Enabling Authentic Transmissions in WSNs – Turning Jamming against the Attacker

نویسندگان

  • Adam Bachorek
  • Ivan Martinovic
  • Jens B. Schmitt
چکیده

Traditional methods for message authentication are based on the cryptographic verification of received data using some sort of a shared secret. While this task is not critical for traditional networks, Wireless Sensor Networks (WSNs) may pay a high price for the gained protection – sensor nodes are forced to invest their already scarce resources in receiving a message and executing cryptographic computations, only to discard the message afterwards in case of a failed authentication. This work introduces a different, crypto-free approach for enabling authenticated communication by leveraging peculiarities of wireless communication, in particular its broadcast nature and the feasibility of channel capacity jamming. Instead of receiving and then verifying transmitted data, sensor nodes are prevented from receiving fake data at all. This is achieved by coupling physical characteristics of signal propagation with legitimate transmissions. Such a coupling enables the detection and invalidation of impersonation attacks by using short jamming pulses emitted by surrounding WSN nodes. We justify this concept by designing a novel communication protocol explicitly integrating the jamming feature, and analyze factors which impact the efficiency of successful jamming, such as the frame length, transmission timing accuracy, and various other issues identified through extensive empirical measurements.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Randomized Transmission Protocols for Protection against Jamming Attacks in Multi-Agent Consensus

Multi-agent consensus under jamming attacks is investigated. Specifically, inter-agent communications over a network are assumed to fail at certain times due to jamming of transmissions by a malicious attacker. A new stochastic communication protocol is proposed to achieve finite-time practical consensus between agents. In this protocol, communication attempt times of agents are randomized and ...

متن کامل

A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks

Wireless networks are susceptible to numerous security vulnerabilities due to the open nature of the wireless medium. Anyone with a transceiver can eavesdrop on ongoing transmissions, block the transmission of legitimate ones or inject spurious messages. One of the fundamental ways for degrading the overall network performance is by jamming wireless transmissions. In this paper, we deal with th...

متن کامل

Vulnerabilities of Massive MIMO Systems Against Pilot Contamination Attacks

We consider a single-cell massive MIMO system in which a base station (BS) with a large number of antennas transmits simultaneously to several single-antenna users in the presence of an attacker. The BS acquires the channel state information (CSI) based on uplink pilot transmissions. In this work, we demonstrate the vulnerability of CSI estimation phase to malicious attacks. For that purpose, w...

متن کامل

NOVEL MITIGATION METHODS AGAINST REACTIVE JAMMING ATTACK: THEORETICAL AND PRACTICAL SOLUTIONS By INCHEOL SHIN A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY

of Dissertation Presented to the Graduate School of the University of Florida in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy NOVEL MITIGATION METHODS AGAINST REACTIVE JAMMING ATTACK: THEORETICAL AND PRACTICAL SOLUTIONS By Incheol Shin August 2010 Chair: My Tra Thai Major: Computer Engineering Wireless Sensor Networks (WSNs) consist of many spatially deployed s...

متن کامل

A Dynamic Jamming Game for Real-Time Status Updates

We study timely status updates of a real-time system in an adversarial setting. The system samples a physical process, and sends the samples from the source (e.g., a sensor) to the destination (e.g, a control center) through a channel. For realtime monitoring/control tasks, it is crucial for the system to update the status of the physical process “timely”. We measure the timeliness of status up...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008