Self-Controlled Jamming Resilient Design Using Physical Layer Secret Keys
نویسندگان
چکیده
Direct-sequence spread spectrum (DSSS) has been recognized as an effective jamming resilient technique. However, the effectiveness of DSSS relies on the use of either pre-shared unique secret keys or a bank of public codes, which can be prohibitively expensive in future large-scale decentralized wireless networks, e.g., the Internet of Things. To tackle this problem, in this work we develop a new framework for self-controlled physical-layer-security-based spreading sequence generation. Specifically, we exploit the shared randomness inherent in wireless channels to generate and refresh secret seeds at each communicating node using shared randomness extraction, entropy pooling and random seed generation. The generated secret seeds are then utilized to perform DSSS. To evaluate the performance, we implement our framework on software defined radio platform and examine the successful transmission probability of the system under various models of broadband jamming along with an special case wherein adversary is assumed to have leaked information on key rate. Both our analysis and real-world measurements confirm that communication systems based on our framework can achieve jamming-resilient communications without requiring pre-shared sequences. J. Prakash, C. Liu, and T. Q. S. Quek are with the Information Systems Technology and Design Pillar, Singapore University of Technology and Design, Singapore 487372 (email: jay [email protected], chenxi [email protected], [email protected]). J. Lee is with the Department of Information and Communication Engineering, Daegu Gyeongbuk Insitute of Science and Technology (DGIST), Daegu, Korea (email: [email protected]). The corresponding author is C. Liu. SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 2
منابع مشابه
Jam Resistant Communications without Shared Secrets
Information security is only attained when all four of the classic information assurance goals confidentiality, integrity, authenticity, and availability – are attained. The work presented focuses exclusively on the availability goal; in particular, maintaining the availability of the physical layer link in an omnidirectional wireless communications system. Hostile jamming is a direct attack on...
متن کاملPhysical Layer Secret Key Agreement Using One-Bit Quantization and Low-Density Parity-Check Codes
PHYSICAL LAYER SECRET KEY AGREEMENT USING ONE-BIT QUANTIZATION AND LOW-DENSITY PARITY-CHECK CODES John A. Snoap Old Dominion University, 2016 Director: Dr. Dimitrie C. Popescu Physical layer approaches for generating secret encryption keys for wireless systems using channel information have attracted increased interest from researchers in recent years. This paper presents a new approach for cal...
متن کاملJamming-resistant Broadcast Communication without Shared Keys
Jamming-resistant broadcast communication is crucial for safety-critical applications such as emergency alert broadcasts or the dissemination of navigation signals in adversarial settings. These applications share the need for guaranteed authenticity and availability of messages which are broadcasted by base stations to a large and unknown number of (potentially untrusted) receivers. Common tec...
متن کاملA Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks
In order to provide security services in wireless sensor networks, a well-known task is to provide cryptographic keys to sensor nodes prior to deployment. It is difficult to assign secret keys for all pairs of sensor node when the number of nodes is large due to the large numbers of keys required and limited memory resources of sensor nodes. One possible solution is to randomly assign a few key...
متن کاملEnabling Short Fragments for Uncoordinated Spread Spectrum Communication
Uncoordinated spread spectrum (USS) protocols have been proposed for anti-jamming communication in wireless settings without shared secrets. The existing USS protocols assume that fragments of hundreds of bits can be transmitted on different channels in order to identify fragments that belong to the same message. However, such long transmissions are susceptible to reactive jamming. To address t...
متن کامل