Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1287853.1287901acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
Article

Cross-layer jamming detection and mitigation in wireless broadcast networks

Published: 09 September 2007 Publication History

Abstract

Mobile communication systems are often susceptible to high level of noise injected by adversaries, known as jamming attack. Jamming is difficult to prevent in broadcast networks because a user that can decode a transmission can also jam the transmission. In this paper, we describe a code tree system that helps the physical layer circumvent jammers. This system works with any spread-spectrum communications system. In our system, the transmitter has more information than any single receiver. Each receiver cooperates with the transmitter to detect any jamming that affects that receiver. Our scheme mitigates the jamming attack while allowing the transmitter to transmit on fewer codes than the number of users. We simulated our system in a theoretical setting using MATLAB. The result shows significant improvement over naively transmitting on a single shared code.

References

[1]
Timothy X Brown, Jesse James, and Amita Sethi. Jamming and sensing of encrypted wireless ad hoc networks. Technical Report CU-CS-1005-06, University of Colorado at Boulder, 2006.
[2]
Whitfield Diffie and Martin E. Hellman. Privacy and authentication: An introduction to cryptography. Proceedings of the IEEE, 67(3):397--427, March 1979.
[3]
IEEE Computer Society LAN MAN Standards Committee. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11-1997. The Institute of Electrical and Electronics Engineers, New York, New York, 1997.
[4]
V. Kawadia and P. Kumar. Power control and clustering in ad hoc networks. In Proceedings of the Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2003), March 2003.
[5]
D. N. Knisely, S. Kumar, S. Laha, and S. Nanda. Evolution of wireless data services: IS-95 to CDMA2000. IEEE Communications Magazine, 36(10):140--149, October 1998.
[6]
Markus G. Kuhn. An asymmetric security mechanism for navigation signals. In Proceedings of the 6th Information Hiding Workshop, volume 3200, pages 239--252, May 2004.
[7]
J. S. Lee. Overview of the technical basis of Qualcomm's CDMA cellular telephone system design: a view of North American TIA/EIA IS-95. In Proc ICCS '94, volume 2, pages 353--358, November 1994.
[8]
Tontong Li, Jian Ren, Qi Ling, and Anil Jain. Physical layer built-in security analysis and enhancement of CDMA systems. In Proceedings of the Military Communications Conference, 2005. MILCOM 2005. IEEE, pages 956--962, October 2005.
[9]
R. Merkle. Secure communication over insecure channels. Communications of the ACM, 21(4):294--299, 1978.
[10]
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Seventh Annual ACM International Conference on Mobile Computing and Networks (MobiCom 2001), Rome, Italy, July 2001.
[11]
Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120--126, 1978.
[12]
Alan T. Sherman and David A. McGrew. Key establishment in large dynamic groups using one-way function trees. IEEE Transactions on Software Engineering, 29(5):444--458, May 2003.
[13]
A. J. Viterbi. CDMA Principles of Spread Spectrum Communication. Addison-Wesley, 1995.
[14]
W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of The 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2005), pages 46--57, May 2005.

Cited By

View all
  • (2024)Jamming Detection in Low-BER Mobile Indoor Scenarios via Deep LearningIEEE Internet of Things Journal10.1109/JIOT.2023.334361111:8(14682-14697)Online publication date: 15-Apr-2024
  • (2024)A detailed review of wireless sensor network, jammer, the types, location, detection and countermeasures of jammersService Oriented Computing and Applications10.1007/s11761-024-00396-w18:3(225-247)Online publication date: 1-Sep-2024
  • (2023)Securing UAV Flying Base Station for Mobile Networking: A ReviewFuture Internet10.3390/fi1505017615:5(176)Online publication date: 9-May-2023
  • Show More Cited By

Index Terms

  1. Cross-layer jamming detection and mitigation in wireless broadcast networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MobiCom '07: Proceedings of the 13th annual ACM international conference on Mobile computing and networking
    September 2007
    370 pages
    ISBN:9781595936813
    DOI:10.1145/1287853
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 09 September 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. CDMA
    2. anti-jamming
    3. cross-layer
    4. jamming
    5. key tree
    6. spread spectrum

    Qualifiers

    • Article

    Conference

    MobiCom/MobiHoc '07
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 440 of 2,972 submissions, 15%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)17
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 25 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Jamming Detection in Low-BER Mobile Indoor Scenarios via Deep LearningIEEE Internet of Things Journal10.1109/JIOT.2023.334361111:8(14682-14697)Online publication date: 15-Apr-2024
    • (2024)A detailed review of wireless sensor network, jammer, the types, location, detection and countermeasures of jammersService Oriented Computing and Applications10.1007/s11761-024-00396-w18:3(225-247)Online publication date: 1-Sep-2024
    • (2023)Securing UAV Flying Base Station for Mobile Networking: A ReviewFuture Internet10.3390/fi1505017615:5(176)Online publication date: 9-May-2023
    • (2023)Routing in FD-Enabled Cognitive Radio Networks with Minimum Time-Sharing for Improved Performance2023 Tenth International Conference on Software Defined Systems (SDS)10.1109/SDS59856.2023.10329248(126-130)Online publication date: 23-Oct-2023
    • (2021)Jamming-Resilient Message Dissemination in Wireless NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2021.3108004(1-1)Online publication date: 2021
    • (2019)Far Proximity Identification in Wireless SystemsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2019.2950925(1-1)Online publication date: 2019
    • (2019)Fast Distributed Backbone Construction Despite Strong Adversarial JammingIEEE INFOCOM 2019 - IEEE Conference on Computer Communications10.1109/INFOCOM.2019.8737477(1027-1035)Online publication date: Apr-2019
    • (2019)Redundancy as a Measure of Fault-Tolerance for the Internet of Things: A ReviewPolicy-Based Autonomic Data Governance10.1007/978-3-030-17277-0_11(202-226)Online publication date: 25-Apr-2019
    • (2018)Fully Dynamic Broadcasting under SINR2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC)10.1109/PCCC.2018.8710988(1-8)Online publication date: Nov-2018
    • (2018)SadeDistributed Computing10.1007/s00446-017-0307-131:3(241-254)Online publication date: 1-Jun-2018
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media