Delay-bounded adaptive UFH-based anti-jamming wireless communication

Anti-jamming communication without pre-shared secrets has gained increasing research interest recently and is commonly tackled by utilizing the technique of uncoordinated frequency hopping (UFH). Existing researches, however, are almost all based on ad hoc designs of frequency hopping strategies, lacking of theoretical foundations for scheme design and performance evaluation. To fill this gap, this paper introduces the online optimization theory into the solution and, for the first time, makes thorough quantitative performance characterization possible for UFH-based anti-jamming communications. Specifically, we propose an efficient online UFH algorithm achieving asymptotic optimum and analytically prove its optimality under different message coding scenarios. Extensive simulative evaluations are conducted to validate our theoretical analysis under both oblivious and adaptive jamming strategies.

[1]  Peter Auer,et al.  The Nonstochastic Multiarmed Bandit Problem , 2002, SIAM J. Comput..

[2]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[3]  Srdjan Capkun,et al.  Jamming-resistant Broadcast Communication without Shared Keys , 2009, USENIX Security Symposium.

[4]  Srdjan Capkun,et al.  Efficient uncoordinated FHSS anti-jamming communication , 2009, MobiHoc '09.

[5]  Srdjan Capkun,et al.  Detection of Reactive Jamming in Sensor Networks , 2009 .

[6]  Stephen G. Wilson,et al.  Digital Modulation and Coding , 1995 .

[7]  Avrim Blum,et al.  Online Geometric Optimization in the Bandit Setting Against an Adaptive Adversary , 2004, COLT.

[8]  Peng Ning,et al.  Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication , 2010, 2010 Proceedings IEEE INFOCOM.

[9]  Magyar Tud The On-Line Shortest Path Problem Under Partial Monitoring , 2007 .

[10]  Xiang-Yang Li,et al.  Multiple Round Random Ball Placement: Power of Second Chance , 2009, COCOON.

[11]  Nicolò Cesa-Bianchi,et al.  Gambling in a rigged casino: The adversarial multi-armed bandit problem , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.

[12]  Santosh S. Vempala,et al.  Efficient algorithms for online decision problems , 2005, Journal of computer and system sciences (Print).

[13]  Sisi Liu,et al.  Mitigating control-channel jamming attacks in multi-channel ad hoc networks , 2009, WiSec '09.

[14]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[15]  Baruch Awerbuch,et al.  Adaptive routing with end-to-end feedback: distributed learning and geometric approaches , 2004, STOC '04.

[16]  A. Viterbi CDMA: Principles of Spread Spectrum Communication , 1995 .

[17]  Daniel A. Spielman,et al.  Practical loss-resilient codes , 1997, STOC '97.

[18]  Radha Poovendran,et al.  A coding-theoretic approach for efficient message verification over insecure channels , 2009, WiSec '09.

[19]  Srdjan Capkun,et al.  Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[20]  Tao Jin,et al.  Zero pre-shared secret key establishment in the presence of jammers , 2009, MobiHoc '09.