Home > Research > Publications & Outputs > Short paper: gathering tamper evidence in wi-fi...
View graph of relations

Short paper: gathering tamper evidence in wi-fi networks based on channel state information

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Short paper: gathering tamper evidence in wi-fi networks based on channel state information. / Bagci, Ibrahim Ethem; Roedig, Utz; Schulz, Matthias et al.
WiSec '14 Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks. New York: ACM Press, 2014. p. 183-188.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Bagci, IE, Roedig, U, Schulz, M & Hollick, M 2014, Short paper: gathering tamper evidence in wi-fi networks based on channel state information. in WiSec '14 Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks. ACM Press, New York, pp. 183-188. https://doi.org/10.1145/2627393.2627405

APA

Bagci, I. E., Roedig, U., Schulz, M., & Hollick, M. (2014). Short paper: gathering tamper evidence in wi-fi networks based on channel state information. In WiSec '14 Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks (pp. 183-188). ACM Press. https://doi.org/10.1145/2627393.2627405

Vancouver

Bagci IE, Roedig U, Schulz M, Hollick M. Short paper: gathering tamper evidence in wi-fi networks based on channel state information. In WiSec '14 Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks. New York: ACM Press. 2014. p. 183-188 doi: 10.1145/2627393.2627405

Author

Bagci, Ibrahim Ethem ; Roedig, Utz ; Schulz, Matthias et al. / Short paper: gathering tamper evidence in wi-fi networks based on channel state information. WiSec '14 Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks. New York : ACM Press, 2014. pp. 183-188

Bibtex

@inproceedings{d1a9f97129cd4aaf904b9a08b9a7ca76,
title = "Short paper: gathering tamper evidence in wi-fi networks based on channel state information",
abstract = "Wireless devices are often used in application scenarios with strict security requirements. Examples are physical intru- sion detection systems commonly used to protect factories, airports or government buildings. In such scenarios, addi- tional security features such as tamper detection are highly desirable to complement traditional cryptographic mecha- nisms. In this paper we use channel state information (CSI), extracted from off-the-shelf 802.11n Wi-Fi cards, to calcu- late a tamper-evidence value for transmitters. This value enables detection of tampering due to device movement or replacement. We describe algorithms for tamper-evidence value computation, discuss the interpretation of this value and evaluate its effectiveness.",
author = "Bagci, {Ibrahim Ethem} and Utz Roedig and Matthias Schulz and Matthias Hollick",
year = "2014",
month = jul,
day = "23",
doi = "10.1145/2627393.2627405",
language = "English",
pages = "183--188",
booktitle = "WiSec '14 Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks",
publisher = "ACM Press",

}

RIS

TY - GEN

T1 - Short paper: gathering tamper evidence in wi-fi networks based on channel state information

AU - Bagci, Ibrahim Ethem

AU - Roedig, Utz

AU - Schulz, Matthias

AU - Hollick, Matthias

PY - 2014/7/23

Y1 - 2014/7/23

N2 - Wireless devices are often used in application scenarios with strict security requirements. Examples are physical intru- sion detection systems commonly used to protect factories, airports or government buildings. In such scenarios, addi- tional security features such as tamper detection are highly desirable to complement traditional cryptographic mecha- nisms. In this paper we use channel state information (CSI), extracted from off-the-shelf 802.11n Wi-Fi cards, to calcu- late a tamper-evidence value for transmitters. This value enables detection of tampering due to device movement or replacement. We describe algorithms for tamper-evidence value computation, discuss the interpretation of this value and evaluate its effectiveness.

AB - Wireless devices are often used in application scenarios with strict security requirements. Examples are physical intru- sion detection systems commonly used to protect factories, airports or government buildings. In such scenarios, addi- tional security features such as tamper detection are highly desirable to complement traditional cryptographic mecha- nisms. In this paper we use channel state information (CSI), extracted from off-the-shelf 802.11n Wi-Fi cards, to calcu- late a tamper-evidence value for transmitters. This value enables detection of tampering due to device movement or replacement. We describe algorithms for tamper-evidence value computation, discuss the interpretation of this value and evaluate its effectiveness.

U2 - 10.1145/2627393.2627405

DO - 10.1145/2627393.2627405

M3 - Conference contribution/Paper

SP - 183

EP - 188

BT - WiSec '14 Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks

PB - ACM Press

CY - New York

ER -