ABSTRACT
In this paper, we introduce a lightweight, fully distributed, and probabilistic protocol---Freedom of Speech (FoS)---that assures the delivery of a message to be broadcast (to N nodes) notwithstanding the presence of a powerful jammer. FoS enjoys several features when compared to competing schemes: it requires each node to store just N symmetric pairwise keys; node joining and node eviction require just minimal intervention on the already operating nodes; and, it is highly efficient in terms of required computation and message exchange.
We provide a thorough analysis on the number of communications required by FoS to broadcast a message. We show that FoS is comparable to the state of the art solution under a realistic scenario, while it enjoys unique properties such as an optimal network reconfiguration and low overhead as for both computation and storage Extensive simulations support our findings.
- A. Cassola, T. Jin, G. Noubir, and B. Thapa. Efficient spread spectrum communication without preshared secrets. Mobile Computing, IEEE Transactions on, 12(8):1669--1680, Aug 2013. Google ScholarDigital Library
- R. Di Pietro and G. Oligeri. Silence is Golden: exploiting jamming and radio silence to communicate. Transactions on Information and System Security, 17:1--24. Google ScholarDigital Library
- R. Di Pietro and G. Oligeri. Coke crypto-less over-the-air key establishment. Information Forensics and Security, IEEE Transactions on, 8(1):163--173, Jan 2013. Google ScholarDigital Library
- R. Di Pietro and G. Oligeri. Jamming mitigation in cognitive radio networks. Network, IEEE, 27(3):10--15, May 2013.Google ScholarCross Ref
- R. Di Pietro and G. Oligeri. ESC: An efficient, scalable, and crypto-less solution to secure wireless networks. To appear in Computer Netowrks, Elseviers, 2015.Google Scholar
- J. Elson and D. Estrin. Time synchronization for wireless sensor networks. IPDPS '01, pages 186--, 2001.Google Scholar
- A. Fathy, A. Aqil, s. singh, I. Broustis, K. Sundaresan, and S. Krishnamurthy. Exploiting subcarrier agility to alleviate active jamming attacks in wireless networks. Mobile Computing, IEEE Transactions on, PP(99):1--1, 2015.Google Scholar
- Y. He, Y. Cheng, Y. Yang, G. Wu, B. Dong, and S. Li. A subset-based coherent FFH system. Communications Letters, IEEE, 19(2):199--202, Feb 2015.Google ScholarCross Ref
- T. Jin, G. Noubir, and B. Thapa. Zero pre-shared secret key establishment in the presence of jammers. In MobiHoc '09, pages 219--228, 2009. Google ScholarDigital Library
- Y. Lee, T. Yoon, S. Yoo, S. Y. Kim, and S. Yoon. Performance analysis of a css system with m-ary psk in the presence of jamming signals. In VTC Spring 2009, pages 1--5, april 2009.Google ScholarCross Ref
- S. Liu, L. Lazos, and M. Krunz. Thwarting inside jamming attacks on wireless broadcast communications. WiSec '11, pages 29--40, 2011. Google ScholarDigital Library
- S. Liu, L. Lazos, and M. Krunz. Time-delayed broadcasting for defeating inside jammers. Dependable and Secure Computing, IEEE Transactions on, (99):1--1, 2014.Google Scholar
- Y. Liu, P. Ning, H. Dai, and A. Liu. Randomized differential dsss: Jamming-resistant wireless broadcast communication. In INFOCOM, pages 695--703, 2010. Google ScholarDigital Library
- C. Pöpper, M. Strasser, and S. Capkun. Jamming-resistant broadcast communication without shared keys. In USENIX, pages 231--248, 2009. Google ScholarDigital Library
- O. Punal, C. Pereira, A. Aguiar, and J. Gross. Experimental characterization and modeling of RF jamming attacks on vanets. Vehicular Technology, IEEE Transactions on, 64(2):524--540, Feb 2015.Google Scholar
- L. Sang and A. Arora. Capabilities of low-power wireless jammers. In INFOCOM, pages 2551--2555, 2009.Google ScholarCross Ref
- M. Strasser, C. Pöpper, S. Capkun, and M. Cagalj. Jamming-resistant key establishment using uncoordinated frequency hopping. In IEEE SSP'2008, pages 64--78, 2008. Google ScholarDigital Library
- H. Wang, J. Guo, and Z. Wang. Evaluation of security for dsss under repeater jamming. In ICC '07, pages 5525--5530, june 2007.Google ScholarCross Ref
Index Terms
- Freedom of speech: thwarting jammers via a probabilistic approach
Recommendations
Enabling broadcast communications in presence of jamming via probabilistic pairing
This paper presents a thorough analysis of Freedom of Speech (FoS): a lightweight, fully distributed, and probabilistic protocol that assures the delivery of a message to be broadcast notwithstanding the presence of a jammer.FoS enjoys several features ...
Thwarting inside jamming attacks on wireless broadcast communications
WiSec '11: Proceedings of the fourth ACM conference on Wireless network securityWe address the problem of jamming-resistant broadcast communications under an internal threat model. We propose a time-delayed broadcast scheme (TDBS), which implements the broadcast operation as a series of unicast transmissions, distributed in ...
Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure
ACSAC '10: Proceedings of the 26th Annual Computer Security Applications ConferenceSpread spectrum techniques such as Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping (FH) have been commonly used for anti-jamming wireless communication. However, traditional spread spectrum techniques require that sender and receivers share ...
Comments