Keyless jam resistance

被引:27
作者
Baird, Leemon C., III [1 ]
Bahn, William L. [1 ]
Collins, Michael D. [1 ]
Carlisle, Martin C. [1 ]
Butler, Sean C. [1 ]
机构
[1] USAF Acad, Colorado Springs, CO 80840 USA
来源
2007 IEEE INFORMATION ASSURANCE WORKSHOP | 2007年
关键词
D O I
10.1109/IAW.2007.381926
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Traditionally, omnidirectional, radio frequency (RF) communication has been made resistant to jamming by the use of a secret key that is shared by the sender and receiver. There are no known methods for achieving jam resistance without that shared key. Unfortunately, wireless communication is now reaching a scale and a level of importance where such secret-key systems are becoming impractical. For example, the civilian side of the Global Positioning System (GPS) cannot,use a shared secret, since that secret would have to be given to all 6.5 billion potential users, and so would no longer be secret. So civilian GPS cannot currently be protected from jamming. But the FAA has stated that the civilian airline industry will transition to using GPS for all navigational aids, even during landings. A terrorist with a simple jamming system could wreak havoc at a major airport. No existing system can solve this problem, and the problem itself has not even been widely discussed. The problem of keyless jam resistance is important. There is a great need for a system that can broadcast messages without any prior secret shared between the sender and receiver. We propose the first system for keyless jam resistance: the BBC algorithm. We describe the encoding, decoding, and broadcast algorithms. We then analyze it for expected resistance to jamming and error rates. We show that BBC can achieve the same level of jam resistance as traditional spread spectrum systems, at just under half the bit rate, and with no shared secret. Furthermore, a hybrid system can achieve the same average bit rate as traditional systems.
引用
收藏
页码:143 / +
页数:3
相关论文
共 46 条
  • [1] AHLSTRM G, LITHISYR2543
  • [2] [Anonymous], P IEEE C ULTR WID BA
  • [3] Jammer mitigation in spread spectrum communications using blind sources separation
    Belouchrani, A
    Amin, MG
    [J]. SIGNAL PROCESSING, 2000, 80 (04) : 723 - 729
  • [4] BERGEL I, 2003, P 2003 INT WORKSH UL
  • [5] BERGSTROM C, 1998, IEEE GLOBAL TELECOMM, V6
  • [6] Blazquez R, 2003, INT CONF ACOUST SPEE, P137
  • [7] BLAZQUEZ R, 2005, ICASSP
  • [8] Secure communications in ad hoc networks
    Burmester, M
    Van Le, T
    [J]. PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 234 - 241
  • [9] A secure and scalable group key exchange system
    Burmester, M
    Desmedt, Y
    [J]. INFORMATION PROCESSING LETTERS, 2005, 94 (03) : 137 - 143
  • [10] BURMESTER M, 1995, ADV CRYPTOLOGY PRE