Abstract
Jamming techniques require only moderate resources to be deployed, while their effectiveness in disrupting communications is unprecedented. In this article, we introduce several contributions to jamming mitigation. In particular, we introduce a novel adversary model that has both (unlimited) jamming reactive capabilities as well as powerful (but limited) proactive jamming capabilities. Under this adversary model, to the best of our knowledge more powerful than any other adversary model addressed in the literature, the communication bandwidth provided by current anti-jamming solutions drops to zero. We then present Silence is Golden (SiG): a novel anti-jamming protocol that, introducing a tunable, asymmetric communication channel, is able to mitigate the adversary capabilities, enabling the parties to communicate. For instance, with SiG it is possible to deliver a 128-bits-long message with a probability greater than 99% in 4096 time slots despite the presence of a jammer that jams all on-the-fly communications and 74% of the silent radio spectrum—while competing proposals simply fail. Moreover, when SiG is used in a scenario in which the adversary can jam only a subset of all the available frequencies, performance experiences a boost: a 128-bits-long message is delivered within just 17 time slots for an adversary able to jam 90% of the available frequencies. We present a thorough theoretical analysis for the solution, which is supported by extensive simulation results, showing the viability of our proposal.
- B. Awerbuch, A. Richa, and C. Scheideler. 2008. A jamming-resistant MAC protocol for single-hop wireless networks. In Proceedings of the PODC’08. New York, NY, 45--54. Google Scholar
Digital Library
- L. C. Baird, W. L. Bahn, M. D. Collins, M. C. Carlisle, and S. C. Butler. 2007. Keyless jam resistance. In Proceedings of the Information Assurance and Security Workshop (IAW’07). 143--150.Google Scholar
- S. Bhadra, S. Bodas, S. Shakkottai, and S. Vishwanath. 2008. Communication through jamming over a slotted ALOHA channel. IEEE Transactions on Information Theory 54, 11, 5257--5262. Google Scholar
Digital Library
- S. Capkun, M. Cagalj, R. K. Rengaswamy, I. Tsigkogiannis, J.-P. Hubaux, and M. B. Srivastava. 2008. Integrity codes: Message integrity protection and authentication over insecure channels. IEEE Transactions on Dependable and Secure Computing 5, 4, 208--223. Google Scholar
Digital Library
- A. Cassola, T. Jin, G. Noubir, and B. Thapa. 2013. Efficient spread spectrum communication without preshared secrets. IEEE Transactions on Mobile Computing 12, 8, 1669--1680. Google Scholar
Digital Library
- M. Dehghan, D. Goeckel, M. Ghaderi, and Z. Ding. 2012. Energy efficiency of cooperative jamming strategies in secure wireless networks. IEEE Transactions on Wireless Communications 99, 1--5.Google Scholar
- P. Delsarte and P. Piret. 1981. Bounds and constructions for binary asymmetric error-correcting codes (corresp.). IEEE Transactions on Information Theory 27, 1, 125--128. Google Scholar
Digital Library
- A. K. Dhulipala, C. Fragouli, and A. Orlitsky. 2006. Silence based communication for sensor networks. In Proceedings of the 2006 IEEE International Symposium on Information Theory. 212--216.Google Scholar
- R. Di Pietro and G. Oligeri. 2013a. COKE crypto-less over-the-air key establishment. IEEE Transactions on Information Forensics and Security 8, 1, 163--173. Google Scholar
Digital Library
- R. Di Pietro and G. Oligeri. 2013b. Jamming mitigation in cognitive radio networks. IEEE Network Magazine, Special Issue on Security in Cognitive Radio Networks.Google Scholar
- D. Eastlake, 3rd and P. Jones. 2001. RFC 3174, US Secure Hash Algorithm 1 (SHA1). Google Scholar
Digital Library
- ETSI EN 300 910. GSM 05.05 version 6.7.1 release 1997.Google Scholar
- C. Fragouli and A. Orlitsky. 2005. Silence is golden and time is money: Power-aware communication for sensor networks. In Proceedings of the 43rd Annual Allerton Conference on Communication, Control, and Computing. 1026--1035.Google Scholar
- S. Ganeriwal, C Pöpper, S. Capkun, and M. B. Srivastava. 2008. Secure time synchronization in sensor networks. ACM Transactions on Information Systems and Security 11, 4, Article 23, 23--35 pages. Google Scholar
Digital Library
- S. Gilbert, R. Guerraoui, and C. C. Newport. 2009. Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks. Theoretical Computer Science 410, 6--7, 546--569. Google Scholar
Digital Library
- Ali Hamieh. 2012. POWJAM: A power reaction system against jamming attacks in wireless ad hoc networks. WONS 2012. 9--15.Google Scholar
Cross Ref
- T. Klove. 1981. Error correction codes for the asymmetric channel. Technical Report. Mathematical Institut University Bergen, Norway.Google Scholar
- S. Li and A. Ephremides. 2010. Covert channels in ad-hoc wireless networks. Ad Hoc Networks 8, 2, 135--147. Google Scholar
Digital Library
- G. Lin and G. Noubir. 2005. On link layer denial of service in data wireless LANs. Wireless Communications and Mobile Computing 5, 3, 273--284. Google Scholar
Digital Library
- S. Liu, L. Lazos, and M. Krunz. 2011. Thwarting inside jamming attacks on wireless broadcast communications. In Proceedings of WiSec’11. 29--40. Google Scholar
Digital Library
- S. Liu, L. Lazos, and M. Krunz. 2012. Thwarting control-channel jamming attacks from inside jammers. IEEE Transactions on Mobile Computing. 11, 9, 1545--1558. Google Scholar
Digital Library
- Y. Liu and P. Ning. 2012. BitTrickle: Defending against broadband and high-power reactive jamming attacks. In Proceedings of INFOCOM 2012. 909--917.Google Scholar
- NIST. 2001. Announcing the Advanced Encryption Standard (AES).Google Scholar
- T. Perkovic, M. Cagalj, T. Mastelic, N. Saxena, and D. Begusic. 2012. Secure initialization of multiple constrained wireless devices for an unaided user. IEEE Transactions on Mobile Computing 11, 2, 337--351. Google Scholar
Digital Library
- Phantom Technologies LTD. 2014. MP806. Retrieved from http://www.phantom.co.il.Google Scholar
- P. Popovski, H. Yomo, and R. Prasad. 2006. Strategies for adaptive frequency hopping in the unlicensed bands. Wireless Communication 13, 6, 60--67. Google Scholar
Digital Library
- C. Popper, M. Strasser, and S. Capkun. 2010. Anti-jamming broadcast communication using uncoordinated spread spectrum techniques. IEEE Journal on Selected Areas in Communications 28, 5, 703--715. Google Scholar
Digital Library
- T. Rappaport. 2001. Wireless Communications: Principles and Practice. Prentice Hall PTR, Upper Saddle River, NJ. Google Scholar
Digital Library
- I. S. Reed and G. Solomon. 1960. Polynomial codes over certain finite fields. Journal of the Society for Industrial and Applied Mathematics 8, 300--304.Google Scholar
Cross Ref
- A. Richa, C. Scheideler, S. Schmid, and J. Zhang. 2012. An efficient and fair MAC protocol robust to reactive interference. IEEE/ACM Transactions on Networking. 1--12. Google Scholar
Digital Library
- P. A. Richard. 2003. Modern Communications Jamming Principles and Techniques (The Artech House Information Warfare Library). Artech House Publishers, Norwood, MA.Google Scholar
- S. Shafiee and S. Ulukus. 2005. Capacity of multiple access channels with correlated jamming. In Proceedings of the 2005 Military Communications Conference (MILCOM’05). Vol. 1. IEEE, 218--224.Google Scholar
- J. Soto. 2000. Randomness testing of the advanced encryption standard candidate algorithms. In NIST IR 6483, National Institute of Standards and Technology.Google Scholar
- M. Strasser, B. Danev, and S. Čapkun. 2010. Detection of reactive jamming in sensor networks. ACM Transactions on Sensor Networking 7, 2, Article 16, 29 pages. Google Scholar
Digital Library
- D. J. Thuente, B. Newlin, and M. Acharya. 2007. Jamming vulnerabilities of IEEE 802.11e. In Proceedings of the 2007 Military Communications Conference (MILCOM’07). 1--7.Google Scholar
- T. D. Vo-Huu, E.-O. Blass, and G. Noubir. 2013. Counter-jamming using mixed mechanical and software interference cancellation. WiSec’13. New York, NY. 31--42. Google Scholar
Digital Library
- W. Xu, W. Trappe, Y. Zhang, and T. Wood. 2005. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 11th Annual International Conference on Mobie Computing and Networking (MobiHoc’05). ACM, New York, NY, 46--57. Google Scholar
Digital Library
- Y. Xuan, Y. Shen, N. P. Nguyen, and M. T. Thai. 2012. A trigger identification service for defending reactive jammers in WSN. IEEE Transactions on Mobile Computing 11, 5, 793--806. Google Scholar
Digital Library
- Y. Zhu and R. Sivakumar. 2005. Challenges: Communication through silence in wireless sensor networks. In Proceedings of the 11th Annual International Conference on Mobile Computing and Networking (MobiCom’05). ACM, New York, NY, 140--147. Google Scholar
Digital Library
Index Terms
Silence is Golden: Exploiting Jamming and Radio Silence to Communicate
Recommendations
Silence is Golden: A Source Location Privacy Scheme for Wireless Sensor Networks Based on Silent Nodes
Source location privacy (SLP) is an important property for security-critical wireless sensor network applications such as monitoring and tracking. However, cryptology-based schemes cannot protect the SLP effectively since an adversary can capture the ...
The Sound of Silence: What Do We Know When Insiders Do Not Trade?
This paper examines the information content of insider silence, periods of no insider trading. We hypothesize that, to avoid litigation risk, rational insiders do not sell own-company shares when they anticipate bad news; neither would they buy, given ...






Comments