skip to main content
10.1145/2508222.2508233acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Redundancy offset narrow spectrum: countermeasure for signal-cancellation based jamming

Authors Info & Claims
Published:03 November 2013Publication History

ABSTRACT

Correlated jamming, introduced in the 1980's as the optimal interference signal in information theory, aims to cancel the target victim signal in contrast to the more traditional jamming approach of adding noise-like interference. The recent surge of antenna-cancellation based technology with benign intention (including full duplex radio technology and friendly jamming for confidentiality) has reignited interest in correlated jamming attack in wireless security.

Randomization is an effective technique for availability against such attacks; for instance, spread spectrum technology randomizes the channel access to counter jamming. However, spread spectrum technology assumes dividing the medium into multiple orthogonal channels, only one of which is accessed per time, and thus has an inherent spreading cost. Redundancy Offset Narrow Spectrum (RONS) offers a narrow spectrum technology that bypasses the spreading cost and effectively counters correlated jamming and further helps ensuring confidentiality.

References

  1. J. I. Choi, M. Jain, K. Srinivasan, P. Levis, and S. Katti, "Achieving single channel, full duplex wireless communication," in Proceedings of the sixteenth annual international conference on Mobile computing and networking, MobiCom '10. New York, NY, USA: ACM, 2010, pp. 1--12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu, "They can hear your heartbeats: non-invasive security for implantable medical devices," in Proceedings of the ACM SIGCOMM 2011 conference. New York, NY, USA: ACM, 2011, pp. 2--13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. Dolev and A. C. Yao, "On the security of public key protocols," Information Theory, IEEE Transactions on, vol. 29, no. 2, pp. 198--208, 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. R. Pickholtz, D. Schilling, and L. Milstein, "Theory of spread-spectrum communications tutorial," IEEE Transactions on Communications, pp. 855--884, May 1982.Google ScholarGoogle ScholarCross RefCross Ref
  5. M. Simon, J. Omura, R. Scholtz, and B. Levitt, Spread spectrum communications handbook. McGraw-Hill: New York, Mar. 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Chiang and Y. Hu, "Dynamic jamming mitigation for wireless broadcast networks," in IEEE INFOCOM, Phoenix, AZ, USA, Apr. 2008, pp. 1211--1219.Google ScholarGoogle Scholar
  7. M. Strasser, S. Capkun, C. Popper, and M. Cagalj, "Jamming-resistant key establishment using uncoordinated frequency hopping," in Security and Privacy, 2008. SP 2008. IEEE Symposium on, Oakland, CA, USA, May 2008, pp. 64--78. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S.-Y. Chang, Y.-C. Hu, and N. Laurenti, "SimpleMAC: a jamming-resilient mac-layer protocol for wireless channel coordination," in Proceedings of the 18th annual international conference on Mobile computing and networking, MobiCom '12, Istanbul, Turkey, 2012, pp. 77--88. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. B. Awerbuch, A. Richa, and C. Scheideler, "A jamming-resistant MAC protocol for single-hop wireless networks," in PODC, Aug. 2008, pp. 45--54. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. T. Basar, "The Gaussian test channel with an intelligent jammer," IEEE Trans. Info. Theory, vol. 29, no. 1, pp. 152--157, Jan. 1983. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Kashyap, T. Basar, and R. Srikant, "Correlated jamming on MIMO Gaussian fading channels," in IEEE ICC, vol. 1, Jun. 2004, pp. 458--462.Google ScholarGoogle Scholar
  12. M. Medard, "Capacity of correlated jamming channels," in Allerton Conference on Communications, Computing and Control, Monticello, IL, USA, 1998.Google ScholarGoogle Scholar
  13. L. Baird, W. Bahn, M. Collins, M. Carlisle, and S. Butler, "Keyless jam resistance," in Information Assurance and Security Workshop, Jun. 2007, pp. 143--150.Google ScholarGoogle Scholar
  14. C. Pöpper, N. O. Tippenhauer, B. Danev, and S. Capkun, "Investigation of signal and message manipulations on the wireless channel," in Proceedings of the 16th European conference on Research in computer security, ESORICS '11. Berlin, Heidelberg: Springer-Verlag, 2011, pp. 40--59. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Capkun, M. Cagalj, R. Rengaswamy, I. Tsigkogiannis, J.-P. Hubaux, and M. Srivastava, "Integrity codes: Message integrity protection and authentication over insecure channels," Dependable and Secure Computing, IEEE Transactions on, vol. 5, no. 4, pp. 208--223, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. O. Bakr and R. Mudumbai, "A new jamming technique for secrecy in multi-antenna wireless networks," in IEEE International Symposium on Information Theory Proceedings, ISIT '10, Austin, TX, USA, 2010, pp. 2513--2517.Google ScholarGoogle Scholar
  17. "IEEE std 802.11a," IEEE Std. Association. {Online}. Available: http://standards.ieee.org/getieee802/download/802.11a-1999.pdfGoogle ScholarGoogle Scholar

Index Terms

  1. Redundancy offset narrow spectrum: countermeasure for signal-cancellation based jamming

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          MobiWac '13: Proceedings of the 11th ACM international symposium on Mobility management and wireless access
          November 2013
          168 pages
          ISBN:9781450323550
          DOI:10.1145/2508222

          Copyright © 2013 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 3 November 2013

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          MobiWac '13 Paper Acceptance Rate21of68submissions,31%Overall Acceptance Rate83of272submissions,31%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader