Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks

被引:52
作者
Chiang, Jerry T. [1 ]
Hu, Yih-Chun [1 ]
机构
[1] Univ Illinois, Dept Elect & Comp Engn, Urbana, IL 61801 USA
关键词
Broadcast networks; jamming mitigation; spread spectrum;
D O I
10.1109/TNET.2010.2068576
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless communication systems are often susceptible to the jamming attack where adversaries attempt to overpower transmitted signals by injecting a high level of noise. Jamming is difficult to mitigate in broadcast networks because transmitting and receiving are inherently symmetric operations: A user that possesses the key to decode a transmission can also use that key to jam the transmission. We describe a code tree system that provides input to the physical layer and helps the physical layer circumvent jammers. In our system, the transmitter has more information than any proper subset of receivers. Each receiver cooperates with the transmitter to detect any jamming that affects that receiver. In the resulting system, each benign user is guaranteed to eliminate the impact of the attacker after some finite number of losses with arbitrarily high probability. We show that any system that relies on only using spreading code, and no other physical factors, to mitigate jamming must use at least j + 1 codes, where is the number of jammers. We then propose an optimized scheme that is power-efficient: Each transmission is sent on at most 2j + 1 codes simultaneously. Finally, we demonstrate that our scheme approaches the best possible performance by performing an extensive analysis of the system using both event-driven ns-2 and chip-accurate MATLAB simulations.
引用
收藏
页码:286 / 298
页数:13
相关论文
共 23 条
[1]  
[Anonymous], 2005, P 6 ACM INT S MOB AD, DOI DOI 10.1145/1062689.1062697
[2]  
[Anonymous], 2006, P 7 ACM INT S MOB AD
[3]  
[Anonymous], 1997, 802111997 IEEE COMP
[4]  
BAHN W, 2007, J COMPUT SCI COLL, V23, P174
[5]   Advances in network simulation [J].
Breslau, L ;
Estrin, D ;
Fall, K ;
Floyd, S ;
Heidemann, J ;
Helmy, A ;
Huang, P ;
McCanne, S ;
Varadhan, K ;
Xu, Y ;
Yu, HB .
COMPUTER, 2000, 33 (05) :59-+
[6]  
Chiang J.T., 2008, INFOCOM, INFOCOM'08, P1211
[7]  
Chiang JT, 2007, MOBICOM'07: PROCEEDINGS OF THE THIRTEENTH ACM INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, P346
[8]   PRIVACY AND AUTHENTICATION - INTRODUCTION TO CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
PROCEEDINGS OF THE IEEE, 1979, 67 (03) :397-427
[9]  
*IEEE COMP SOC LAN, 1999, 80211A1999 IEEE COMP
[10]  
Jin T, 2009, MOBIHOC'09 PROCEEDINGS OF THE TENTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P219, DOI 10.1145/1530748.1530779