skip to main content
10.1145/2799979.2800008acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

A new algorithm for unkeyed jam resistance

Published:08 September 2015Publication History

ABSTRACT

An important problem for secure communication is that of achieving jam resistance, without any prior shared secret between the sender and receiver, and without limits on the assumed computational power of the attacker. To date, only one system has been proposed for this, the BBC system, which is based on coding theory using codes derived from arbitrary hash functions. It is unfortunate that only one, narrow solution has been found for this important problem. We now propose a new algorithm for this problem: the HBT algorithm. It is very different from BBC, using codes based on monotone Boolean functions (MBF), rather than hash functions. It is also more general. We show that despite being very different from BBC, the latter can be viewed as a special case of it. In fact, a theorem proves that all such codes are special cases of this new system. We give empirical results suggesting that this new approach is useful, and describe directions for future research.

References

  1. Leemon C. III Baird and William L. Bahn. An efficient correlator for implementations of bbc jam resistance. Technical Report USAFA-TR-2009-ACCR-02, U. S. Air Force Academy, Academy Center for Cyberspace Research, Nov 2009.Google ScholarGoogle Scholar
  2. Leemon C. III Baird, William L. Bahn, Michael D. Collins, Martin C. Carlisle, and Sean Butler. Keyless jam resistance. In Proceedings of the 8th Annual IEEE SMC Information Assurance Workshop (IAW), pages 143--150, June 20--22 2007.Google ScholarGoogle ScholarCross RefCross Ref
  3. Jack P. F. Glas. On multiple access interference in a ds/ffh spread spectrum communication system. In In the proc of the Third IEEE International Symposiumon Spread Spectrum Techniquesand Applications, July 1994.Google ScholarGoogle ScholarCross RefCross Ref
  4. Leemon C. Baird III, William L. Bahn, and Michael D. Collins. Jam-resistant communication without shared secrets through the use of concurrent codes. U. S. Air Force Academy Technical Report, February 2007.Google ScholarGoogle Scholar
  5. E. G. Kanterakis. A novel technique for narrowband/broadband interference excision in ds-ss communications. In MILCOM '94, volume 2, pages 628--632, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  6. W. H. Kautz and R. C. Singleton. Nonrandom binary superimposed codes. IEEE Transactions on Information Theory, pages 363--377, 1964. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. L. Li and L. Milstein. Rejection of pulsed cw interference in pn spread-spectrum systemsusing complex adaptive. In IEEE Trans. Commun, 1994.Google ScholarGoogle Scholar

Index Terms

  1. A new algorithm for unkeyed jam resistance

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SIN '15: Proceedings of the 8th International Conference on Security of Information and Networks
          September 2015
          350 pages
          ISBN:9781450334532
          DOI:10.1145/2799979

          Copyright © 2015 ACM

          Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of the United States government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 8 September 2015

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          SIN '15 Paper Acceptance Rate34of92submissions,37%Overall Acceptance Rate102of289submissions,35%
        • Article Metrics

          • Downloads (Last 12 months)1
          • Downloads (Last 6 weeks)0

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader