Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
invited-talk

Tradeoffs between jamming resilience and communication efficiency in key establishment

Published: 25 June 2009 Publication History

Abstract

We address the problem of allowing authorized users, who do not preshare a common key, to effectively exchange key establishment messages over an insecure channel in the presence of jamming and message insertion attacks. In this work, we jointly consider the security and efficiency of key exchange protocols, focusing on the interplay between message fragmentation, jamming resilience, and verification complexity for protocol optimization. Finally, we present three fragment verification schemes and demonstrate through analysis and simulation that in comparison with existing approaches, they can significantly decrease the amount of time required for key establishment without degrading the guaranteed level of security.

References

[1]
N. Barić and B. Pfitzmann. Collision-free accumulators and fail-stop signature schemes without trees. Advances in Cryptology -- EUROCRYPT '97, pages 480--494, 1997.
[2]
J. Benaloh and M. de Mare. One-way accumulators: a decentralized alternative to digital signatures. Advances in Cryptology -- EUROCRYPT '93, Proc. of theWorkshop on the Theory and Applications of Cryptographic Techniques, pages 274--285, 1994.
[3]
L. Buttyán, L. Czap, and I. Vajda. Securing coding based distributed storage in wireless sensor networks. In IEEE Workshop on Wireless and Sensor Network Security (WSNS), Atlanta, GA, USA, Sept. 2008.
[4]
J.W. Byers, M. Luby, M. Mitzenmacher, and A. Rege. A digital fountain approach to reliable distribution of bulk data. ACM SIGCOMM Computer Communication Review, 28(4):56--67, 1998.
[5]
V. Gupta, S. Krishnamurthy, and M. Faloutsos. Denial of service attacks at the MAC layer in wireless ad hoc networks. Military Communications Conference (MILCOM 2002), 2:1118--1123, 2002.
[6]
C. Karlof, N. Sastry, Y. Li, A. Perrig, and J.D. Tygar. Distillation codes and applications to DoS resistant multicast authenication. In The 11th Annual Network and Distributed System Security Symposium (NDSS 2004), San Diego, CA, USA, Feb. 2004.
[7]
J. Liang, R. Kumar, Y. Xi, and K.W. Ross. Pollution in P2P file sharing systems. Proc. IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2005), 2, 2005.
[8]
G. Lin and G. Noubir. On link layer denial of service in data wireless lans. Wireless Communications and Mobile Computing, 5(3):273--284, May 2005.
[9]
W.-T. Lin and K.-B. Yu. Adaptive beamforming for wideband jamming cancellation. IEEE National Radar Conference, pages 82--87, 1997.
[10]
R. Merkle. Protocols for public key cryptosystems. In Proc. 1980 IEEE Symposium on Security and Privacy (S&P '80), pages 150--159, Apr. 1980.
[11]
F. Meshkati, H. Poor, S. Schwartz, and N. Mandayam. An energy-efficient approach to power control and receiver design in wireless data networks. pages 1885--1894, 2005.
[12]
L. Nguyen. Accumulators from bilinear pairings and applications. Topics in Cryptography -- CTRSA 2005, pages 275--292, 2005.
[13]
R.A. Poisel. Modern Communication Jamming Principles and Techniques. Artech House, 2004.
[14]
R.M. Roth. Introduction to Coding Theory. Cambridge University Press, 2006.
[15]
D. Slater, R. Poovendran, P. Tague, and B.J. Matt. A coding-theoretic approach for efficient message verification over insecure channels. In Second ACM Conference on Wireless Network Security (WiSec '09), Zurich, Switzerland, Mar. 2009.
[16]
M. Strasser, C. Pöpper, S. Cǎpkun, and M. Cǎgalj. Jamming-resistant key establishment using uncoordinated frequency hopping. In Proc. 2008 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2008.
[17]
C. Wong and S. Lam. Digital signatures for flows and multicasts. In Proc. on the 6th International Conference on Network Protocols (ICNP'98), pages 198--209, Oct. 1998.
[18]
A.D. Wood and J.A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54--62, Oct. 2002.
[19]
W. Xu, K. Ma, W. Trappe, and Y. Zhang. Jamming sensor networks: Attack and defense strategies. IEEE Network, 20(3):41--47, May/June 2006.
[20]
W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In Proc. of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pages 46--57, 2005.

Cited By

View all
  • (2022)Enabling Short Fragments for Uncoordinated Spread Spectrum CommunicationComputer Security - ESORICS 201410.1007/978-3-319-11203-9_28(488-507)Online publication date: 10-Mar-2022
  • (2014)Keeping up with the jammers: Observe-and-adapt algorithms for studying mutually adaptive opponentsPervasive and Mobile Computing10.1016/j.pmcj.2013.12.00512(244-257)Online publication date: Jun-2014

Index Terms

  1. Tradeoffs between jamming resilience and communication efficiency in key establishment

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM SIGMOBILE Mobile Computing and Communications Review
      ACM SIGMOBILE Mobile Computing and Communications Review  Volume 13, Issue 1
      January 2009
      75 pages
      ISSN:1559-1662
      EISSN:1931-1222
      DOI:10.1145/1558590
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 25 June 2009
      Published in SIGMOBILE Volume 13, Issue 1

      Check for updates

      Qualifiers

      • Invited-talk

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 22 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Enabling Short Fragments for Uncoordinated Spread Spectrum CommunicationComputer Security - ESORICS 201410.1007/978-3-319-11203-9_28(488-507)Online publication date: 10-Mar-2022
      • (2014)Keeping up with the jammers: Observe-and-adapt algorithms for studying mutually adaptive opponentsPervasive and Mobile Computing10.1016/j.pmcj.2013.12.00512(244-257)Online publication date: Jun-2014

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media