Title :
Combining cryptographic primitives to prevent jamming attacks in wireless networks
Author :
Singh, N.H. ; Kayalvizhi, A.
Author_Institution :
Veltech Multitech Dr. Rangarajan Dr. Sakunthala Eng. Coll., Chennai, India
Abstract :
The Open Nature of wireless medium leaves an intentional interference attack, typically referred to as jamming. This intentional interference with wireless transmission launch pad for mounting Denial-Of-Service attack on wireless networks. Typically, jamming has been addresses under an external threat model. However, adversaries with internal knowledge of protocol specification and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In this work we address the problem of jamming attacks and adversary is active for short period of time, selectively targeting the messages of high importance. We show that the selective jamming attacks can be launched by performing real-time packet classification at the physical layer. To mitigate these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. They are Strong Hiding Commitment Schemes (SHCS), Cryptographic Puzzles Hiding Schemes (CPHS), All-Or-Nothing Transformation Hiding Schemes (AONTS-HS). Random key distribution methods are done along with three schemes to give more secured packet transmission in wireless networks.
Keywords :
cryptography; jamming; radio networks; telecommunication security; all-or-nothing transformation hiding schemes; cryptographic primitives; cryptographic puzzles hiding schemes; denial-of-service attack; intentional interference attack; jamming attacks prevention; low-effort jamming attacks; network secrets; open nature; physical-layer attributes; protocol specification; random key distribution methods; secured packet transmission; selective jamming attacks; strong hiding commitment schemes; wireless networks; wireless transmission launch pad; Communication system security; Cryptography; Interference; Jamming; Receivers; Wireless networks; Selective jamming; denial-of-service; packet classification; wireless networks;
Conference_Titel :
Information Communication and Embedded Systems (ICICES), 2013 International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4673-5786-9
DOI :
10.1109/ICICES.2013.6508220