2021
DOI: 10.1109/tdsc.2018.2873767
|View full text |Cite
|
Sign up to set email alerts
|

Preventing Overshadowing Attacks in Self-Jamming Audio Channels

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 17 publications
0
8
0
Order By: Relevance
“…However, the contributions [81] and [4] confuted experimentally the idea that MITM attacks on the audio channel can be always detected because of the human perception of the communication channel.Hence, in [81], the authors demonstrated that systems based on self-jamming cannot fully reliably detect the presence of signals injected by a malicious adversary that is co-located with the victim, i.e., they are not able to face the so-called overshadowing attack. It is worth noting that facing the overshadowing attacks is more challenging than dealing with co-located MITM attacks described in Section III in the context of TFA techniques.…”
Section: B Literature Reviewmentioning
confidence: 99%
See 4 more Smart Citations
“…However, the contributions [81] and [4] confuted experimentally the idea that MITM attacks on the audio channel can be always detected because of the human perception of the communication channel.Hence, in [81], the authors demonstrated that systems based on self-jamming cannot fully reliably detect the presence of signals injected by a malicious adversary that is co-located with the victim, i.e., they are not able to face the so-called overshadowing attack. It is worth noting that facing the overshadowing attacks is more challenging than dealing with co-located MITM attacks described in Section III in the context of TFA techniques.…”
Section: B Literature Reviewmentioning
confidence: 99%
“…Further proofs of the effectiveness of the overshadowing attack are discussed in [4], where the authors also propose some countermeasures. The most effective is based on some security symbols, embedded within the transmitted data at a random location, such that the bit-string size of a generic security symbol corresponds to a single symbol in the bitstream.…”
Section: B Literature Reviewmentioning
confidence: 99%
See 3 more Smart Citations