Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution

The use of distinct, dedicated communication channels to transmit data and control traffic introduces a single point of failure for a denial of service attack, in that an adversary may be able to jam control channel traffic and prevent relevant data traffic. Hence, it is of interest to design control channel access schemes which are resilient to jamming. We map the problem of providing resilient control channel access under jamming to that of secure communication channel establishment. We propose the use of random key distribution to hide the location of control channels in time and/or frequency. We evaluate performance metrics of resilience to control channel jamming, identification of compromised users, and delay due to jamming as a function of the number of compromised users.

[1]  Radha Poovendran,et al.  A canonical seed assignment model for key predistribution in wireless sensor networks , 2007, TOSN.

[2]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[3]  Radha Poovendran,et al.  Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[4]  K. Engel Sperner Theory , 1996 .

[5]  Frank Harary,et al.  Graph Theory , 2016 .

[6]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[7]  Xin Liu,et al.  Broadcast Control Channel Jamming: Resilience and Identification of Traitors , 2007, 2007 IEEE International Symposium on Information Theory.

[8]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[9]  Konrad Engel,et al.  Sperner Theory: Index , 1996 .

[10]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[11]  Ron M. Roth,et al.  Introduction to Coding Theory , 2019, Discrete Mathematics.

[12]  Joong Soo Ma,et al.  Mobile Communications , 2003, Lecture Notes in Computer Science.

[13]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[14]  Radha Poovendran,et al.  Modeling adaptive node capture attacks in multi-hop wireless networks , 2007, Ad Hoc Networks.