Control channel hopping for avoidance of scrambling attacks in IEEE 802.16 systems

A scrambling attack is a form of intentional physical jamming attack. A scrambling attack attempts to disrupt specific intervals, such as a control channel. In IEEE 802.16 systems such as WiBro and WiMax, the control channel is located at the beginning of a frame, which has a fixed duration and empty intervals of a receive transition gap (RTG) within its duration. Hostile attackers can easily detect the start time of frames and jam the control channel using a scrambling attack due to these features of IEEE 802.16 systems. In this paper, we propose an approach to prevent the disruption of the control channel from this scrambling attack in IEEE 802.16 systems. The control channel, including frame control header (FCH), downlink map (DL-MAP), and uplink map (UL-MAP), is hopped based on a common hopping sequence to a different symbol index in the downlink at each frame. Simulations show that the control channel of the proposed scheme survives against the scrambling attack and an additional random pulse jamming attack in the time domain.

[1]  Ning Zhang,et al.  Analysis of mobile WiMAX security: Vulnerabilities and solutions , 2008, 2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[2]  Balasubramaniam Natarajan,et al.  Residue Number System Arithmetic Assisted Coded Frequency-Hopped OFDMA , 2009, EURASIP J. Wirel. Commun. Netw..

[3]  Rakesh Kumar Jha,et al.  A Performance Comparison With Modulation Schemes In WiMAX Physical Layer Security Aspect , 2010 .

[4]  G.M. Dillard,et al.  A metric for defining low probability of detection based on gain differences , 2001, Conference Record of Thirty-Fifth Asilomar Conference on Signals, Systems and Computers (Cat.No.01CH37256).

[5]  Sisi Liu,et al.  Mitigating control-channel jamming attacks in multi-channel ad hoc networks , 2009, WiSec '09.

[6]  Kostas Stamatiou,et al.  A performance analysis of coded frequency-hopped OFDMA [cellular system] , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[7]  Tongtong Li,et al.  Secure Collision-Free Frequency Hopping for OFDMA-Based Wireless Networks , 2009, EURASIP J. Adv. Signal Process..

[8]  Ieee Microwave Theory,et al.  Part 16: Air Interface for Fixed and Mobile Broadband Wireless Access Systems — Amendment for Physical and Medium Access Control Layers for Combined Fixed and Mobile Operation in Licensed Bands , 2003 .

[9]  Yih-Chun Hu,et al.  Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks , 2007, IEEE/ACM Transactions on Networking.

[10]  Xin Liu,et al.  Broadcast Control Channel Jamming: Resilience and Identification of Traitors , 2007, 2007 IEEE International Symposium on Information Theory.

[11]  Loukas Lazos,et al.  Selective jamming/dropping insider attacks in wireless mesh networks , 2011, IEEE Network.

[12]  Toshiaki Tanaka,et al.  Security Vulnerabilities and Solutions in Mobile WiMAX , 2007 .

[13]  Chin-Laung Lei,et al.  A prevention approach to scrambling attacks in WiMAX networks , 2009, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops.

[14]  Radha Poovendran,et al.  Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[15]  Mika Juhani Husso,et al.  Performance Analysis of a WiMAX System under Jamming , 2006 .

[16]  B. Makarevitch Jamming Resistant Architecture for WiMAX Mesh Network , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[17]  Jeffrey G. Andrews,et al.  Fundamentals of WiMAX: Understanding Broadband Wireless Networking , 2007 .

[18]  Michel Barbeau WiMax/802.16 threat analysis , 2005, Q2SWinet '05.

[19]  Heba Kamal Aslan,et al.  WiMax Security , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).