Abstract
The problem of countering control channel jamming against internal adversaries in wireless ad hoc networks is addressed. Using combinatorial key distribution, a new method to secure the control channel access is introduced. This method, utilizes the established keys in the key establishment phase to hide the location of control channels without the need for a secure BS. This is in obtained by combination of a collision free one-way function and a combinatorial key establishment method. The proposed scheme can be considered as a special case of the ALOHA random access schemes which uses the common established keys as its seeds to generate the pattern of transmission.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Fazel, K., Kaiser, S.: Multi-Carrier and Spread Spectrum Systems. Wiley, Chichester (2003)
Anderson, R.: Security Engineering: A Guide to Building Dependable Distributed Systems. Wiley, Chichester (2001)
Li, M., Koutsopoulos, Poovendran, R.: Optimal jamming attacks and network defense policies in wireless sensor networks. In: 26th IEEE International Conference on Computer Communications, pp. 1307–1315. IEEE Press, USA (2007)
Chan, A., Liu, X., Thapa, B.: Control Channel Jamming: Resilience and Identification of Traitors. In: ISIT (2007)
Tague, P., Li, M., Poovendran, R.: Mitigation of Control Channel Jamming unde Node Capture Attacks. IEEE Transactions on Mobile Computing 8 (2009)
Lazos, L., Liu, S., Krunz, M.: Mitigating control-channel jamming attacks in multi-channel ad hoc networks. In: 2th ACM Conference on Wireless Network Security (2009)
Campete, S.A., Yener, B.: Combinatorial design of key distribution mechanisms for wireless sensor networks. IEEE/ACM Trans. Network. 15, 346–358 (2008)
Lee, J., Stinson, D.R.: A combinatorial approach to key predistribution for distributed sensor networks. In: IEEE Wireless Communications and Networking Conference. IEEE Press, Los Alamitos (2001)
Cametpe, S.A., Yener, B., Yung, M.: Expander graph based key distribution mechanisms in wireless sensor networks. In: IEEE Int. Conf. on Commun. IEEE Press, Los Alamitos (2006)
Bhandari, V., Vaidya, H.: Secure capacity of multi-hop wireless networks with random key pre-distribution. In: Proc. IEEE INFOCOM Workshops, Workshop on Mission Critical Networking (MCN). IEEE Press, Los Alamitos (2008)
Noubir, G.: Collision-Free One-Way Communication Using Reed-Solomon Codes. In: IEEE International Symposium on Information Theory and Applications. IEEE Press, New Mexico (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Falahati, A., Azarafrooz, M. (2010). Mitigation of Control Channel Jamming via Combinatorial Key Distribution. In: Tenreiro de Magalhães, S., Jahankhani, H., Hessami, A.G. (eds) Global Security, Safety, and Sustainability. ICGS3 2010. Communications in Computer and Information Science, vol 92. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15717-2_29
Download citation
DOI: https://doi.org/10.1007/978-3-642-15717-2_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15716-5
Online ISBN: 978-3-642-15717-2
eBook Packages: Computer ScienceComputer Science (R0)