Inscribing in to an Control Attempt against Jammer Attack Using FB Decoding Mechanism

Article Preview

Abstract:

Previously Spread Spectrum (SS) communication involve by setting up preconfigured keys among the communicating nodes that are constrained to possess synchronous behaviour. This extends to several issues creating circular dependency problem, offering less energy efficiency and thereby leading to insecure short-lived communication. In this paper, an opponent resilient secret sharing concept is introduced without any establishment of pre-shared keys by FB (Forward Backward) decoding. It illustrates using time reversed message extraction and key scheduling at receiver side that enables secured transmission over wireless communication even when the receiver node remains inactive and attaining jammer not to obtain the original data sent by the sender node. Spreading the data involves use of DSSS as it would be more compatible in adjusting to multiple bandwidths. Main goal is to transmit the message in such a way that the time required to deliver the secret must be less than the time for the opponent to find key during transmission. Further, it come up with minimal storage overhead, cost effective and sustains long-lived secured communication among the interacting nodes. Evaluation of various parameters is performed using NS-2 toolkit to prove that this newer approach is better than earlier work.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

412-417

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] P. Tague, M. Li, and R. Poovendran, Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution, " Proc. IEEE 18th Ann. Int, l Symp. Personal, Indoor, and Mobile Radio Comm. (PIMRC), (2007).

DOI: 10.1109/pimrc.2007.4394778

Google Scholar

[2] M. Strasser, C. Popper, S. Capkun, and M. Cagalj, Jamming Resistant Key Establishment Using Uncoordinated Frequency Hopping, Proc. IEEE Symp. Security and Privacy (ISSP), (2008).

DOI: 10.1109/sp.2008.9

Google Scholar

[3] C. Popper, M. Strasser, and S. Capkun, Jamming-Resistant Broadcast Communication without Shared Keys, Proc. USENIX Security Symp., (2009).

Google Scholar

[4] M. Li, I. Koutsopoulos, and R. Poovendran, Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks, Proc. IEEE INFOCOM, (2010).

DOI: 10.1109/infcom.2007.155

Google Scholar

[5] J. Chiang and Y. -C. Hu, Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks, Proc. ACM MobiCom, (2011).

Google Scholar

[6] G. Lin and G. Noubir, On Link Layer Denial of Service in Data Wireless LANs, Wireless Comm. Mobile Computing, vol. 5, no. 3, pp.273-284, (2005).

DOI: 10.1002/wcm.221

Google Scholar