Frequency Hopping against a Powerful Adversary
نویسندگان
چکیده
Frequency hopping is a central method in wireless communication, offering improved resistance to adversarial interference and interception attempts, and easy non-coordinated control in dynamic environments. In this paper, we introduce a new model that supports a rigorous study of frequency hopping in adversarial settings. We then propose new frequency hopping protocols that allow a sender-receiver pair to essentially use the full communication capacity, despite a powerful adversary that can scan and jam a significant amount of the ongoing transmissions.
منابع مشابه
A Combinatorial Model of Interference in Frequency Hopping Schemes
In a frequency hopping multiple access (FHMA) system a set of users communicate simultaneously using frequency hopping sequences defined on the same set of frequency channels. A frequency hopping sequence specifies which channels to use as communication progresses. A set of frequency hopping sequences used in an FHMA is called a frequency hopping scheme (FHS). Much of the research on the perfor...
متن کاملMultifaceted Defense Against Distributed Denial of Service Attacks: Prevention, Detection, Mitigation
Distributed Denial of Service (DDoS) attacks can be so powerful that they can easily deplete the computing resources or bandwidth of the potential targets, by flooding massive packets. Internet infrastructures and network applications, including social services and communication systems for emergency management, are under the threat of the DDoS problem. This thesis aims at providing efficient m...
متن کاملThe Game of Embedding and Detecting Spread Spectrum Watermarks under The Estimation Attack
Recently, we have demonstrated that simple block repetition codes enable strong robustness of spread-spectrum (SS) watermarks (WMs) with respect to limited geometric transformations [1]. Although such codes provide an effective prevention mechanism against WM de-synchronization, they also significantly increase the effectiveness of the watermark estimation attack [2]. We show the theory behind ...
متن کاملMoving target defense for securing smart grid communications: Architectural design, implementation and evaluation
Supervisory Control And Data Acquisition (SCADA) communications are often subjected to various kinds of sophisticated cyber-attacks which can have a serious impact on the Critical Infrastructure such as the power grid. Most of the time, the success of the attack is based on the static characteristics of the system, thereby enabling an easier profiling of the target system(s) by the adversary an...
متن کاملSecurity & Indistinguishability in the Presence of Traffic Analysis
Traffic analysis (TA) is a powerful tool against the security and privacy of cryptographic primitives, permitting an adversary to monitor the frequency and timing characteristics of transmissions in order to distinguish the senders or the receivers of possibly encrypted communication. Briefly, adversaries may leak implementation-specific information even for schemes that are provably secure wit...
متن کامل