skip to main content
10.1145/2766498.2766515acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
short-paper

Freedom of speech: thwarting jammers via a probabilistic approach

Published:22 June 2015Publication History

ABSTRACT

In this paper, we introduce a lightweight, fully distributed, and probabilistic protocol---Freedom of Speech (FoS)---that assures the delivery of a message to be broadcast (to N nodes) notwithstanding the presence of a powerful jammer. FoS enjoys several features when compared to competing schemes: it requires each node to store just N symmetric pairwise keys; node joining and node eviction require just minimal intervention on the already operating nodes; and, it is highly efficient in terms of required computation and message exchange.

We provide a thorough analysis on the number of communications required by FoS to broadcast a message. We show that FoS is comparable to the state of the art solution under a realistic scenario, while it enjoys unique properties such as an optimal network reconfiguration and low overhead as for both computation and storage Extensive simulations support our findings.

References

  1. A. Cassola, T. Jin, G. Noubir, and B. Thapa. Efficient spread spectrum communication without preshared secrets. Mobile Computing, IEEE Transactions on, 12(8):1669--1680, Aug 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Di Pietro and G. Oligeri. Silence is Golden: exploiting jamming and radio silence to communicate. Transactions on Information and System Security, 17:1--24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. Di Pietro and G. Oligeri. Coke crypto-less over-the-air key establishment. Information Forensics and Security, IEEE Transactions on, 8(1):163--173, Jan 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. R. Di Pietro and G. Oligeri. Jamming mitigation in cognitive radio networks. Network, IEEE, 27(3):10--15, May 2013.Google ScholarGoogle ScholarCross RefCross Ref
  5. R. Di Pietro and G. Oligeri. ESC: An efficient, scalable, and crypto-less solution to secure wireless networks. To appear in Computer Netowrks, Elseviers, 2015.Google ScholarGoogle Scholar
  6. J. Elson and D. Estrin. Time synchronization for wireless sensor networks. IPDPS '01, pages 186--, 2001.Google ScholarGoogle Scholar
  7. A. Fathy, A. Aqil, s. singh, I. Broustis, K. Sundaresan, and S. Krishnamurthy. Exploiting subcarrier agility to alleviate active jamming attacks in wireless networks. Mobile Computing, IEEE Transactions on, PP(99):1--1, 2015.Google ScholarGoogle Scholar
  8. Y. He, Y. Cheng, Y. Yang, G. Wu, B. Dong, and S. Li. A subset-based coherent FFH system. Communications Letters, IEEE, 19(2):199--202, Feb 2015.Google ScholarGoogle ScholarCross RefCross Ref
  9. T. Jin, G. Noubir, and B. Thapa. Zero pre-shared secret key establishment in the presence of jammers. In MobiHoc '09, pages 219--228, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Y. Lee, T. Yoon, S. Yoo, S. Y. Kim, and S. Yoon. Performance analysis of a css system with m-ary psk in the presence of jamming signals. In VTC Spring 2009, pages 1--5, april 2009.Google ScholarGoogle ScholarCross RefCross Ref
  11. S. Liu, L. Lazos, and M. Krunz. Thwarting inside jamming attacks on wireless broadcast communications. WiSec '11, pages 29--40, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Liu, L. Lazos, and M. Krunz. Time-delayed broadcasting for defeating inside jammers. Dependable and Secure Computing, IEEE Transactions on, (99):1--1, 2014.Google ScholarGoogle Scholar
  13. Y. Liu, P. Ning, H. Dai, and A. Liu. Randomized differential dsss: Jamming-resistant wireless broadcast communication. In INFOCOM, pages 695--703, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. C. Pöpper, M. Strasser, and S. Capkun. Jamming-resistant broadcast communication without shared keys. In USENIX, pages 231--248, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. O. Punal, C. Pereira, A. Aguiar, and J. Gross. Experimental characterization and modeling of RF jamming attacks on vanets. Vehicular Technology, IEEE Transactions on, 64(2):524--540, Feb 2015.Google ScholarGoogle Scholar
  16. L. Sang and A. Arora. Capabilities of low-power wireless jammers. In INFOCOM, pages 2551--2555, 2009.Google ScholarGoogle ScholarCross RefCross Ref
  17. M. Strasser, C. Pöpper, S. Capkun, and M. Cagalj. Jamming-resistant key establishment using uncoordinated frequency hopping. In IEEE SSP'2008, pages 64--78, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. H. Wang, J. Guo, and Z. Wang. Evaluation of security for dsss under repeater jamming. In ICC '07, pages 5525--5530, june 2007.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Freedom of speech: thwarting jammers via a probabilistic approach

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                WiSec '15: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks
                June 2015
                256 pages
                ISBN:9781450336239
                DOI:10.1145/2766498

                Copyright © 2015 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 22 June 2015

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • short-paper

                Acceptance Rates

                Overall Acceptance Rate98of338submissions,29%

                Upcoming Conference

                WiSec '24

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader