Mitigation of Control Channel Jamming under Node Capture Attacks

Availability of service in many wireless networks depends on the ability for network users to establish and maintain communication channels using control messages from base stations and other users. An adversary with knowledge of the underlying communication protocol can mount an efficient denial of service attack by jamming the communication channels used to exchange control messages. The use of spread spectrum techniques can deter an external adversary from such control channel jamming attacks. However, malicious colluding insiders or an adversary who captures or compromises system users is not deterred by spread spectrum, as they know the required spreading sequences. For the case of internal adversaries, we propose a framework for control channel access schemes using the random assignment of cryptographic keys to hide the location of control channels. We propose and evaluate metrics to quantify the probabilistic availability of service under control channel jamming by malicious or compromised users and show that the availability of service degrades gracefully as the number of colluding insiders or compromised users increases. We propose an algorithm called GUIDE for the identification of compromised users in the system based on the set of control channels that are jammed. We evaluate the estimation error using the GUIDE algorithm in terms of the false alarm and miss rates in the identification problem. We discuss various design trade-offs between robustness to control channel jamming and resource expenditure.

[1]  Robert B. Ash,et al.  Information Theory , 2020, The SAGE International Encyclopedia of Mass Media and Society.

[2]  P. Erdös,et al.  Families of finite sets in which no set is covered by the union ofr others , 1985 .

[3]  H. N. Nagaraja,et al.  Order Statistics, Third Edition , 2005, Wiley Series in Probability and Statistics.

[4]  Gordon L. Stuber,et al.  Principles of Mobile Communication , 1996 .

[5]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[6]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[7]  K. Fazel,et al.  Multi-Carrier and Spread Spectrum Systems: Fazel/Spread Spectrum , 2004 .

[8]  Reinhard Diestel,et al.  Graph Theory , 1997 .

[9]  Srdjan Capkun,et al.  Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .

[10]  Srdjan Capkun,et al.  Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.

[11]  L. Goddard Information Theory , 1962, Nature.

[12]  Radha Poovendran,et al.  Modeling adaptive node capture attacks in multi-hop wireless networks , 2007, Ad Hoc Networks.

[13]  Feller William,et al.  An Introduction To Probability Theory And Its Applications , 1950 .

[14]  David J. C. MacKay,et al.  Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.

[15]  Xin Liu,et al.  Broadcast Control Channel Jamming: Resilience and Identification of Traitors , 2007, 2007 IEEE International Symposium on Information Theory.

[16]  Radha Poovendran,et al.  A canonical seed assignment model for key predistribution in wireless sensor networks , 2007, TOSN.

[17]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[18]  Wenyuan Xu,et al.  Channel Surfing: Defending Wireless Sensor Networks from Interference , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[19]  Theodore S. Rappaport,et al.  Wireless Communications -- Principles and Practice, Second Edition. (The Book End) , 2002 .

[20]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[21]  Khaled Fazel,et al.  Multi-Carrier and Spread Spectrum Systems , 2003 .

[22]  Joong Soo Ma,et al.  Mobile Communications , 2003, Lecture Notes in Computer Science.

[23]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[24]  Herbert A. David,et al.  Order Statistics , 2011, International Encyclopedia of Statistical Science.

[25]  Radha Poovendran,et al.  Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[26]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.