Thwarting inside jamming attacks on wireless broadcast communications

We address the problem of jamming-resistant broadcast communications under an internal threat model. We propose a time-delayed broadcast scheme (TDBS), which implements the broadcast operation as a series of unicast transmissions, distributed in frequency and time. TDBS does not rely on commonly shared secrets, or the existence of jamming-immune control channels for coordinating broadcasts. Instead, each node follows a unique pseudo-noise (PN) frequency hopping sequence. Contrary to conventional PN sequences designed for multi-access systems, our sequences exhibit high correlation to enable broadcast. Moreover, their design limits the information leakage due to the exposure of a subset of sequences by compromised nodes. We map the problem of constructing such PN sequences to the 1-factorization problem for complete graphs. Our evaluation results show that TDBS can maintain broadcast communications in the presence of inside jammers.

[1]  Douglas R Stinson,et al.  Contemporary design theory : a collection of surveys , 1992 .

[2]  N. Shroff,et al.  Distributed Scheduling Schemes for Throughput Guarantees in Wireless Networks , 2007 .

[3]  W. Marsden I and J , 2012 .

[4]  Radha Poovendran,et al.  Mitigation of Control Channel Jamming under Node Capture Attacks , 2009, IEEE Transactions on Mobile Computing.

[5]  W. D. Wallis,et al.  On one-factorizations of complete graphs , 1973, Journal of the Australian Mathematical Society.

[6]  Guevara Noubir,et al.  Low-power DoS attacks in data wireless LANs and countermeasures , 2003, MOCO.

[7]  Alexander Rosa,et al.  One-factorizations of the complete graph - A survey , 1985, J. Graph Theory.

[8]  Predrag T. Tosic,et al.  Maximal Clique Based Distributed Group Formation for Autonomous Agent Coalitions , 2004 .

[9]  Srdjan Capkun,et al.  Anti-jamming broadcast communication using uncoordinated spread spectrum techniques , 2010, IEEE Journal on Selected Areas in Communications.

[10]  Douglas R. Stinson,et al.  A Hill-Climbing Algorithm for the Construction of One-Factorizations and Room Squares , 1987 .

[11]  Srdjan Capkun,et al.  Jamming-resistant Broadcast Communication without Shared Keys , 2009, USENIX Security Symposium.

[12]  Kaigui Bian,et al.  A quorum-based framework for establishing control channels in dynamic spectrum access networks , 2009, MobiCom '09.

[13]  Yih-Chun Hu,et al.  Dynamic Jamming Mitigation for Wireless Broadcast Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[14]  Peng Ning,et al.  Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication , 2010, 2010 Proceedings IEEE INFOCOM.

[15]  K. Appel,et al.  Every planar map is four colorable. Part II: Reducibility , 1977 .

[16]  Hirotsugu Kakugawa,et al.  A self-stabilizing algorithm for finding cliques in distributed systems , 2002, 21st IEEE Symposium on Reliable Distributed Systems, 2002. Proceedings..

[17]  Koushik Kar,et al.  Throughput and Fairness Guarantees Through Maximal Scheduling in Wireless Networks , 2008, IEEE Transactions on Information Theory.

[18]  Sisi Liu,et al.  Mitigating control-channel jamming attacks in multi-channel ad hoc networks , 2009, WiSec '09.

[19]  P. Bahl,et al.  SSCH: slotted seeded channel hopping for capacity improvement in IEEE 802.11 ad-hoc wireless networks , 2004, MobiCom '04.

[20]  Josef Pieprzyk,et al.  Broadcast anti-jamming systems , 2001, Comput. Networks.

[21]  Radha Poovendran,et al.  Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[22]  L.C. Baird,et al.  Keyless Jam Resistance , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.

[23]  Richard A. Poisel,et al.  Modern Communications Jamming Principles and Techniques , 2003 .

[24]  Leandros Tassiulas,et al.  Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks , 1992 .

[25]  Peng Ning,et al.  Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure , 2010, ACSAC '10.

[26]  David L Adamy,et al.  Ew 101: A First Course in Electronic Warfare , 2001 .

[27]  Xin Liu,et al.  Broadcast Control Channel Jamming: Resilience and Identification of Traitors , 2007, 2007 IEEE International Symposium on Information Theory.

[28]  R. Srikant,et al.  Low-Complexity Distributed Scheduling Algorithms for Wireless Networks , 2007, IEEE/ACM Transactions on Networking.

[29]  Leandros Tassiulas,et al.  End-to-end bandwidth guarantees through fair local spectrum share in wireless ad-hoc networks , 2005, IEEE Transactions on Automatic Control.