Change search
Link to record
Permanent link

Direct link
BETA
Papadimitratos, PanagiotisORCID iD iconorcid.org/0000-0002-3267-5374
Alternative names
Publications (10 of 34) Show all publications
Khodaei, M. & Papadimitratos, P. (2019). A Cooperative Location Privacy Protection Scheme for Vehicular Ad-hoc Networks. Stockholm, Sweden
Open this publication in new window or tab >>A Cooperative Location Privacy Protection Scheme for Vehicular Ad-hoc Networks
2019 (English)Report (Other academic)
Place, publisher, year, edition, pages
Stockholm, Sweden: , 2019. p. 1
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-253011 (URN)
Note

QC 20190611

Available from: 2019-06-11 Created: 2019-06-11 Last updated: 2019-06-11Bibliographically approved
Jin, H. & Papadimitratos, P. (2019). DoS-resilient cooperative beacon verification for vehicular communication systems. Ad hoc networks, 90, Article ID UNSP 101775.
Open this publication in new window or tab >>DoS-resilient cooperative beacon verification for vehicular communication systems
2019 (English)In: Ad hoc networks, ISSN 1570-8705, E-ISSN 1570-8713, Vol. 90, article id UNSP 101775Article in journal (Refereed) Published
Abstract [en]

Authenticated safety beacons in Vehicular Communication (VC) systems ensure awareness among neighboring vehicles. However, the verification of beacon signatures introduces significant processing overhead for resource-constrained vehicular On-Board Units (OBUs). Even worse in dense neighborhood or when a clogging Denial of Service (DoS) attack is mounted. The OBU would fail to verify for all received (authentic or fictitious) beacons. This could significantly delay the verifications of authentic beacons or even affect the awareness of neighboring vehicle status. In this paper, we propose an efficient cooperative beacon verification scheme leveraging efficient symmetric key based authentication on top of pseudonymous authentication (based on traditional public key cryptography), providing efficient discovery of authentic beacons among a pool of received authentic and fictitious beacons, and can significantly decrease waiting times of beacons in queue before their validations. We show with simulation results that our scheme can guarantee low waiting times for received beacons even in high neighbor density situations and under DoS attacks, under which a traditional scheme would not be workable. rights reserved.

Place, publisher, year, edition, pages
ELSEVIER SCIENCE BV, 2019
Keywords
Security, Privacy, Pseudonymous authentication, Efficiency
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:kth:diva-255177 (URN)10.1016/j.adhoc.2018.10.003 (DOI)000471740100005 ()2-s2.0-85055875023 (Scopus ID)
Note

QC 20190904

Available from: 2019-09-04 Created: 2019-09-04 Last updated: 2019-09-04Bibliographically approved
Ghasemi-Goojani, S. & Papadimitratos, P. (2019). On the Capacity of State-Dependent Gaussian Z-Interference Channel. In: Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018: . Paper presented at 15th International Symposium on Information Theory and Its Applications, ISITA 2018, 28 October 2018 through 31 October 2018 (pp. 653-657). Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>On the Capacity of State-Dependent Gaussian Z-Interference Channel
2019 (English)In: Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018, Institute of Electrical and Electronics Engineers Inc. , 2019, p. 653-657Conference paper, Published paper (Refereed)
Abstract [en]

We study the State-Dependent Gaussian Z-Interference Channel (SDG-ZIC), with two senders transmitting two independent messages through a Gaussian Z-interference channel with the same state. Transmitter 1 interferes with receiver 2, while transmitter 2 does not interfere with receiver 1. In addition, both receivers suffer from the same but differently scaled random state sequence, which is non-causally known at both transmitters. As mentioned in [1], the challenge here is to fully cancel differently scaled states at both receivers. Proposing transmission schemes based on nested lattice codes, we show that under some new conditions, the state at both receivers can be fully canceled and the capacity region can be fully achieved.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2019
Keywords
Gaussian distribution, Signal interference, Transmitters, Capacity regions, Gaussians, Interference channels, Nested lattice codes, Random state, State-dependent, Transmission schemes, Channel capacity
National Category
Telecommunications
Identifiers
urn:nbn:se:kth:diva-252221 (URN)10.23919/ISITA.2018.8664256 (DOI)000468678100134 ()2-s2.0-85063891075 (Scopus ID)9784885523182 (ISBN)
Conference
15th International Symposium on Information Theory and Its Applications, ISITA 2018, 28 October 2018 through 31 October 2018
Note

QC 20190611

Available from: 2019-06-11 Created: 2019-06-11 Last updated: 2019-08-02Bibliographically approved
Zhang, K. & Papadimitratos, P. (2019). On the Effects of Distance-decreasing Attacks on Cryptographically Protected GNSS Signals. In: Proceedings of the 2019 International Technical Meeting of The Institute of Navigation: . Paper presented at 2019 International Technical Meeting of The Institute of Navigation, January 28 - 31, 2019, Reston, Virginia (pp. 363-372).
Open this publication in new window or tab >>On the Effects of Distance-decreasing Attacks on Cryptographically Protected GNSS Signals
2019 (English)In: Proceedings of the 2019 International Technical Meeting of The Institute of Navigation, 2019, p. 363-372Conference paper, Published paper (Refereed)
Abstract [en]

The security of global navigation satellite systems draws attention increasingly, and authentication mechanisms for civilian services seem very effective in thwarting malicious behavior. For example, the Galileo E1 Open Service introduces navigation message authentication. Authentication, as well as encryption at navigation message or spreading code level, can prevent spoofing attacks, but do not preclude replay attacks. In this work, we consider a type of strong replay attacks, distance-decreasing attacks, against cryptographically protected GNSS signals. Distance-decreasing attack enhance an attacker’s capability of allowing it to mislead the victim receiver that the GNSS signals arrive earlier than true signals. We analyze the instantiation and the effects of the distance-decreasing attacks on unprotected GNSS signals, on navigation message authenticated signals, and on spreading-code encrypted signals. We discuss different strategies that the attacker can adopt to introduce the least bit errors to the re-transmitted signals and avoid being detected at the victim receiver. We provide evaluation results of distance-decreasing attacks on unprotected signals and authenticated navigation message signals, based on different strategies and configurations, and we sketch countermeasures to the different strategies.

Keywords
Distance-Decreasing (DD) attacks, Early Detection (ED), Late Commit (LC), Navigation Message Authentication (NMA), Spreading Code Encryption (SCE)
National Category
Engineering and Technology
Research subject
Electrical Engineering
Identifiers
urn:nbn:se:kth:diva-248026 (URN)2-s2.0-85068322902 (Scopus ID)0-936406-21-6 (ISBN)
Conference
2019 International Technical Meeting of The Institute of Navigation, January 28 - 31, 2019, Reston, Virginia
Note

QC 20190412

Available from: 2019-04-02 Created: 2019-04-02 Last updated: 2019-10-04Bibliographically approved
Khodaei, M., Noroozi, H. & Papadimitratos, P. (2019). Scaling Pseudonymous Authentication for Large Mobile Systems. In: WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks: . Paper presented at 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019; Miami; United States; 15 May 2019 through 17 May 2019 (pp. 174-185). Miami, FL, USA
Open this publication in new window or tab >>Scaling Pseudonymous Authentication for Large Mobile Systems
2019 (English)In: WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks, Miami, FL, USA, 2019, p. 174-185Conference paper, Published paper (Refereed)
Abstract [en]

The central building block of secure and privacy-preserving Vehicular Communication (VC) systems is a Vehicular Public-Key Infrastructure (VPKI), which provides vehicles with multiple anonymized credentials, termed pseudonyms. These pseudonyms are used to ensure message authenticity and integrity while preserving vehicle (thus passenger) privacy. In the light of emerging large-scale multi-domain VC environments, the efficiency of the VPKI and, more broadly, its scalability are paramount. By the same token, preventing misuse of the credentials, in particular, Sybil-based misbehavior, and managing “honest-but-curious” insiders are other facets of a challenging problem. In this paper, we leverage the state-of-the-art VPKI system and enhance its functionality towards a highly-available, dynamically-scalable, and resilient design; this ensures that the system remains operational in the presence of benign failures or resource depletion attacks, and that it dynamically scales out, or possibly scales in, according to request arrival rates. Our full-blown implementation on the Google Cloud Platform shows that deploying large-scale and efficient VPKI can be cost-effective.

Place, publisher, year, edition, pages
Miami, FL, USA: , 2019
Keywords
VANETs, VPKI, Security, Privacy, Availability, Scalability, Resilient, Micro-service, Container Orchestration, Cloud.
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-253012 (URN)10.1145/3317549.3323410 (DOI)2-s2.0-85066733902 (Scopus ID)978-1-4503-6726-4 (ISBN)
Conference
12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019; Miami; United States; 15 May 2019 through 17 May 2019
Note

QC 20190619

Available from: 2019-06-11 Created: 2019-06-11 Last updated: 2019-06-19Bibliographically approved
Wiese, M., Oechtering, T. J., Johansson, K. H., Papadimitratos, P., Sandberg, H. & Skoglund, M. (2019). Secure Estimation and Zero-Error Secrecy Capacity. IEEE Transactions on Automatic Control, 64(3), 1047-1062
Open this publication in new window or tab >>Secure Estimation and Zero-Error Secrecy Capacity
Show others...
2019 (English)In: IEEE Transactions on Automatic Control, ISSN 0018-9286, E-ISSN 1558-2523, Vol. 64, no 3, p. 1047-1062Article in journal (Refereed) Published
Abstract [en]

We study the problem of securely estimating the states of an unstable dynamical system subject to non-stochastic disturbances. The estimator obtains all its information through an uncertain channel, which is subject to nonstochastic disturbances as well, and an eavesdropper obtains a disturbed version of the channel inputs through a second uncertain channel. An encoder observes and block encodes the states in such a way that, upon sending the generated codeword, the estimator's error is bounded and a security criterion is satisfied, thereby ensuring that the eavesdropper obtains as little state information as possible. Two security criteria are considered and discussed with the help of a numerical example. A sufficient condition on the uncertain wiretap channel, i.e., the pair formed by the uncertain channel from the encoder to the estimator and the uncertain channel from the encoder to the eavesdropper is derived, which ensures that a bounded estimation error and security are achieved. This condition is also shown to be necessary for a subclass of uncertain wiretap channels. To formulate the condition, the zero-error secrecy capacity of uncertain wiretap channels is introduced, i.e., the maximal rate at which data can be transmitted from the encoder to the estimator in such a way that the eavesdropper is unable to reconstruct the transmitted data. Finally, the zero-error secrecy capacity of uncertain wiretap channels is studied.

Place, publisher, year, edition, pages
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC, 2019
Keywords
Secure state estimation, uncertain wiretap channel, zero-error secrecy capacity
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:kth:diva-247828 (URN)10.1109/TAC.2018.2849620 (DOI)000460415600012 ()2-s2.0-85048871914 (Scopus ID)
Note

QC 20190326

Available from: 2019-03-26 Created: 2019-03-26 Last updated: 2019-03-26Bibliographically approved
Zhang, K. & Papadimitratos, P. (2019). Secure Multi-constellation GNSS Receivers with Clustering-based Solution Separation Algorithm. In: 2019 IEEE AEROSPACE CONFERENCE: . Paper presented at IEEE Aerospace Conference, MAR 02-09, 2019, Big Sky, MT. IEEE
Open this publication in new window or tab >>Secure Multi-constellation GNSS Receivers with Clustering-based Solution Separation Algorithm
2019 (English)In: 2019 IEEE AEROSPACE CONFERENCE, IEEE , 2019Conference paper, Published paper (Refereed)
Abstract [en]

Because of the limited satellite visibility, reduced signal reception reliability and constraining spatial geometry, e.g., in urban areas, the development of multi-constellation global navigation satellite systems (GNSS) has gained traction rapidly. GNSS-based applications are expected to handle observations from different navigation systems, e.g., GPS, GLONASS, Bei-Dou and Galileo, in order to improve positioning accuracy and reliability. Furthermore, multi-constellation receivers present an opportunity to better counter spoofing and replaying attacks, leveraging approaches take advantage of the redundant measurements. In particular, cluster-based solution separation algorithm (CSSA) proposes to detect and identify faulty/malicious signals in a single GPS constellation by checking the consistency of receiver positions calculated with different number of satellites. Intuitively, the algorithm targets directly the consequence of spoofing/replaying attacks: the victim receiver position error estimation. It works independently of how the attacks are launched, either through modifying pseudorange measurements or manipulating the navigation messages, without changing the receiver hardware. Multi-constellation GNSS receivers utilize all observations from different navigation systems, there are more than 30 available satellites at each epoch after Galileo and BeiDou systems become fully operational; in other words using abundant redundancy. Therefore, we introduce such a CSSA to a multi-constellation receiver. The work shows that a multi-constellation GNSS receiver equipped with our algorithm works effectively against a strong spoofing/replaying attacker that can manipulate a large number of signals, or even an entire constellation. The results show that CSSA with multi-constellation significantly improves the performance of detecting and identifying the malicious signals; particularly, when the adversary cannot control all the constellations, a multi-constellation receiver can identify the faults even the adversary induces very small errors to pseudorange measurements, comparing with a single constellation receiver. Moreover, when the attacker is powerful to manipulate most of signals of all the constellations, a multi-constellation receiver with CSSA can still detect and identify the faulty signals with high probability when the attacker tries to mislead the victim more than a couple of hundred meters from its true location.

Place, publisher, year, edition, pages
IEEE, 2019
Series
IEEE Aerospace Conference Proceedings, ISSN 1095-323X
National Category
Electrical Engineering, Electronic Engineering, Information Engineering
Identifiers
urn:nbn:se:kth:diva-259465 (URN)10.1109/AERO.2019.8742021 (DOI)000481648203027 ()2-s2.0-85068331338 (Scopus ID)978-1-5386-6854-2 (ISBN)
Conference
IEEE Aerospace Conference, MAR 02-09, 2019, Big Sky, MT
Note

QC 20190920

Available from: 2019-09-20 Created: 2019-09-20 Last updated: 2019-09-20Bibliographically approved
Ghasemi-Goojani, S. & Papadimitratos, P. (2019). The Symmetric Two-Hop Channel with an Untrusted Relay. In: Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018: . Paper presented at 15th International Symposium on Information Theory and Its Applications, ISITA 2018, 28 October 2018 through 31 October 2018 (pp. 673-677). Institute of Electrical and Electronics Engineers Inc.
Open this publication in new window or tab >>The Symmetric Two-Hop Channel with an Untrusted Relay
2019 (English)In: Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018, Institute of Electrical and Electronics Engineers Inc. , 2019, p. 673-677Conference paper, Published paper (Refereed)
Abstract [en]

We study, using information-theoretic security methods, the so-called symmetric two-hop channel with an untrusted relay. In this model, a source wants to send its message reliably and securely to the destination through an honest but curious relay. The relay acts as a passive eavesdropper. Our investigation, in line with the relevant literature, seeks to determine what rate, termed secrecy rate, is achievable. To do that, we consider a typical setting, with the destination cooperating with the source, sending a 'scrambling' signal to conceal the message from the relay. To derive the achievable secrecy rate, we propose a novel scheme based on nested lattice codes. We show that our scheme outperforms all existing schemes and it achieves the outer bound for this channel model within 0.33 bits.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2019
Keywords
Achievable secrecy rates, Channel model, Information- theoretic securities, Nested lattice codes, Outer bounds, Passive eavesdroppers, Untrusted relays, Information theory
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:kth:diva-252220 (URN)10.23919/ISITA.2018.8664257 (DOI)000468678100138 ()2-s2.0-85063910251 (Scopus ID)9784885523182 (ISBN)
Conference
15th International Symposium on Information Theory and Its Applications, ISITA 2018, 28 October 2018 through 31 October 2018
Note

QC 20190611

Available from: 2019-06-11 Created: 2019-06-11 Last updated: 2019-08-02Bibliographically approved
Zhang, K. & Papadimitratos, P. (2018). Analysis of the eect of the distance-decreasing aacks on GNSS authenticated signals. In: WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks: . Paper presented at 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2018, 18 June 2018 through 20 June 2018 (pp. 285-286). Association for Computing Machinery, Inc
Open this publication in new window or tab >>Analysis of the eect of the distance-decreasing aacks on GNSS authenticated signals
2018 (English)In: WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Association for Computing Machinery, Inc , 2018, p. 285-286Conference paper, Poster (with or without abstract) (Refereed)
Abstract [en]

Global Navigation Satellite Systems (GNSS) are vulnerable to jamming, spoong and replaying aacks because of their characteristics. Concerns regarding these aacks are being heightened because unmanned and autonomous vehicles become popular recently. Cryptographic methods have been proposed and are to be implemented in the Galileo and the GPS systems to counter spoong aacks. However, replaying aacks could still potentially harm GNSS receivers by bypassing the cryptographic methods. Distance-decreasing aacks is a strong type of replay aacks: it essentially resolves, from the aacker's point of view, the issue of introducing processing delay by implementing two phases: early detection and late commit. is poster analyzes the feasibility of distance-decreasing aacks against the GNSS navigation message authenticated signals and proposes countermeasures.

Place, publisher, year, edition, pages
Association for Computing Machinery, Inc, 2018
Keywords
Cryptography, Mobile telecommunication systems, Wireless networks, Autonomous Vehicles, Cryptographic methods, GALILEO, Global Navigation Satellite Systems, GNSS navigation, GNSS receivers, Gps systems, Processing delay, Global positioning system
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-236303 (URN)10.1145/3212480.3226102 (DOI)000456097500033 ()2-s2.0-85050905153 (Scopus ID)9781450357319 (ISBN)
Conference
11th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2018, 18 June 2018 through 20 June 2018
Funder
Swedish Foundation for Strategic Research
Note

QC 20181023

Available from: 2018-10-23 Created: 2018-10-23 Last updated: 2019-02-12Bibliographically approved
Hylamia, A., Varshney, A., Soleiman, A., Papadimitratos, P., Rohner, C. & Voigt, T. (2018). Demo: Towards Battery-free Radio Tomographic Imaging. In: WISEC'18: PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS. Paper presented at 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) (pp. 293-295). ACM Digital Library
Open this publication in new window or tab >>Demo: Towards Battery-free Radio Tomographic Imaging
Show others...
2018 (English)In: WISEC'18: PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS, ACM Digital Library, 2018, p. 293-295Conference paper, Published paper (Refereed)
Abstract [en]

Radio Tomographic Imaging (RTI) enables novel radio frequency (RF) sensing applications such as intrusion detection systems by observing variations in radio links caused by human actions. RTI applications are, however, severely limited by the requirement to retrofit existing infrastructure with energy-expensive sensors. In this demonstration, we present our ongoing efforts to develop the first battery-free RTI system that operates on minuscule amounts of energy harvested from the ambient environment. Our system eliminates the energy-expensive components employed on state-of-the-art RTI systems achieving two orders of magnitude lower power consumption. Battery-free operation enables a sustainable deployment, as RTI sensors could be deployed for long periods of time with little maintenance effort. Our demonstration showcases an intrusion detection scenario enabled by our system.

Place, publisher, year, edition, pages
ACM Digital Library, 2018
Keywords
radio-tomographic-imaging, battery-free, backscatter
National Category
Communication Systems
Identifiers
urn:nbn:se:kth:diva-243982 (URN)10.1145/3212480.3226107 (DOI)000456097500037 ()2-s2.0-85050907001 (Scopus ID)
Conference
11th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)
Note

QC 20190221

Available from: 2019-02-21 Created: 2019-02-21 Last updated: 2019-02-21Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-3267-5374

Search in DiVA

Show all publications