Skip to main content

Mitigation of Control Channel Jamming via Combinatorial Key Distribution

  • Conference paper
  • 1123 Accesses

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 92))

Abstract

The problem of countering control channel jamming against internal adversaries in wireless ad hoc networks is addressed. Using combinatorial key distribution, a new method to secure the control channel access is introduced. This method, utilizes the established keys in the key establishment phase to hide the location of control channels without the need for a secure BS. This is in obtained by combination of a collision free one-way function and a combinatorial key establishment method. The proposed scheme can be considered as a special case of the ALOHA random access schemes which uses the common established keys as its seeds to generate the pattern of transmission.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fazel, K., Kaiser, S.: Multi-Carrier and Spread Spectrum Systems. Wiley, Chichester (2003)

    Book  Google Scholar 

  2. Anderson, R.: Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, Chichester (2001)

    Google Scholar 

  3. Li, M., Koutsopoulos, Poovendran, R.: Optimal jamming attacks and network defense policies in wireless sensor networks. In: 26th IEEE International Conference on Computer Communications, pp. 1307–1315. IEEE Press, USA (2007)

    Chapter  Google Scholar 

  4. Chan, A., Liu, X., Thapa, B.: Control Channel Jamming: Resilience and Identification of Traitors. In: ISIT (2007)

    Google Scholar 

  5. Tague, P., Li, M., Poovendran, R.: Mitigation of Control Channel Jamming unde Node Capture Attacks. IEEE Transactions on Mobile Computing 8 (2009)

    Google Scholar 

  6. Lazos, L., Liu, S., Krunz, M.: Mitigating control-channel jamming attacks in multi-channel ad hoc networks. In: 2th ACM Conference on Wireless Network Security (2009)

    Google Scholar 

  7. Campete, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Trans. Network. 15, 346–358 (2008)

    Google Scholar 

  8. Lee, J., Stinson, D.R.: A combinatorial approach to key predistribution for distributed sensor networks. In: IEEE Wireless Communications and Networking Conference. IEEE Press, Los Alamitos (2001)

    Google Scholar 

  9. Cametpe, S.A., Yener, B., Yung, M.: Expander graph based key distribution mechanisms in wireless sensor networks. In: IEEE Int. Conf. on Commun. IEEE Press, Los Alamitos (2006)

    Google Scholar 

  10. Bhandari, V., Vaidya, H.: Secure capacity of multi-hop wireless networks with random key pre-distribution. In: Proc. IEEE INFOCOM Workshops, Workshop on Mission Critical Networking (MCN). IEEE Press, Los Alamitos (2008)

    Google Scholar 

  11. Noubir, G.: Collision-Free One-Way Communication Using Reed-Solomon Codes. In: IEEE International Symposium on Information Theory and Applications. IEEE Press, New Mexico (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Falahati, A., Azarafrooz, M. (2010). Mitigation of Control Channel Jamming via Combinatorial Key Distribution. In: Tenreiro de Magalhães, S., Jahankhani, H., Hessami, A.G. (eds) Global Security, Safety, and Sustainability. ICGS3 2010. Communications in Computer and Information Science, vol 92. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15717-2_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15717-2_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15716-5

  • Online ISBN: 978-3-642-15717-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics