne commu-
nication using phy-layer information,” in International Conference on Detection of Intru-
sions and Malware, and Vulnerability Assessment. Springer, 2015, pp. 67–77.
[106] A. Shaik, R. Borgaonkar, N. Asokan, V. Niemi, and J.-P. Seifert, “Practical attacks against
privacy and availability in 4G/LTE mobile communication systems,” arXiv preprint
arXiv:1510.07563, 2015.
[107] A. N. Bikos and N. Sklavos, “LTE/SAE security issues on 4G wireless networks,” IEEE
Security & Privacy, vol. 11, no. 2, pp. 55–62, 2012.
[108] J.-G. Remy and C. Letamendia, LTE standards. Wiley Online Library, 2014.
[109] N. O. Tippenhauer, C. Pöpper, K. B. Rasmussen, and S. Capkun, “On the requirements
for successful GPS spoofing attacks,” in Proceedings of the 18th ACM conference on
Computer and communications security. ACM, 2011, pp. 75–86.
[110] A. Ranganathan, H. Ólafsdóttir, and S. Capkun, “SPREE: A spoofing resistant GPS re-
ceiver,” in Proceedings of the 22nd Annual International Conference on Mobile Comput-
ing and Networking. ACM, 2016, pp. 348–360.
[111] C. Bonebrake and L. R. O’Neil, “Attacks on GPS time reliability,” IEEE Security & Privacy,
vol. 12, no. 3, pp. 82–84, 2014.
[112] T. Nighswander, B. Ledvina, J. Diamond, R. Brumley, and D. Brumley, “GPS software
attacks,” in Proceedings of the 2012 ACM conference on Computer and communications
security. ACM, 2012, pp. 450–461.
[113] J. V. Carroll, “Vulnerability assessment of the US transportation infrastructure that re-
lies on the global positioning system,” The Journal of Navigation, vol. 56, no. 2, pp. 185–
193, 2003.
ACRONYMS
3GPP Third Generation Partnership Plan.
RF Radio Frequency.
RFID Radio-Frequency Identification.
RSA Rivest-Shamir-Adleman.
RSS Received Signal Strength.
RSSI Received Signal Strength Indicator.
GLOSSARY
WiFi A family of radio technologies that is used for the wireless local area networking (WLAN).
KNOWLEDGE DEPENDENCIES
Knowledge dependencies outside the area of cyber security:
• Signal processing and radio propagation: Signal analysis and signal generation are rel-
evant for most topics in wireless physical-layer security. In particular, physical layer
schemes for confidentiality, integrity and access Control require a deep understanding
of the transmitted signals. Apart from signal processing, wireless security also has
considerable overlap with radio propagation and other sub-fields that study the effects
of electromagnetic radiation.
• Information Theory: Knowledge in this field is especially relevant for key establishment
based on wireless channels. Similarly, secrecy capacity has great overlap with informa-
tion theory.
• Machine learning and pattern recognition: Expertise in this area is crucial for physical-
layer identification where the classification of physical characteristics unique to a wire-
less transmitter is required to perform the identification of a wireless device. Machine
Learning can also be a central part to detecting compromising emanations, establish-
ing covert channels and mounting side channel attacks.
7 EXCLUSIONS
This KA specifically deals with physical layer security of wireless systems. Thus, all concepts
covered in this KA have the radiation of electromagnetic signals common. Some of the (pub-
lic) reviews suggested the inclusion of wired transmission methods, such as ADSL, as well
as modulation techniques used in the context of those protocols. However, scenarios where
signals are mostly confined to a conductor, such as wired transmission, have not been in the
original scope of this KA and are therefore not covered.