skip to main content
10.1145/1514274.1514298acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Jamming for good: a fresh approach to authentic communication in WSNs

Authors Info & Claims
Published:16 March 2009Publication History

ABSTRACT

While properties of wireless communications are often considered as a disadvantage from a security perspective, this work demonstrates how multipath propagation, a broadcast medium, and frequency jamming can be used as valuable security primitives. Instead of conventional message authentication by receiving, verifying, and then discarding fake data, sensor nodes are prevented from receiving fake data at all. The erratic nature of signal propagation distributes the jamming activity over the network which hinders an adversary in predicting jamming nodes and avoids selective battery-depletion attacks. By conducting real-world measurements, we justify the feasibility of such a security design and provide details on implementing it within a realistic wireless sensor network.

References

  1. B. A.-Sadjadi, A. Kiayias, A. Mercado, and B. Yener. Robust key generation from signal envelopes in wireless networks. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 401-410, New York, NY, USA, November 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. A. Bachorek, I. Martinovic, and J. B. Schmitt. Enabling Authentic Transmissions in WSNs -- Turning Jamming against the Attacker. In Proceedings of the IEEE ICNP 4th Annual Workshop on Secure Network Protocols (NPSec 2008), Orlando, FL, USA, October 2008.Google ScholarGoogle ScholarCross RefCross Ref
  3. Y. Chen, W. Trappe, and R. Martin. Detecting and localizing wireless spoofing attacks. In Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks, pages 193--202, May 2007.Google ScholarGoogle ScholarCross RefCross Ref
  4. D. B. Faria and D. R. Cheriton. Detecting Identity-based Attacks in Wireless Networks using Signalprints. In WiSe '06: Proceedings of the 5th ACM workshop on Wireless Security, pages 43--52, September 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Z. Li, W. Xu, R. Miller, and W. Trappe. Securing Wireless Systems Via Lower Layer Enforcements. In WiSe '06: Proceedings of the 5th ACM Workshop on Wireless Security, pages 33--42, September 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. I. Martinovic, L. Cappellaro, and J. B. Schmitt. Chaotic Communication Improves Authentication -- Protecting WSNs Against Injection Attacks. Security and Communication Networks Journal (Special Issue on Wireless Sensor Networks), December 2008. Accepted for publication.Google ScholarGoogle Scholar
  7. I. Martinovic, P. Pichota, and J. B. Schmitt. Jamming for Good: A Fresh Approach to Authentic Communication in WSNs. Technical Report, University of Kaiserslautern, Germany, July 2008.Google ScholarGoogle Scholar
  8. I. Martinovic, F. Zdarsky, M. Wilhelm, C. Wegmann, and J. B. Schmitt. Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless. In Proc. ACM Conference on Wireless Network Security (WiSec 2008), pages 43--52, Alexandria, VA, USA, March 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. Radio-Telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel. In The 14th Annual International Conference on Mobile Computing and Networking (MobiCom). ACM Press, September 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. T. Rappaport. Wireless Communications: Principles and Practice. Prentice Hall PTR, Upper Saddle River, NJ, USA, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Son, B. Krishnamachari, and J. Heidemann. Experimental study of concurrent transmissions in wireless sensor networks. In 4th Conference on Embedded Networked Sensor Systems (SenSys), 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. L. Song and A. Arora. Spatial Signatures for Lightweight Security in Wireless Sensor Networks. In 27th IEEE International Conference on Computer Communications (INFOCOM 2008), Phoenix, AZ, USA, April 2008.Google ScholarGoogle Scholar
  13. Texas Instruments. 2.4 GHz IEEE 802.15.4 / ZigBee-ready RF Transceiver, mar 2007.Google ScholarGoogle Scholar
  14. M. Čagalj, S. Čapkun, R. Rengaswamy, I. Tsigkogiannis, M. Srivastava, and J.-P. Hubaux. Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels. In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S'06), pages 280--294, May 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. S. Čapkun, R. Rengaswamy, I. Tsigkogiannis, and M. Srivastava. Implications of Radio Fingerprinting on the Security of Sensor Networks. In Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, September 2007.Google ScholarGoogle Scholar

Index Terms

  1. Jamming for good: a fresh approach to authentic communication in WSNs

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        WiSec '09: Proceedings of the second ACM conference on Wireless network security
        March 2009
        280 pages
        ISBN:9781605584607
        DOI:10.1145/1514274

        Copyright © 2009 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 16 March 2009

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        Overall Acceptance Rate98of338submissions,29%

        Upcoming Conference

        WiSec '24

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader