• Publications
  • Influence
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping
We consider the following problem: how can two devices that do not share any secrets establish a shared secret key over a wireless radio channel in the presence of a communication jammer? An inherentExpand
  • 307
  • 28
  • PDF
On the requirements for successful GPS spoofing attacks
TLDR
We investigate the requirements for successful GPS spoofing attacks on individuals and groups of victims with civilian or military GPS receivers. Expand
  • 321
  • 19
  • PDF
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
TLDR
In this work, we propose uncoordinated spread spectrum techniques that enable anti-jamming broadcast communication without shared secrets. Expand
  • 197
  • 16
  • PDF
Secure Time Synchronization in Sensor Networks
TLDR
We analyze attacks on existing time synchronization protocols for wireless sensor networks and propose a secure time synchronization toolbox to counter these attacks. Expand
  • 133
  • 15
  • PDF
Jamming-resistant Broadcast Communication without Shared Keys
TLDR
We propose a solution called Uncoordinated DSSS (UDSSS) that enables spread-spectrum anti-jamming broadcast communication without the requirement of shared secrets. Expand
  • 155
  • 13
  • PDF
Efficient uncoordinated FHSS anti-jamming communication
TLDR
We address the problem of jamming-resistant communication in scenarios in which the communicating parties do not share secret keys by introducing Uncoordinated Frequency Hopping (UFH), a new spread-spectrum anti-jamming technique that does not rely on secret keys. Expand
  • 149
  • 13
  • PDF
Attacks on public WLAN-based positioning systems
TLDR
In this work, we study the security of public WLAN-based positioning systems, available on PCs and mobile platforms, including Apple's iPod touch and iPhone. Expand
  • 115
  • 8
  • PDF
Breaking LTE on Layer Two
TLDR
In this paper, we present a comprehensive layer two security analysis and identify three attack vectors on LTE layer two protocols. Expand
  • 52
  • 8
  • PDF
Investigation of Signal and Message Manipulations on the Wireless Channel
TLDR
We explore the suitability of Dolev-Yao-based attacker models for the security analysis of wireless communication. Expand
  • 76
  • 7
  • PDF
On Security Research Towards Future Mobile Network Generations
TLDR
This paper aims to unify security knowledge on mobile phone networks into a comprehensive overview and to derive pressing open research questions for the development of next-generation mobile networks. Expand
  • 40
  • 4
  • PDF