Abstract
Jamming is a kind of Denial-of-Service (DoS) attack in which an adversary purposefully emits radio frequency signals to corrupt wireless transmissions. Thus, the communications among normal sensor nodes become difficult or even impossible. Although some research has been conducted on countering jamming attacks, few works considered jamming by insiders. Here, an attacker first compromises some legitimate sensor nodes to acquire the common cryptographic information of the sensor network and then jams the network through those compromised sensors. In this paper, as our initial effort, we propose a compromise-resilient anti-jamming scheme called split-pairing scheme to deal with single insider jamming problem in a one-hop network setting. In our solution, the physical communication channel of a sensor network is determined by the group key shared by all the sensor nodes. When insider jamming happens, the network will generate a new group key to be shared only by all non-compromised nodes. After that, the insider jammer is revoked and will be unable to predict the future communication channels used by non-compromised nodes. We implement and evaluate our solution using the Mica2 Mote platform and show it has low recovery latency and communication overhead, and it is a practical solution for resource constrained sensor networks under the single insider jamming attack.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Proakis, J.G.: Digital Communications, 4th edn. McGraw-Hill, New York (2000)
Schleher, C.: Electronic Warfare in the Information Age. Artech House, Norwood (1999)
Strasser, M., Popper, C., Capkun, S., Cagalj, M.: Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. In: IEEE Symposium on Security and Privacy (2008)
Strasser, M., Popper, C., Capkun, S.: Efficient Uncoordinated FHSS Anti-Jamming Communication. In: ACM Mobihoc (2009)
Popper, C., Strasser, M., Capkun, S.: Jamming-resistant Broadcast Communication without Shared Keys. In: USENIX Security Symposium (2009)
Xu, W., Trappe, W., Zhang, Y.: Channel Surfing: Defending Wireless Sensor Networks from Jamming and Interference. In: ACM IPSN (2007)
Li, M., Koutsopoulos, I., Poovendran, R.: Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks. In: IEEE Infocom (2007)
Xu, W., Trappe, W., Zhang, Y., Wood, T.: The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In: ACM Mobihoc (2005)
Wood, A.D., Stankovic, J.A., Son, S.H.: JAM: A Jammed-Area Mapping Service for Sensor Networks. In: Proc. of the 24th IEEE International Real-Time Systems Symposium (2003)
Poisel, R.: Modern Communications Jamming Principles and Techniques. Artech House Publisher, Norwood (2006)
Brown, T., James, J., Sethi, A.: Jamming and sensing of encrypted wireless ad hoc networks. In: ACM Mobihoc (2006)
Lazos, L., Liu, S., Krunz, M.: Mitigating Control-Channel Jamming Attacks in Multi-Channel Ad Hoc Networks. In: ACM WiSec (2009)
Tague, P., Li, M., Poovendran, R.: Mitigation of Control Channel Jamming under Node Capture Attacks. IEEE Transactions on Mobile Computing (2009)
Xu, W., Trappe, W., Zhang, Y.: AntiJamming Timing Channels for Wireless Networks. In: ACM WiSec (2008)
Chipcon CC1000 Radio’s Datasheet, http://www.chipcon.com
Chan, H., Perrig, A., Song, D.: Random Key Predistribution Schemes for Sensor Networks. In: IEEE Security and Privacy Symposim (2003)
Liu, D., Ning, P., Li, R.: Establishing Pairwise Keys in Distributed Sensor Networks. In: ACM CCS (2003)
Zhu, S., Setia, S., Jajodia, S.: LEAP+: Efficient Security Mechanisms for Large-scale Distributed Sensor Networks. In: ACM TOSN (2006)
Karlof, C., Sastry, N., Wagner, D.: TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. In: ACM SenSys (2004)
Blundo, C., Santis, A.D., Herzberg, A., Kutten, S., Vaccaro, U., Yung, M.: Perfectly-secure key distribution for dynamic conferences. In: Proc. of CRYPTO, Advances in Cryptology (1993)
Navda, V., Bohra, A., Ganguly, S., Rubenstein, D.: Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks. In: IEEE Infocom (2007)
Ureten, O., Serinken, N.: Wireless security through RF fingerprinting. Canadian Journal of Electrical and Computer Engineering (2007)
Tinyos homepage, http://webs.cs.berkeley.edu/tos/
Wood, A., Stankovic, J., Zhou, G.: DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks. In: IEEE SECON (2007)
Towsley, D., Kurose, J., Pingali, S.: A Comparison of Sender-Initiated and Receiver-Initiated Reliable Multicast Protocols. IEEE Journal on Selected Areas in Communications (1997)
Danev, B., Capkun, S.: Transient-based identification of wireless sensor nodes. In: ACM/IEEE IPSN (2009)
Sun, Y., Wang, X.: Jammer localization in wireless sensor networks. In: Proc. of the 5th International Conference on Wireless Communications, Networking and Mobile Computing (2009)
Seshadri, A., Perrig, A., van Doorn, L., Khosla, P.: Swatt: Software-based attestation for embedded devices. In: IEEE Symposium on Security and Privacy (2004)
Shaneck, M., Mahadevan, K., Kher, V., Kim, Y.: Remote software-based attestation for wireless sensors. In: Molva, R., Tsudik, G., Westhoff, D. (eds.) ESAS 2005. LNCS, vol. 3813, pp. 27–41. Springer, Heidelberg (2005)
Park, T., Shin, K.G.: Soft tamper-proofing via program integrity verification in wireless sensor networks. IEEE Transactions on Mobile Computing (2005)
Yang, Y., Wang, X., Zhu, S., Cao, G.: Distributed softwarebased attestation for node compromise detection in sensor networks. In: IEEE SRDS (2007)
Zhou, Y., Fang, Y.: A two-layer key establishment scheme for wireless sensor networks. IEEE Transactions on Mobile Computing (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Jiang, X., Hu, W., Zhu, S., Cao, G. (2010). Compromise-Resilient Anti-jamming for Wireless Sensor Networks. In: Soriano, M., Qing, S., López, J. (eds) Information and Communications Security. ICICS 2010. Lecture Notes in Computer Science, vol 6476. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17650-0_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-17650-0_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17649-4
Online ISBN: 978-3-642-17650-0
eBook Packages: Computer ScienceComputer Science (R0)