ABSTRACT
Correlated jamming, introduced in the 1980's as the optimal interference signal in information theory, aims to cancel the target victim signal in contrast to the more traditional jamming approach of adding noise-like interference. The recent surge of antenna-cancellation based technology with benign intention (including full duplex radio technology and friendly jamming for confidentiality) has reignited interest in correlated jamming attack in wireless security.
Randomization is an effective technique for availability against such attacks; for instance, spread spectrum technology randomizes the channel access to counter jamming. However, spread spectrum technology assumes dividing the medium into multiple orthogonal channels, only one of which is accessed per time, and thus has an inherent spreading cost. Redundancy Offset Narrow Spectrum (RONS) offers a narrow spectrum technology that bypasses the spreading cost and effectively counters correlated jamming and further helps ensuring confidentiality.
- J. I. Choi, M. Jain, K. Srinivasan, P. Levis, and S. Katti, "Achieving single channel, full duplex wireless communication," in Proceedings of the sixteenth annual international conference on Mobile computing and networking, MobiCom '10. New York, NY, USA: ACM, 2010, pp. 1--12. Google ScholarDigital Library
- S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu, "They can hear your heartbeats: non-invasive security for implantable medical devices," in Proceedings of the ACM SIGCOMM 2011 conference. New York, NY, USA: ACM, 2011, pp. 2--13. Google ScholarDigital Library
- D. Dolev and A. C. Yao, "On the security of public key protocols," Information Theory, IEEE Transactions on, vol. 29, no. 2, pp. 198--208, 1983. Google ScholarDigital Library
- R. Pickholtz, D. Schilling, and L. Milstein, "Theory of spread-spectrum communications tutorial," IEEE Transactions on Communications, pp. 855--884, May 1982.Google ScholarCross Ref
- M. Simon, J. Omura, R. Scholtz, and B. Levitt, Spread spectrum communications handbook. McGraw-Hill: New York, Mar. 1994. Google ScholarDigital Library
- J. Chiang and Y. Hu, "Dynamic jamming mitigation for wireless broadcast networks," in IEEE INFOCOM, Phoenix, AZ, USA, Apr. 2008, pp. 1211--1219.Google Scholar
- M. Strasser, S. Capkun, C. Popper, and M. Cagalj, "Jamming-resistant key establishment using uncoordinated frequency hopping," in Security and Privacy, 2008. SP 2008. IEEE Symposium on, Oakland, CA, USA, May 2008, pp. 64--78. Google ScholarDigital Library
- S.-Y. Chang, Y.-C. Hu, and N. Laurenti, "SimpleMAC: a jamming-resilient mac-layer protocol for wireless channel coordination," in Proceedings of the 18th annual international conference on Mobile computing and networking, MobiCom '12, Istanbul, Turkey, 2012, pp. 77--88. Google ScholarDigital Library
- B. Awerbuch, A. Richa, and C. Scheideler, "A jamming-resistant MAC protocol for single-hop wireless networks," in PODC, Aug. 2008, pp. 45--54. Google ScholarDigital Library
- T. Basar, "The Gaussian test channel with an intelligent jammer," IEEE Trans. Info. Theory, vol. 29, no. 1, pp. 152--157, Jan. 1983. Google ScholarDigital Library
- A. Kashyap, T. Basar, and R. Srikant, "Correlated jamming on MIMO Gaussian fading channels," in IEEE ICC, vol. 1, Jun. 2004, pp. 458--462.Google Scholar
- M. Medard, "Capacity of correlated jamming channels," in Allerton Conference on Communications, Computing and Control, Monticello, IL, USA, 1998.Google Scholar
- L. Baird, W. Bahn, M. Collins, M. Carlisle, and S. Butler, "Keyless jam resistance," in Information Assurance and Security Workshop, Jun. 2007, pp. 143--150.Google Scholar
- C. Pöpper, N. O. Tippenhauer, B. Danev, and S. Capkun, "Investigation of signal and message manipulations on the wireless channel," in Proceedings of the 16th European conference on Research in computer security, ESORICS '11. Berlin, Heidelberg: Springer-Verlag, 2011, pp. 40--59. Google ScholarDigital Library
- S. Capkun, M. Cagalj, R. Rengaswamy, I. Tsigkogiannis, J.-P. Hubaux, and M. Srivastava, "Integrity codes: Message integrity protection and authentication over insecure channels," Dependable and Secure Computing, IEEE Transactions on, vol. 5, no. 4, pp. 208--223, 2008. Google ScholarDigital Library
- O. Bakr and R. Mudumbai, "A new jamming technique for secrecy in multi-antenna wireless networks," in IEEE International Symposium on Information Theory Proceedings, ISIT '10, Austin, TX, USA, 2010, pp. 2513--2517.Google Scholar
- "IEEE std 802.11a," IEEE Std. Association. {Online}. Available: http://standards.ieee.org/getieee802/download/802.11a-1999.pdfGoogle Scholar
Index Terms
- Redundancy offset narrow spectrum: countermeasure for signal-cancellation based jamming
Recommendations
Jam Sessions: Analysis and Experimental Evaluation of Advanced Jamming Attacks in MIMO Networks
Mobihoc '19: Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and ComputingRecent research advances in wireless security have shown that advanced jamming can significantly decrease the performance of wireless communications. In advanced jamming, the adversary intentionally concentrates the available energy budget on specific ...
SimpleMAC: a jamming-resilient MAC-layer protocol for wireless channel coordination
Mobicom '12: Proceedings of the 18th annual international conference on Mobile computing and networkingIn wireless networks, users share a transmission medium. To increase the efficiency of channel usage, wireless systems often use a Medium Access Control (MAC) protocol to perform channel coordination by having each node announce its usage intentions; ...
On the impact of jamming attacks on cooperative spectrum sensing in cognitive radio networks
CSIIRW '13: Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research WorkshopCognitive Radio (CR) Networks have been identified in recent literature as having great potential in realizing distributed shared communications, especially the ability to ensure broadband access of limited resources by opportunistically sharing ...
Comments