Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Anti-jamming broadcast communication using uncoordinated spread spectrum techniques

Published: 01 June 2010 Publication History

Abstract

Jamming-resistant communication is crucial for safety-critical applications such as emergency alert broadcasts or the dissemination of navigation signals in adversarial settings. In such applications, mission-critical messages are broadcast to a large and unknown number of (potentially untrusted) receivers that rely on the availability, integrity, and authenticity of the messages; here, availability primarily refers to the ability to communicate in the presence of jamming. Common techniques to counter jamming-based denial-of-service attacks such as Frequency Hopping (FH) and Direct Sequence Spread Spectrum (DSSS) cannot be applied in such settings because they depend on secret pairwise or group keys shared between the sender and the receivers before the communication. This dependency entails serious or unsolvable scalability and keysetup problems or weak jamming-resistance (a single malicious receiver can compromise the whole system). As a solution, in this work, we propose uncoordinated spread spectrum techniques that enable anti-jamming broadcast communication without shared secrets. Uncoordinated spread spectrum techniques can handle an unlimited amount of (malicious) receivers. We present two instances (Uncoordinated FH and Uncoordinated DSSS) and analyze differences in their performance as well as their combination. We further discuss the applications of these techniques to anti-jamming navigation broadcast, bootstrapping of coordinated spread spectrum communication, and anti-jamming emergency alerts.

References

[1]
R. A. Poisel, Modern Communications Jamming Principles and Techniques. Artech House Publishers, 2006.
[2]
D. Adamy, A first course in electronic warfare. Artech House, 2001.
[3]
B. Sklar, Digital communications: fundamentals and applications. Prentice-Hall, 2001.
[4]
M. Strasser, C. Pöpper, S. Čapkun, and M. Čagalj, "Jamming-resistant key establishment using uncoordinated frequency hopping," in Proc. IEEE Symposium on Security and Privacy, 2008.
[5]
C. Pöpper, M. Strasser, and S. Čapkun, "Jamming-resistant broadcast communication without shared keys," in Proc. 18th USENIX Security Symposium, The USENIX Association, 2009.
[6]
W. Hang, W. Zanji, and G. Jingbo, "Performance of DSSS against repeater jamming," in Proc. IEEE International Conference on Electronics, Circuits and Systems (ICECS), pp. 858-861, 2006.
[7]
M. Luby, "LT Codes," in Proc. 43rd Annual IEEE Symposium on Foundations of Computer Science (FOCS), 2002.
[8]
L. Nguyen, "Accumulators from Bilinear Pairings and Applications," in Topics in Cryptology - CT-RSA, vol. 3376/2005 of Lecture Notes in Computer Science, pp. 275-292, Springer Berlin/Heidelberg, 2005.
[9]
N. Bari and B. Pfitzmann, "Collision-Free Accumulators and Fail-Stop Signature Schemes Without Trees," in Advances in Cryptology EUROCRYPT, vol. 1233/1997 of Lecture Notes in Computer Science, pp. 480-494, Springer Berlin/Heidelberg, 1997.
[10]
M. Strasser, C. Pöpper, and S. Čapkun, "Efficient uncoordinated FHSS anti-jamming communication," in Proc. ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2009.
[11]
B. Natarajan, S. Das, and D. Stevens, "An evolutionary approach to designing complex spreading codes for DS-CDMA," IEEE Trans. Wireless Commun., vol. 4, no. 5, pp. 2051-2056, 2005.
[12]
D. V. Sarwate and M. B. Pursley, "Crosscorrelation properties of pseudorandom and related sequences," in Proc. IEEE, vol. 68, pp. 593- 619, May 1980.
[13]
Ettus, "Universal software radio peripheral (USRP)." http://www.ettus.com.
[14]
"GNU Radio Software." http://gnuradio.org/trac.
[15]
E. Hyytiä, T. Tirronen, and J. T. Virtamo, "Optimal degree distribution for LT codes with small message length," in Proc. IEEE International Conference on Computer Communications (Infocom), 2007.
[16]
U. Government, "Global positioning system." http://www.gps.gov, 2009.
[17]
I. L. Association, "LORAN: LOng Range Aid to Navigation." http://www.loran.org.
[18]
A. Bensky, Wireless Positioning Technologies and Applications. GNSS Technology and Applications Series, Artech House, 2008.
[19]
M. Kuhn, "An asymmetric security mechanism for navigation signals," in Proc. Information Hiding Workshop, 2004.
[20]
K. B. Rasmussen, S. Čapkun, and M. Čagalj, "SecNav: Secure broadcast localization and time synchronization in wireless networks," in Proc. Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 310-313, 2007.
[21]
P. Bahl and V. N. Padmanabhan, "RADAR: An in-building RF-based user location and tracking system," in Proc. IEEE International Conference on Computer Communications (Infocom), 2000.
[22]
N. O. Tippenhauer, K. B. Rasmussen, C. Pöpper, and S. Čapkun, "Attacks on public WLAN-based positioning," in Proc. ACM/Usenix International Conference on Mobile Systems, Applications and Services (MobiSys), 2009.
[23]
N. Space and M. S. Center, "Navstar global positioning system: Interface specification IS-GPS-200." http://www.losangeles.af.mil, March 2006.
[24]
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proc. ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2005.
[25]
M. Li, I. Koutsopoulos, and R. Poovendran, "Optimal jamming attacks and network defense policies in wireless sensor networks," in Proc. IEEE International Conference on Computer Communications (Infocom), 2007.
[26]
M. Čagalj, S. Čapkun, and J.-P. Hubaux, "Wormhole-based antijamming techniques in sensor networks," IEEE Trans. Mobile Comput., vol. 6, no. 1, pp. 100-114, 2007.
[27]
A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," IEEE Computer, vol. 35, pp. 54-62, Oct. 2002.
[28]
J. Chiang and Y.-C. Hu, "Dynamic jamming mitigation for wireless broadcast networks," in Proc. IEEE International Conference on Computer Communications (Infocom), 2008.
[29]
Y. Desmedt, R. Safavi-Naini, H. Wang, C. Charnes, and J. Pieprzyk, "Broadcast anti-jamming systems," in Proc. IEEE International Conference on Networks (ICON), p. 349, 1999.
[30]
G. Noubir and G. Lin, "Low-power DoS attacks in data wireless LANs and countermeasures," SIGMOBILE Mobile Computing and Communications Review, vol. 7, no. 3, pp. 29-30, 2003.
[31]
F. Stajano and R. J. Anderson, "The resurrecting duckling: Security issues for ad-hoc wireless networks," in Proc. 7th International Workshop on Security Protocols, Springer-Verlag, 2000.
[32]
J. M. McCune, A. Perrig, and M. K. Reiter, "Seeing-is-believing: Using camera phones for human-verifiable authentication," in Proc. IEEE Symposium on Security and Privacy, 2005.
[33]
M. T. Goodrich, M. Sirivianos, J. Solis, G. Tsudik, and E. Uzun, "Loud and clear: Human-verifiable authentication based on audio," in Proc. IEEE International Conference on Distributed Computing Systems, 2006.
[34]
S. Čapkun and M. Čagalj, "Integrity regions: authentication through presence in wireless networks," in Proc. 5th ACM workshop on Wireless Security (WiSe), pp. 1-10, 2006.
[35]
C. Gehrmann, C. J. Mitchell, and K. Nyberg, "Manual authentication for wireless devices," RSA Cryptobytes, vol. 7, no. 1, 2004.
[36]
L. C. Baird, W. L. Bahn, M. D. Collins, M. C. Carlisle, and S. C. Butler, "Keyless jam resistance," in Proc. IEEE Information Assurance and Security Workshop (IAW), pp. 143-150, June 2007.
[37]
S. Dolev, S. Gilbert, R. Guerraoui, and C. Newport, "Secure communication over radio channels," in Proc. 27th ACM symposium on Principles of Distributed Computing (PODC), 2008.
[38]
T. Jin, G. Noubir, and B. Thapa, "Zero pre-shared secret key establishment in the presence of jammers," in Proc. ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 219-228, ACM Press, 2009.
[39]
B. Awerbuch, A. Richa, and C. Scheideler, "A jamming-resistant MAC protocol for single-hop wireless networks," in Proc. ACM symposium on Principles of Distributed Computing (PODC), 2008.
[40]
S. Dolev, S. Gilbert, R. Guerraoui, and C. Newport, "Gossiping in a multi-channel radio network (an oblivious approach to coping with malicious interference)," in Proc. 21st International Symposium on Distributed Computing (DISC), pp. 208-222, 2007.
[41]
D. Meier, Y. A. Pignolet, S. Schmid, and R. Wattenhofer, "Speed dating despite jammers," in Proc. IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS), 2009.
[42]
S. Gilbert, R. Guerraoui, and C. Newport, "Of Malicious Motes and Suspicious Sensors," Theoretical Computer Science, vol. 410, no. 6-7, pp. 546-569, 2009.

Cited By

View all
  • (2024)CBTC Security and Reliability Enhancements by a Key-Based Direct Sequence Spread Spectrum TechniqueIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2023.331226625:1(159-172)Online publication date: 1-Jan-2024
  • (2023)Jamming Modulation: An Active Anti-Jamming SchemeIEEE Transactions on Wireless Communications10.1109/TWC.2022.321357222:4(2730-2743)Online publication date: 1-Apr-2023
  • (2022)Asymptotically Guaranteed Anti-Jamming Spread Spectrum Random Access Without Pre-Shared SecretIEEE Transactions on Information Forensics and Security10.1109/TIFS.2022.314071417(332-343)Online publication date: 1-Jan-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Journal on Selected Areas in Communications
IEEE Journal on Selected Areas in Communications  Volume 28, Issue 5
June 2010
139 pages

Publisher

IEEE Press

Publication History

Published: 01 June 2010
Revised: 15 October 2009
Received: 01 April 2009

Author Tags

  1. Anti-jamming
  2. Broadcast
  3. DSSS
  4. Frequency Hopping
  5. Spread Spectrum Communication
  6. Wireless Security
  7. anti-jamming
  8. broadcast
  9. frequency hopping
  10. spread spectrum communication
  11. wireless security

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 19 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)CBTC Security and Reliability Enhancements by a Key-Based Direct Sequence Spread Spectrum TechniqueIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2023.331226625:1(159-172)Online publication date: 1-Jan-2024
  • (2023)Jamming Modulation: An Active Anti-Jamming SchemeIEEE Transactions on Wireless Communications10.1109/TWC.2022.321357222:4(2730-2743)Online publication date: 1-Apr-2023
  • (2022)Asymptotically Guaranteed Anti-Jamming Spread Spectrum Random Access Without Pre-Shared SecretIEEE Transactions on Information Forensics and Security10.1109/TIFS.2022.314071417(332-343)Online publication date: 1-Jan-2022
  • (2022)Enabling Short Fragments for Uncoordinated Spread Spectrum CommunicationComputer Security - ESORICS 201410.1007/978-3-319-11203-9_28(488-507)Online publication date: 10-Mar-2022
  • (2022)Exclusion zone minimization and optimal operational mode selection for co‐existent geostationary and non‐geostationary satellitesInternational Journal of Satellite Communications and Networking10.1002/sat.143340:3(191-203)Online publication date: 11-Apr-2022
  • (2021)Sender-jump receiver-wait: A blind rendezvous algorithm for distributed cognitive radio networks2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)10.1109/PIMRC.2016.7794893(1-6)Online publication date: 10-Mar-2021
  • (2021)Improving 4G/5G air interface securityComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2021.108532201:COnline publication date: 24-Dec-2021
  • (2021)User cooperation to mitigate the jamming in OFDMA networksWireless Networks10.1007/s11276-020-02519-527:2(1215-1231)Online publication date: 1-Feb-2021
  • (2020)Cracking Channel Hopping Sequences and Graph Routes in Industrial TSCH NetworksACM Transactions on Internet Technology10.1145/337288120:3(1-28)Online publication date: 31-Jul-2020
  • (2019)Cracking the channel hopping sequences in IEEE 802.15.4e-based industrial TSCH networksProceedings of the International Conference on Internet of Things Design and Implementation10.1145/3302505.3310075(130-141)Online publication date: 15-Apr-2019
  • Show More Cited By

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media