Cross-layer jamming detection and mitigation in wireless broadcast networks

Mobile communication systems are often susceptible to high level of noise injected by adversaries, known as jamming attack. Jamming is difficult to prevent in broadcast networks because a user that can decode a transmission can also jam the transmission. In this paper, we describe a code tree system that helps the physical layer circumvent jammers. This system works with any spread-spectrum communications system. In our system, the transmitter has more information than any single receiver. Each receiver cooperates with the transmitter to detect any jamming that affects that receiver. Our scheme mitigates the jamming attack while allowing the transmitter to transmit on fewer codes than the number of users. We simulated our system in a theoretical setting using MATLAB. The result shows significant improvement over naively transmitting on a single shared code.

[1]  Mohamed G. Gouda,et al.  Secure group communications using key graphs , 2000, TNET.

[2]  Markus G. Kuhn,et al.  An Asymmetric Security Mechanism for Navigation Signals , 2004, Information Hiding.

[3]  Sanjiv Nanda,et al.  Evolution of wireless data services: IS-95 to cdma2000 , 1998, IEEE Commun. Mag..

[4]  Vikas Kawadia,et al.  Power control and clustering in ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[5]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[6]  Srdjan Capkun,et al.  Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[7]  Jian Ren,et al.  Physical layer built-in security analysis and enhancement of CDMA systems , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[8]  M.E. Hellman,et al.  Privacy and authentication: An introduction to cryptography , 1979, Proceedings of the IEEE.

[9]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[10]  Deborah Estrin,et al.  Advances in network simulation , 2000, Computer.

[11]  B. Widrow,et al.  Adaptive antenna systems , 1967 .

[12]  David E. Culler,et al.  SPINS: Security Protocols for Sensor Networks , 2001, MobiCom '01.

[13]  A. Viterbi CDMA: Principles of Spread Spectrum Communication , 1995 .

[14]  William L. Bahn,et al.  The use of concurrent codes in computer programming and digital signal processing education , 2007 .

[15]  L. B. Milstein,et al.  Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.

[16]  Ralph C. Merkle,et al.  Secure communications over insecure channels , 1978, CACM.

[17]  Timothy X. Brown,et al.  Jamming and sensing of encrypted wireless ad hoc networks , 2006, MobiHoc '06.

[18]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[19]  J. S. Lee,et al.  Overview of the technical basis of Qualcomm's CDMA cellular telephone system design: a view of North American TIA/EIA IS-95 , 1994, Proceedings of ICCS '94.

[20]  Alan T. Sherman,et al.  Key Establishment in Large Dynamic Groups Using One-Way Function Trees , 2003, IEEE Trans. Software Eng..