Abstract
Uncoordinated spread spectrum (USS) protocols have been proposed for anti-jamming communication in wireless settings without shared secrets. The existing USS protocols assume that fragments of hundreds of bits can be transmitted on different channels in order to identify fragments that belong to the same message. However, such long transmissions are susceptible to reactive jamming. To address this problem, we present a protocol that allows the use of short fragments of a few bits only. This makes our scheme resilient to a large class of reactive jammers. We prove that reassembling the fragmented message is not only feasible but also efficient: it can be completed in polynomial time in the size of the message, even if the jammer is computationally resourceful. We demonstrate the protocol efficiency by simulating the reassembly process at the link layer under different design parameters.
Keywords
References
Strasser, M., Pöpper, C., Capkun, S., Cagalj, M.: Jamming-resistant key establishment using uncoordinated frequency hopping. In: Proc. of S&P, pp. 64–78. IEEE (2008)
Pöpper, C., Strasser, M., Capkun, S.: Anti-jamming broadcast communication using uncoordinated spread spectrum techniques. IEEE Journal on Selected Areas in Communications 28(5), 703–715 (2010)
Baird, L., Bahn, W., Collins, M., Carlisle, M., Butler, S.: Keyless jam resistance. In: Information Assurance and Security Workshop (IAW), pp. 143–150. IEEE (2007)
Liu, Y., Ning, P., Dai, H., Liu, A.: Randomized differential DSSS: Jamming-resistant wireless broadcast communication. In: Proceedings of INFOCOM, pp. 1–9. IEEE (2010)
Xiao, L., Dai, H., Ning, P.: Jamming-resistant collaborative broadcast using uncoordinated frequency hopping. IEEE Trans. on Information Forensics & Security 7(1), 297–309 (2012)
Hamilton, S., Hamilton, J.: Secure jam resistant key transfer: Using the DOD CAC card to secure a radio link by employing the BBC jam resistant algorithm. In: Military Communications Conference (MILCOM), pp. 1–7. IEEE (2008)
Wilhelm, M., Martinovic, I., Schmitt, J., Lenders, V.: Short paper: Reactive jamming in wireless networks. In: Proc. of WiSec, pp. 47–52. ACM (2011)
Wilhelm, M., Martinovic, I., Schmitt, J., Lenders, V.: Wifire: a firewall for wireless networks. In: Proceedings of the ACM SIGCOMM Conference, pp. 456–457. ACM (2011)
Strasser, M., Pöpper, C., Capkun, S.: Efficient uncoordinated FHSS anti-jamming communication. In: Proc. of MobiHoc, pp. 207–218. ACM (2009)
Slater, D., Tague, P., Poovendran, R., Matt, B.J.: A coding-theoretic approach for efficient message verification over insecure channels. In: Proc. of WiSec, pp. 151–160. ACM (2009)
Slater, D., Poovendran, R., Tague, P., Matt, B.J.: Tradeoffs between jamming resilience and communication efficiency in key establishment. SIGMOBILE Mobile Computing and Communications Review 13, 14–25 (2009)
Liu, Y., Ning, P.: BitTrickle: Defending against broadband and high-power reactive jamming attacks. In: Proceedings of INFOCOM, pp. 909–917. IEEE (2012)
Cabric, D., Tkachenko, A., Brodersen, R.W.: Experimental study of spectrum sensing based on energy detection and network cooperation. In: Proc. of TAPAS. ACM (2006)
Bhargava, V.: Forward error correction schemes for digital communications. IEEE Communications Magazine 21(1), 11–19 (1983)
Goldwasser, S., Micali, S.: Probabilistic encryption. Journal of Computer and System Sciences 28(2), 270–299 (1984)
Xu, K., Wang, Q., Ren, K.: Joint UFH and power control for effective wireless anti-jamming communication. In: Proceedings of INFOCOM, pp. 738–746. IEEE (2012)
Awerbuch, B., Richa, A., Scheideler, C.: A jamming-resistant MAC protocol for single-hop wireless networks. In: Proc. of PODC, pp. 45–54. ACM (2008)
Dolev, S., Gilbert, S., Guerraoui, R., Newport, C.: Gossiping in a multi-channel radio network. In: Pelc, A. (ed.) DISC 2007. LNCS, vol. 4731, pp. 208–222. Springer, Heidelberg (2007)
Dolev, S., Gilbert, S., Guerraoui, R., Newport, C.: Secure communication over radio channels. In: Proc. of ACM Symp. on Principles of Distributed Computing, pp. 105–114 (2008)
Win, M., Scholtz, R.: Impulse radio: How it works. IEEE Communications Letters 2(2), 36–38 (1998)
Wang, Q., Xu, P., Ren, K., Li, X.: Towards optimal adaptive UFH-based anti-jamming wireless communication. Journal on Selected Areas in Communications 30(1), 16–30 (2012)
Pöpper, C., Strasser, M., Capkun, S.: Jamming-resistant broadcast communication without shared keys. In: Proceedings of the USENIX Security Symposium, pp. 231–247 (2009)
Jin, T., Noubir, G., Thapa, B.: Zero pre-shared secret key establishment in the presence of jammers. In: Proc. of MobiHoc, pp. 219–228. ACM (2009)
Liu, A., Ning, P., Dai, H., Liu, Y., Wang, C.: Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure. In: Proceedings of the 26th Annual Computer Security Applications Conference, pp. 367–376. ACM (2010)
Xu, W., Trappe, W., Zhang, Y.: Anti-jamming timing channels for wireless networks. In: Proceedings of Wireless Network Security (WiSec), pp. 203–213. ACM (2008)
Strasser, M., Danev, B., Capkun, S.: Detection of reactive jamming in sensor networks. ACM Transactions on Sensor Networks (TOSN) 7(2), 16 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Ahmed, N., Pöpper, C., Capkun, S. (2014). Enabling Short Fragments for Uncoordinated Spread Spectrum Communication. In: Kutyłowski, M., Vaidya, J. (eds) Computer Security - ESORICS 2014. ESORICS 2014. Lecture Notes in Computer Science, vol 8712. Springer, Cham. https://doi.org/10.1007/978-3-319-11203-9_28
Download citation
DOI: https://doi.org/10.1007/978-3-319-11203-9_28
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11202-2
Online ISBN: 978-3-319-11203-9
eBook Packages: Computer ScienceComputer Science (R0)