Results 1 - 10
of
51
Cooperative spectrum sensing in cognition radio networks: A survey
- PHYSICAL COMMUNICATION
, 2010
"... ..."
Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication
"... Abstract—Jamming resistance is crucial for applications where reliable wireless communication is required. Spread spectrum techniques such as Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS) have been used as countermeasures against jamming attacks. Traditional ant ..."
Abstract
-
Cited by 50 (10 self)
- Add to MetaCart
(Show Context)
Abstract—Jamming resistance is crucial for applications where reliable wireless communication is required. Spread spectrum techniques such as Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum (DSSS) have been used as countermeasures against jamming attacks. Traditional antijamming techniques require that senders and receivers share a secret key in order to communicate with each other. However, such a requirement prevents these techniques from being effective for anti-jamming broadcast communication, where a jammer may learn the shared key from a compromised or malicious receiver and disrupt the reception at normal receivers. In this paper, we propose a Randomized Differential DSSS (RD-DSSS) scheme to achieve anti-jamming broadcast communication without shared keys. RD-DSSS encodes each bit of data using the correlation of unpredictable spreading codes. Specifically, bit “0 ” is encoded using two different spreading codes, which have low correlation with each other, while bit “1 ” is encoded using two identical spreading codes, which have high correlation. To defeat reactive jamming attacks, RD-DSSS uses multiple spreading code sequences to spread each message and rearranges the spread output before transmitting it. Our theoretical analysis and simulation results show that RD-DSSS can effectively defeat jamming attacks for anti-jamming broadcast communication without shared keys. I.
Packet-hiding methods for preventing selective jamming attacks
- IEEE Trans. Dependable Secure Comput
, 2012
"... Abstract—The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launchpad for mounting Denial-of-Service attacks on wireless networks. Typically, jam ..."
Abstract
-
Cited by 18 (1 self)
- Add to MetaCart
(Show Context)
Abstract—The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launchpad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In this work, we address the problem of selective jamming attacks in wireless networks. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. We illustrate the advantages of selective jamming in terms of network performance degradation and adversary effort by presenting two case studies; a selective attack on TCP and one on routing. We show that selective jamming attacks can be launched by performing real-time packet classification at the physical layer. To mitigate these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication overhead.
Defending DSSS-based Broadcast Communication against Insider Jammers via Delayed Seed-Disclosure
- ACSAC '10
, 2010
"... Spread spectrum techniques such as Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping (FH) have been commonly used for anti-jamming wireless communication. However, traditional spread spectrum techniques require that sender and receivers share a common secret in order to agree upon, for ex ..."
Abstract
-
Cited by 16 (4 self)
- Add to MetaCart
(Show Context)
Spread spectrum techniques such as Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping (FH) have been commonly used for anti-jamming wireless communication. However, traditional spread spectrum techniques require that sender and receivers share a common secret in order to agree upon, for example, a common hopping sequence (in FH) or a common spreading code sequence (in DSSS). Such a requirement prevents these techniques from being effective for anti-jamming broadcast communication, where a jammer may learn the key from a compromised receiver and then disrupt the wireless communication. In this paper, we develop a novel Delayed Seed-Disclosure DSSS (DSD-DSSS) scheme for efficient anti-jamming broadcast communication. DSD-DSSS achieves its anti-jamming capability through randomly generating the spreading code sequence for each message using a random seed and delaying the disclosure of the seed at the end of the message. We also develop an effective protection mechanism for seed disclosure using content-based code subset selection. DSD-DSSS is superior to all previous attempts for anti-jamming spread spectrum broadcast communication without shared keys. In particular, even if a jammer possesses real-time online analysis capability to launch reactive jamming attacks, DSD-DSSS can still defeat the jamming attacks with a very high probability. We evaluate DSD-DSSS through both theoretical analysis and a prototype implementation based on GNU Radio; our evaluation results demonstrate that DSD-DSSS is practical and have superior security properties.
Selective jamming attacks in wireless networks
- In: 2010 IEEE International Conference on Communications
, 2010
"... Abstract—We address the problem of selective jamming attacks in wireless networks. In these attacks, the adversary selectively targets specific packets of “high ” importance by exploiting his knowledge on the implementation details of network protocols at various layers of the protocol stack. We ill ..."
Abstract
-
Cited by 13 (3 self)
- Add to MetaCart
(Show Context)
Abstract—We address the problem of selective jamming attacks in wireless networks. In these attacks, the adversary selectively targets specific packets of “high ” importance by exploiting his knowledge on the implementation details of network protocols at various layers of the protocol stack. We illustrate the impact of selective jamming on the network performance by illustrating various selective attacks against the TCP protocol. We show that such attacks can be launched by performing real-time packet classification at the physical layer. We examine the combination of cryptographic primitives with physical layer attributes for preventing real-time packet classification and neutralizing the inside knowledge of the attacker. I.
Secure Collaborative Sensing for Crowdsourcing Spectrum Data in White Space Networks
"... Abstract—Collaborative Sensing is an important enabling technique for realizing opportunistic spectrum access in white space (cognitive radio) networks. We consider the security ramifications of crowdsourcing of spectrum sensing in presence of malicious users that report false measurements. We propo ..."
Abstract
-
Cited by 12 (2 self)
- Add to MetaCart
(Show Context)
Abstract—Collaborative Sensing is an important enabling technique for realizing opportunistic spectrum access in white space (cognitive radio) networks. We consider the security ramifications of crowdsourcing of spectrum sensing in presence of malicious users that report false measurements. We propose viewing the area of interest as a grid of square cells and using it to identify and disregard false measurements. The proposed mechanism is based on identifying outlier measurements inside each cell, as well as corroboration among neighboring cells in a hierarchical structure to identify cells with significant number of malicious nodes. We provide a framework for taking into consideration inherent uncertainties, such as loss due to distance and shadowing, to reduce the likelihood of inaccurate classification of legitimate measurements as outliers. We use simulations to evaluate the effectiveness of the proposed approach against attackers with varying degrees of sophistication. The results show that depending on the attacker-type and location parameters, in the worst case we can nullify the effect of up to 41 % of attacker nodes in a particular region. This figure is as high as 100 % for a large subset of scenarios. 1 I.
Delay-bounded adaptive ufh-based anti-jamming wireless communication
- In IEEE INFOCOM
, 2011
"... Abstract—Anti-jamming communication without pre-shared secrets has gained increasing research interest recently and is commonly tackled by utilizing the technique of uncoordinated frequency hopping (UFH). Existing researches, however, are almost all based on ad hoc designs of frequency hopping strat ..."
Abstract
-
Cited by 9 (1 self)
- Add to MetaCart
(Show Context)
Abstract—Anti-jamming communication without pre-shared secrets has gained increasing research interest recently and is commonly tackled by utilizing the technique of uncoordinated frequency hopping (UFH). Existing researches, however, are almost all based on ad hoc designs of frequency hopping strategies, lacking of theoretical foundations for scheme design and performance evaluation. To fill this gap, this paper introduces the online optimization theory into the solution and, for the first time, makes thorough quantitative performance characterization possible for UFH-based anti-jamming communications. Specifically, we propose an efficient online UFH algorithm achieving asymptotic optimum and analytically prove its optimality under different message coding scenarios. Extensive simulative evaluations are conducted to validate our theoretical analysis under both oblivious and adaptive jamming strategies. I.
USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure
"... Abstract—Spread spectrum techniques (e.g., Frequency Hopping ..."
Abstract
-
Cited by 9 (4 self)
- Add to MetaCart
(Show Context)
Abstract—Spread spectrum techniques (e.g., Frequency Hopping
Thwarting Control-Channel Jamming Attacks from Inside Jammers
- IEEE TRANSACTIONS ON MOBILE COMPUTING
, 2012
"... Coordination of network functions in wireless networks requires frequent exchange of control messages among participating nodes. Typically, such messages are transmitted over a universally known communication channel referred to as the control channel. Due to its critical role, this channel can bec ..."
Abstract
-
Cited by 8 (2 self)
- Add to MetaCart
Coordination of network functions in wireless networks requires frequent exchange of control messages among participating nodes. Typically, such messages are transmitted over a universally known communication channel referred to as the control channel. Due to its critical role, this channel can become a prime target of Denial-of-Service (DoS) attacks. In this article, we address the problem of preventing control-channel DoS attacks manifested in the form of jamming. We consider a sophisticated adversary who has knowledge of the protocol specifics and of the cryptographic quantities used to secure network operations. This type of adversary cannot be prevented by anti-jamming techniques that rely on shared secrets, such as spread spectrum. We propose new security metrics to quantify the ability of the adversary to deny access to the control channel, and introduce a randomized distributed scheme that allows nodes to establish and maintain the control channel in the presence of the jammer. Our method is applicable to networks with static or dynamically allocated spectrum. Furthermore, we propose two algorithms for unique identification of the set of compromised nodes, one for independently acting nodes and one for colluding nodes. Detailed theoretical evaluation of the security metrics and extensive simulation results are provided to demonstrate the efficiency of our methods in mitigating jamming and identifying compromised nodes.
Thwarting inside jamming attacks on wireless broadcast communications
- In Proceedings of the fourth ACM conference on Wireless network security, WiSec ’11
, 2011
"... ABSTRACT We address the problem of jamming-resistant broadcast communications under an internal threat model. We propose a time-delayed broadcast scheme (TDBS), which implements the broadcast operation as a series of unicast transmissions, distributed in frequency and time. TDBS does not rely on co ..."
Abstract
-
Cited by 7 (2 self)
- Add to MetaCart
(Show Context)
ABSTRACT We address the problem of jamming-resistant broadcast communications under an internal threat model. We propose a time-delayed broadcast scheme (TDBS), which implements the broadcast operation as a series of unicast transmissions, distributed in frequency and time. TDBS does not rely on commonly shared secrets, or the existence of jammingimmune control channels for coordinating broadcasts. Instead, each node follows a unique pseudo-noise (PN) frequency hopping sequence. Contrary to conventional PN sequences designed for multi-access systems, our sequences exhibit high correlation to enable broadcast. Moreover, their design limits the information leakage due to the exposure of a subset of sequences by compromised nodes. We map the problem of constructing such PN sequences to the 1-factorization problem for complete graphs. Our evaluation results show that TDBS can maintain broadcast communications in the presence of inside jammers.