A Novel Physical Channel Characteristics-based Channel Hopping Scheme for Jamming-resistant in Wireless Communication

Jamming is an effective denial-of-service (DoS) attack in wireless networks due to the open nature of radio propagation. In Jamming attack, the attacker purposely emits radio signals to corrupt the ongoing communication between the legitimate transmitter and receiver. Channel hopping is a feasible link-layer method for preventing jamming attack in wireless communications. In this paper, we propose a novel channel hopping scheme for jammingresistant in wireless communication. In our proposed scheme, we explore the reciprocity, randomness and spatial uncorrelation of the wireless fading channel to generate random channel hopping sequences. We evaluate our channel hopping scheme through real-world experiments on 802.11a 5 GHz band. Experiment results show that our scheme is efficient and secure, and achieves higher channel agreement ratio with almost equally channel distribution.

[1]  Jingjing Huang,et al.  Dynamic secret key generation exploiting Ultra-wideband wireless channel characteristics , 2015, 2015 IEEE Wireless Communications and Networking Conference (WCNC).

[2]  Christof Paar,et al.  Security Analysis of Quantization Schemes for Channel-based Key Extraction , 2015, EAI Endorsed Trans. Security Safety.

[3]  Yi Luo,et al.  Analysis of the information theoretically secret key agreement by public discussion , 2015, Secur. Commun. Networks.

[4]  Christof Paar,et al.  Bringing PHY-Based Key Generation into the Field: An Evaluation for Practical Scenarios , 2015, 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall).

[5]  Lajos Hanzo,et al.  A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends , 2015, Proceedings of the IEEE.

[6]  Yao Liu,et al.  Randomized positioning DSSS for anti-jamming wireless communications , 2016, 2016 International Conference on Computing, Networking and Communications (ICNC).

[7]  Mitko Bogdanoski,et al.  Analysis of the WSN MAC Protocols under Jamming DoS Attack , 2014, Int. J. Netw. Secur..

[8]  Wade Trappe,et al.  ProxiMate: proximity-based secure pairing using ambient wireless signals , 2011, MobiSys '11.

[9]  Wenyuan Xu,et al.  Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.

[10]  Xiaodai Dong,et al.  Verification of Secret Key Generation from UWB Channel Observations , 2009, 2009 IEEE International Conference on Communications.

[11]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[12]  Gregory D. Durgin,et al.  Space-Time Wireless Channels , 2002 .

[13]  Maxim Raya,et al.  DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots , 2004, MobiSys '04.

[14]  Zhijie Jerry Shi,et al.  RSS-based secret key generation in underwater acoustic networks: advantages, challenges, and performance improvements , 2016, IEEE Communications Magazine.

[15]  Junqing Zhang,et al.  Key Generation From Wireless Channels: A Review , 2016, IEEE Access.

[16]  Rami G. Melhem,et al.  Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks , 2008, MobiQuitous.

[17]  Jie Yang,et al.  Collaborative secret key extraction leveraging Received Signal Strength in mobile wireless networks , 2012, 2012 Proceedings IEEE INFOCOM.

[18]  Satish Vadlamani,et al.  Jamming attacks on wireless networks: A taxonomic survey , 2016 .

[19]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[20]  Kui Ren,et al.  Cooperative Secret Key Generation from Phase Estimation in Narrowband Fading Channels , 2011, IEEE Journal on Selected Areas in Communications.

[21]  Alvin S. Lim,et al.  Jamming and anti-jamming techniques in wireless networks: a survey , 2014, Int. J. Ad Hoc Ubiquitous Comput..

[22]  Jin-Fu Chang,et al.  Using frequency hopping spread spectrum technique to combat multipath interference in a multiaccessing environment , 1994 .

[23]  Gang Zhou,et al.  DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[24]  Dan Rubenstein,et al.  Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[25]  Wade Trappe,et al.  Radio-telepathy: extracting a secret key from an unauthenticated wireless channel , 2008, MobiCom '08.

[26]  Peng Ning,et al.  USD-FH: Jamming-resistant wireless communication using Frequency Hopping with Uncoordinated Seed Disclosure , 2010, The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010).

[27]  M. Sundarambal,et al.  Channel selection strategy for jamming-resistant reactive frequency hopping in Cognitive WiFi network , 2015, 2015 International Conference on Soft-Computing and Networks Security (ICSNS).