Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks

被引:0
|
作者
Singh, Ngangbam Herojit [1 ]
Kayalvizhi, A. [1 ]
机构
[1] VelTech Multitech Dr Rangarajan Dr Sakunthala Eng, Madras, Tamil Nadu, India
来源
2013 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES) | 2013年
关键词
Selective jamming; denial-of-service; wireless networks; packet classification;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Open Nature of wireless medium leaves an intentional interference attack, typically referred to as jamming. This intentional interference with wireless transmission launch pad for mounting Denial-Of-Service attack on wireless networks. Typically, jamming has been addresses under an external threat model. However, adversaries with internal knowledge of protocol specification and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In this work we address the problem of jamming attacks and adversary is active for short period of time, selectively targeting the messages of high importance. We show that the selective jamming attacks can be launched by performing real-time packet classification at the physical layer. To mitigate these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. They are Strong Hiding Commitment Schemes (SHCS), Cryptographic Puzzles Hiding Schemes (CPHS), All-Or-Nothing Transformation Hiding Schemes (AONTSHS). Random key distribution methods are done along with three schemes to give more secured packet transmission in wireless networks.
引用
收藏
页码:251 / 255
页数:5
相关论文
共 50 条
  • [1] Combining cryptographic primitives to prevent jamming attacks in wireless networks
    Singh, Ngangbam Herojit
    Kayalvizhi, A.
    2013 International Conference on Information Communication and Embedded Systems, ICICES 2013, 2013, : 251 - 255
  • [2] Jamming Attacks in Wireless Networks
    Kumar, S. Praveen
    Swapna, S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (10): : 110 - 113
  • [3] Selective Jamming Attacks in Wireless Networks
    Proano, Alejandro
    Lazos, Loukas
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [4] MITIGATION OF JAMMING ATTACKS IN WIRELESS NETWORKS
    Dorus, R.
    Vinoth, P.
    2013 IEEE INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN COMPUTING, COMMUNICATION AND NANOTECHNOLOGY (ICE-CCN'13), 2013, : 168 - 171
  • [5] Jamming Attacks on Federated Learning in Wireless Networks
    Shi, Yi
    Sagduyu, Yalin E.
    arXiv, 2022,
  • [6] Jamming attacks on wireless networks: A taxonomic survey
    Vadlamani, Satish
    Eksioglu, Burak
    Medal, Hugh
    Nandi, Apurba
    INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2016, 172 : 76 - 94
  • [7] A Survey of Public-Key Cryptographic Primitives in Wireless Sensor Networks
    Shim, Kyung-Ah
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2016, 18 (01): : 577 - 601
  • [8] Energy and Distance evaluation for Jamming Attacks in wireless networks
    Fun - Self-organizing Future Ubiquitous Network, Inria Lille - Nord Europe, Villeneuve d'Ascq, France
    不详
    Proc. IEEE/ACM Int. Symp. Distrib. Simul. Real Time Appl., DS-RT,
  • [9] Energy and Distance evaluation for Jamming Attacks in wireless networks
    Bout, Emilie
    Loscri, Valeria
    Gallais, Antoine
    PROCEEDINGS OF THE 2020 IEEE/ACM 24TH INTERNATIONAL SYMPOSIUM ON DISTRIBUTED SIMULATION AND REAL TIME APPLICATIONS (DS-RT), 2020, : 146 - 150
  • [10] DEFENDING WIRELESS SENSOR NETWORKS FROM JAMMING ATTACKS
    Mpitziopoulos, Aristides
    Gavalas, Damianos
    Pantziou, Grammati
    Konstantopoulos, Charalampos
    2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 81 - +