Zero-Communication Seed Establishment for Anti-Jamming Techniques
نویسندگان
چکیده
In an environment perturbed by malicious interference, establishing a reliable wireless connection without shared secrets typically relies on uncoordinated spread spectrum methods, such as UFHSS or UDSSS. These methods offer a lowthroughput channel for the exchange of key contributions with the goal to establish a shared secret. They, however, incur a significant delay when confronted with adversarial jamming, in particular when long public-key credentials must be exchanged. In this paper, we propose and evaluate a scheme that is orders of magnitude more efficient than prior proposals. Drawing on powerful identity-based (ID-based) cryptography and exploiting a-priori knowledge about the identities of the communication partners, the parties can immediately and without any communication derive a cryptographically strong seed (or key) for creating a highthroughput, jamming-resistant channel. Even without a-priori knowledge, our scheme still benefits from the certificate-free authentication offered by ID-based cryptography. Additionally, we define the notion of a secure seed establishment scheme for anti-jamming methods and prove that our protocol satisfies this definition. We further conduct an experimental evaluation of our approach to demonstrate its practicality: on mobile commodity hardware such as notebooks, tablet computers, and smart phones, a non-optimized implementation derives shared seeds in less than half a second.
منابع مشابه
Defending DSSS-based Broadcast Communication against Insider Jammers via Delayed Seed-Disclosure
Spread spectrum techniques such as Direct Sequence Spread Spectrum (DSSS) and Frequency Hopping (FH) have been commonly used for anti-jamming wireless communication. However, traditional spread spectrum techniques require that sender and receivers share a common secret in order to agree upon, for example, a common hopping sequence (in FH) or a common spreading code sequence (in DSSS). Such a re...
متن کاملMobiCom 2010 Poster: Frequency Quorum Rendezvous for Fast and Resilient Key Establishment under Jamming Attack
Jamming attacks have been studied as wireless security threats disrupting reliable RF communication in a wireless network. Existing countermeasures often make use of spread-spectrum techniques such as Frequency Hopping Spread Spectrum and Direct Sequence Spread Spectrum [3]. Communication parties rely on a pre-shared common key (hopping sequence or spread code) which is unknown to the jammer, t...
متن کاملar X iv : 1 30 7 . 57 14 v 1 [ cs . C R ] 2 2 Ju l 2 01 3 Silence is Golden exploiting jamming and radio silence to communicate ∗
Jamming techniques require just moderate resources to be deployed, while their effectiveness in disrupting communications is unprecedented. In this paper we introduce several contributions to jamming mitigation. In particular, we introduce a novel adversary model that has both (unlimited) jamming reactive capabilities as well as powerful (but limited) proactive jamming capabilities. Under this ...
متن کاملInvestigation on Anti-Jamming Techniques for a robust and reliable Communication Electronic Warfare System
Jamming-resistant communication is crucial for safety-critical applications such as emergency alert broadcasts or the dissemination of navigation signals in adversarial conditions. Interference due to intentional/unintentional jamming, co-channel and adjacent channel users can cause severe performance degradation to the communication receivers. Several studies on Electronic Attacks (EAs) to the...
متن کاملAnalysis of Performance and Implementation Complexity of Array Processing in Anti-Jamming GNSS Receivers
This paper investigates the existing spatial-temporal interference suppression methods which attempt to mitigate interference before the GNSS receiver performs correlation. These methods comprise non-blind signal processing techniques and blind signal processing techniques by using the antenna array. Also, an extensive comparison of these techniques for GNSS is established, which is evaluated f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014