Silence is Golden: Exploiting Jamming and Radio Silence to Communicate

Jamming techniques require only moderate resources to be deployed, while their effectiveness in disrupting communications is unprecedented. In this article, we introduce several contributions to jamming mitigation. In particular, we introduce a novel adversary model that has both (unlimited) jamming reactive capabilities as well as powerful (but limited) proactive jamming capabilities. Under this adversary model, to the best of our knowledge more powerful than any other adversary model addressed in the literature, the communication bandwidth provided by current anti-jamming solutions drops to zero. We then present Silence is Golden (SiG): a novel anti-jamming protocol that, introducing a tunable, asymmetric communication channel, is able to mitigate the adversary capabilities, enabling the parties to communicate. For instance, with SiG it is possible to deliver a 128-bits-long message with a probability greater than 99% in 4096 time slots despite the presence of a jammer that jams all on-the-fly communications and 74% of the silent radio spectrum—while competing proposals simply fail. Moreover, when SiG is used in a scenario in which the adversary can jam only a subset of all the available frequencies, performance experiences a boost: a 128-bits-long message is delivered within just 17 time slots for an adversary able to jam 90% of the available frequencies. We present a thorough theoretical analysis for the solution, which is supported by extensive simulation results, showing the viability of our proposal.

[1]  Sriram Vishwanath,et al.  Communication Through Jamming Over a Slotted ALOHA Channel , 2008, IEEE Transactions on Information Theory.

[2]  Christian Scheideler,et al.  A jamming-resistant MAC protocol for single-hop wireless networks , 2008, PODC '08.

[3]  Christian Scheideler,et al.  An Efficient and Fair MAC Protocol Robust to Reactive Interference , 2013, IEEE/ACM Transactions on Networking.

[4]  Sisi Liu,et al.  Thwarting Control-Channel Jamming Attacks from Inside Jammers , 2012, IEEE Transactions on Mobile Computing.

[5]  Nam P. Nguyen,et al.  A Trigger Identification Service for Defending Reactive Jammers in WSN , 2012, IEEE Transactions on Mobile Computing.

[6]  Christina Fragouli,et al.  Silence Based Communication for Sensor Networks , 2006, 2006 IEEE International Symposium on Information Theory.

[7]  Roberto Di Pietro,et al.  COKE Crypto-Less Over-the-Air Key Establishment , 2013, IEEE Transactions on Information Forensics and Security.

[8]  Juan Soto Randomness Testing of the Advanced Encryption Standard Candidate Algorithms , 1999 .

[9]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[10]  Roberto Di Pietro,et al.  Jamming mitigation in cognitive radio networks , 2013, IEEE Network.

[11]  Srdjan Capkun,et al.  Secure Time Synchronization in Sensor Networks , 2008, TSEC.

[12]  Triet Vo Huu,et al.  Counter-jamming using mixed mechanical and software interference cancellation , 2013, WiSec '13.

[13]  Sisi Liu,et al.  Thwarting inside jamming attacks on wireless broadcast communications , 2011, WiSec '11.

[14]  Peng Ning,et al.  BitTrickle: Defending against broadband and high-power reactive jamming attacks , 2012, 2012 Proceedings IEEE INFOCOM.

[15]  Srdjan Capkun,et al.  Anti-jamming broadcast communication using uncoordinated spread spectrum techniques , 2010, IEEE Journal on Selected Areas in Communications.

[16]  Raghupathy Sivakumar,et al.  Challenges: communication through silence in wireless sensor networks , 2005, MobiCom '05.

[17]  Donald E. Eastlake,et al.  US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.

[18]  Anthony Ephremides,et al.  Covert channels in ad-hoc wireless networks , 2010, Ad Hoc Networks.

[19]  Guevara Noubir,et al.  On link layer denial of service in data wireless LANs , 2005, Wirel. Commun. Mob. Comput..

[20]  S. Shafiee,et al.  Capacity of multiple access channels with correlated jamming , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[21]  Richard A. Poisel,et al.  Modern Communications Jamming Principles and Techniques , 2003 .

[22]  William Stallings,et al.  THE ADVANCED ENCRYPTION STANDARD , 2002, Cryptologia.

[23]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[24]  Christina Fragouli,et al.  Silence is golden and time is money: power-aware communication for sensor networks , 2005 .

[25]  Rachid Guerraoui,et al.  Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks , 2009, Theor. Comput. Sci..

[26]  Philippe Piret,et al.  Bounds and constructions for binary asymmetric error-correcting codes , 1981, IEEE Trans. Inf. Theory.

[27]  Ramjee Prasad,et al.  Strategies for adaptive frequency hopping in the unlicensed bands , 2006, IEEE Wireless Communications.

[28]  I. Reed,et al.  Polynomial Codes Over Certain Finite Fields , 1960 .

[29]  David J. Thuente,et al.  Jamming Vulnerabilities of IEEE 802.11e , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[30]  Ravi Sandhu,et al.  ACM Transactions on Information and System Security: Editorial , 2005 .

[31]  Dinko Begusic,et al.  Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User , 2012, IEEE Transactions on Mobile Computing.

[32]  Tao Jin,et al.  Efficient Spread Spectrum Communication without Preshared Secrets , 2013, IEEE Transactions on Mobile Computing.

[33]  Zhiguo Ding,et al.  Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks , 2012, IEEE Transactions on Wireless Communications.

[34]  L.C. Baird,et al.  Keyless Jam Resistance , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.

[35]  Srdjan Capkun,et al.  Detection of reactive jamming in sensor networks , 2010, TOSN.

[36]  Ali Hamieh,et al.  POWJAM: A power reaction system against jamming attacks in wireless ad hoc networks , 2012, 2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS).