Author : Pranitha.S 1
Date of Publication :7th May 2016
Abstract: We address the issues on broadcast communications due to jamming, considering a model which has trouble due to inside jammers. We consider a method for broadcasting messages from a trusted central authority based on the time and frequency named time-delayed broadcasting scheme (TDBS), which operates by transmitting a message one after the other serially to be broadcasted, transmission is based upon frequency and time slot. Their design prevents the leak of information due to the exposure of sequences by compromised nodes. This paper deals with the mechanism based on the traditional anti-jamming techniques which deal with spread spectrum(SS) concept to provide the communication which is jamming resistant in the presence of inside jammer through sequential and assisted broadcasting modes.
Reference :
-
[1] S. Liu, L. Lazos, and M. Krunz, “Thwarting inside jamming attacks on wireless broadcast communications,” in Proc. 4th ACM WiSec Conf., 2011, pp. 29–40.
[2] A. Liu, P. Ning, H. Dai, Y. Liu, and C. Wang, “Defending DSSS based broadcast communication against insider jammers via delayed seed-disclosure,” in Proc. Annu. Comput. Secur. Appl. Conf., 2010, pp. 367–376.
[3] L. C. Baird, W. L. Bahn, M. D. Collins, M. C. Carlisle, and S. C. Butler. “Keyless jam resistance”, in Proc. of the IEEE Workshop on Information Assurance United States Military Academy, 2007.
[4] A. Chan, X. Liu, G. Noubir, and B. Thapa. “Control channel jamming: Resilience and identification of traitors”, in Proc. of ISIT, 2007.
[5] P. Chaporkar, K. Kar, X. Luo, and S. Sarkar. “Throughput and fairness guarantees through maximal scheduling in wireless networks”. IEEE Transactions on Information Theory, 54 (2), pp. 572–594, 2008.
[6] J. T. Chiang and Y.-C. Hu. “Dynamic jamming mitigation for wireless broadcast networks”, in Proc. of INFOCOM, pages 1211–1219, 2008.
[7] Y. Desmedt, R. Safavi-Naini, H. Wang, C. Charnes, and J. Pieprzyk. “Broadcast anti-jamming systems”, in Proc. of the IEEE International Conference on Networks (ICON), pages 349 – 355, 1999.
[8] A. Gupta, X. Lin, and R. Srikant. “Low-complexity distributed scheduling algorithms for wireless networks”. IEEE/ACM Transactions on Networking (TON), 17(6):1846–1859, 2009.
[9] L. Lazos, S. Liu, and M. Krunz. “Mitigating controlchannel jamming attacks in multi-channel ad hoc networks”. In Proc. of WiSec, pages 169–180, 2009.
[10] Y. Liu, P. Ning, H. Dai, and A. Liu. “Randomized diff erential DSSS: Jamming-resistant wireless broadcast communication”, in Proc. of INFOCOM , 2010.
[11] G. Noubir and G. Lin. “Low-power DoS attacks in data wireless LANs and countermeasures”. Mobile Computing and Communications Review, 7(3):29–30, 2003.