Skip to main content
Log in

Mitigating jamming attacks in wireless broadcast systems

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Wireless communications are vulnerable to signal jamming attacks. Spread spectrum mitigates these attacks by spreading normal narrowband signals over a much wider band of frequencies and forcing jammers who do not know the spreading pattern to expend much more effort to launch the attack. In broadcast systems, however, jammers can easily find out the spread pattern by compromising just a single receiver. Several group-based ideas have been proposed to deal with compromised receivers; they can tolerate up to t malicious receivers by adding 2t extra copies for each broadcast message. In this paper, we propose a novel scheme with random channel sharing. This scheme reduces the communication cost from 2t to (1 + p)t extra copies, where p determines the channel sharing probability (0 < p < 1). In addition, it does not increase the hardware complexity as it does not require a receiver to operate on multiple channels at the same time.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Chiang, J. T., & Hu, Y. (2008). Dynamic jamming mitigation for wireless broadcast networks. In INFOCOM 2008. The 27th conference on computer communications. IEEE, pp. 1211–1219, April 2008.

  2. Desmedt, Y., Safavi-Naini, R., Wang, H., Batten, L., Charnes, C., & Pieprzyk, J. (2001). Broadcast anti-jamming systems. Computer Networks, 35(2–3), 223–236.

    Article  Google Scholar 

  3. Dong, Q., Liu, D., & Ning, P. (2008). Pre-authentication filters: Providing dos resistance for signature-based broadcast authentication in wireless sensor networks. In Proceedings of ACM conference on wireless network security (WiSec).

  4. Lazos, L., Liu, S., & Krunz, M. (2009). Mitigating control-channel jamming attacks in multi-channel ad hoc networks. In WiSec ’09: Proceedings of the second ACM conference on wireless network security.

  5. Li, M., Koutsopoulos, I., & Poovendran, R. (2007). Optimal jamming attacks and network defense policies in wireless sensor networks. In IEEE international conference on computer communications (INFOCOM), pp. 1307–1315, May 2007.

  6. Lin, G., & Noubir, G. (2005). On link layer denial of service in data wireless lans. Wireless Communications and Mobile Computing, 5(3), 273–284.

    Article  Google Scholar 

  7. Liu, Y., Ning, P., Dai, H., & Liu, A. (2010). Randomized differential dsss: Jamming-resistant wireless broadcast communication. In Proceedings of the 29th IEEE international conference on computer communications (INFOCOM ’10).

  8. Liu, D., Raymer, J., & Fox, A. (2012). Efficient and timely jamming detection in wireless sensor networks. In Proceedings of IEEE international conference on mobile ad hoc and sensor systems (MASS), October 2012 (to appear).

  9. Poisel, R. A. (2003). Modern communications jamming principles and techniques. London: Artech House Publishers.

    Google Scholar 

  10. Popper, C., Strasser, M., & Capkun, S. (2009). Jamming-resistant broadcast communication without shared keys. In Proceedings of the 18th conference on USENIX security symposium.

  11. Simon, M. K., Omura, J. K., Scholtz, R. A., & Levitt, B. K. (2001). Spread spectrum communications handbook. New York: McGraw-Hill, Inc.

    Google Scholar 

  12. Slater, D., Tague, P., Poovendran, R., & Matt, B. J. (2009). A coding-theoretic approach for efficient message verification over insecure channels. In WiSec ’09: Proceedings of the second ACM conference on Wireless network security, pp. 151–160. ACM.

  13. Strasser, M., Pöpper, C., Capkun, S., & Cagalj, M. (2008). Jamming-resistant key establishment using uncoordinated frequency hopping. In Proceedings of the 2008 IEEE symposium on security and privacy (SP), pp. 64–78. IEEE Computer Society.

  14. Strasser, M., Pöpper, C., & Čapkun, S. (2009). Efficient uncoordinated fhss anti-jamming communication. In MobiHoc ’09: Proceedings of the tenth ACM international symposium on mobile ad hoc networking and computing, pp. 207–218. ACM.

  15. Tague, P., Li, M., & Poovendran, R. (2009). Mitigation of control channel jamming under node capture attacks. IEEE Transactions on Mobile Computing, pp. 1221–1234, IEEE Computer Society.

  16. Viterbi, A. J. (1995). CDMA Principles of spread spectrum communication. Reading, MA: Addison-Wesley.

  17. Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of ACM international symposium on mobile ad hoc networking and computing (MobiHoc).

Download references

Acknowledgments

This material is based upon work supported by the National Science Foundation under Grant No. CNS-0916221. We also thank anonymous reviewers for their feedback, which has helped to improve the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Donggang Liu.

Additional information

A preliminary version of this paper appeared in the Proceedings of the International Conference on Distributed Computing Systems (ICDCS), 2010.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Dong, Q., Liu, D. & Wright, M. Mitigating jamming attacks in wireless broadcast systems. Wireless Netw 19, 1867–1880 (2013). https://doi.org/10.1007/s11276-013-0574-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-013-0574-0

Keywords

Navigation