Physical resilience to insider attacks in IoT networks: Independent cryptographically secure sequences for DSSS anti-jamming
نویسندگان
چکیده
Wireless communication is a key technology for the Internet of Things (IoT). Due to its open nature, physical layer wireless systems high-priority target an adversary whose goal disrupt normal behavior system. In particular, jamming attacks are one most straightforward and effective types attacks: information flow system stopped or severely disturbed. this paper, we propose method improve resilience IoT based on Direct-Sequence Spread-Spectrum (DSSS) techniques. Our proposal inspired by Moving Target Defense (MTD) paradigm. MTD strategies randomize components system, increasing effort attacker needs compromise We use state-of-the-art Cryptographically Secure Pseudo-Random Number Generators outputs as spreading sequences DSSS. The proposed generated in ad-hoc, independent, distributed way. show probabilistically that have robust cross-correlation properties. define multi-user model evaluate Bit-Error-Rate our presence two jammers: classical band-limited Gaussian noise jammer, insider smart jammer with knowledge sequence used proactively mitigates attack. quantify implementing proposal, function length power.
منابع مشابه
Alibi: A framework for identifying insider-based jamming attacks in multi-channel wireless networks
We consider the problem of identifying the insider-based attacks in the form of jammers in multi-channel wireless networks, where jammers have the inside knowledge of frequency hopping patterns and any protocols used in the wireless network. While this type of attackers is dangerous, most of current state-of-the-art jamming detection solutions cannot cope with them. In this work, we propose a n...
متن کاملAlibi: A novel approach for detecting insider-based jamming attacks in wireless networks
We consider the problem of detecting the insiderbased attacks in the form of jammers in a single-hop wireless LAN environment, where jammers have the inside knowledge of frequency hopping patterns and any protocols used in the wireless network. We propose a novel jammer model in which the jammers are modeled by the number of channels that they can jam simultaneously. We further propose the nove...
متن کاملA Stateless Cryptographically-Secure Physical Unclonable Function
We present the first stateless construction of a cryptographically-secure Physical Unclonable Function. Our construct requires no non-volatile (permanent) storage, secure or otherwise, and its computational security can be clearly reduced to the hardness of Learning Parity with Noise (LPN) in the random oracle model. The construction is “stateless,” because there is no information stored betwee...
متن کاملSecure Routing Techniques to Mitigate Insider Attacks in Wireless Ad Hoc Networks
Route falsification attacks are easy to launch in wireless ad hoc networks with on demand routing protocols that employ network-wide flooding of control packets for route discoveries. Colluding insider malicious nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts in routing paths and influence data traffic to flow through them. The cu...
متن کاملOn the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks
In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) protocol, with two well-known protocols, the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR). For this purpose, we have developed a simulator, which faithfully reifies the workings of a given protocol, considering a fixed, reconfigurable ad hoc network given by the number ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computer Networks
سال: 2021
ISSN: ['1872-7069', '1389-1286']
DOI: https://doi.org/10.1016/j.comnet.2020.107751