Practical Message Manipulation Attacks in IEEE 802.15.4 Wireless Networks
The authors assess the ability of adversaries to modify the content of messages on the physical layer of wireless networks. In contrast to related work, they consider signal overshadowing to achieve such manipulations during transmission. They present preliminary experimental results, which suggest that their approach enables deterministic message manipulations, even in unpredictable radio environments. In this paper, they consider message manipulation attacks in wireless networks. The attacker's goal is to violate the integrity of a message, tricking a victim receiver to accept a message of the attacker's choice, while the sender considers its original message to be delivered successfully.