ABSTRACT
While properties of wireless communications are often considered as a disadvantage from a security perspective, this work demonstrates how multipath propagation, a broadcast medium, and frequency jamming can be used as valuable security primitives. Instead of conventional message authentication by receiving, verifying, and then discarding fake data, sensor nodes are prevented from receiving fake data at all. The erratic nature of signal propagation distributes the jamming activity over the network which hinders an adversary in predicting jamming nodes and avoids selective battery-depletion attacks. By conducting real-world measurements, we justify the feasibility of such a security design and provide details on implementing it within a realistic wireless sensor network.
- B. A.-Sadjadi, A. Kiayias, A. Mercado, and B. Yener. Robust key generation from signal envelopes in wireless networks. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 401-410, New York, NY, USA, November 2007. ACM. Google ScholarDigital Library
- A. Bachorek, I. Martinovic, and J. B. Schmitt. Enabling Authentic Transmissions in WSNs -- Turning Jamming against the Attacker. In Proceedings of the IEEE ICNP 4th Annual Workshop on Secure Network Protocols (NPSec 2008), Orlando, FL, USA, October 2008.Google ScholarCross Ref
- Y. Chen, W. Trappe, and R. Martin. Detecting and localizing wireless spoofing attacks. In Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks, pages 193--202, May 2007.Google ScholarCross Ref
- D. B. Faria and D. R. Cheriton. Detecting Identity-based Attacks in Wireless Networks using Signalprints. In WiSe '06: Proceedings of the 5th ACM workshop on Wireless Security, pages 43--52, September 2006. Google ScholarDigital Library
- Z. Li, W. Xu, R. Miller, and W. Trappe. Securing Wireless Systems Via Lower Layer Enforcements. In WiSe '06: Proceedings of the 5th ACM Workshop on Wireless Security, pages 33--42, September 2006. Google ScholarDigital Library
- I. Martinovic, L. Cappellaro, and J. B. Schmitt. Chaotic Communication Improves Authentication -- Protecting WSNs Against Injection Attacks. Security and Communication Networks Journal (Special Issue on Wireless Sensor Networks), December 2008. Accepted for publication.Google Scholar
- I. Martinovic, P. Pichota, and J. B. Schmitt. Jamming for Good: A Fresh Approach to Authentic Communication in WSNs. Technical Report, University of Kaiserslautern, Germany, July 2008.Google Scholar
- I. Martinovic, F. Zdarsky, M. Wilhelm, C. Wegmann, and J. B. Schmitt. Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless. In Proc. ACM Conference on Wireless Network Security (WiSec 2008), pages 43--52, Alexandria, VA, USA, March 2008. Google ScholarDigital Library
- S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. Radio-Telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel. In The 14th Annual International Conference on Mobile Computing and Networking (MobiCom). ACM Press, September 2008. Google ScholarDigital Library
- T. Rappaport. Wireless Communications: Principles and Practice. Prentice Hall PTR, Upper Saddle River, NJ, USA, 2001. Google ScholarDigital Library
- D. Son, B. Krishnamachari, and J. Heidemann. Experimental study of concurrent transmissions in wireless sensor networks. In 4th Conference on Embedded Networked Sensor Systems (SenSys), 2006. Google ScholarDigital Library
- L. Song and A. Arora. Spatial Signatures for Lightweight Security in Wireless Sensor Networks. In 27th IEEE International Conference on Computer Communications (INFOCOM 2008), Phoenix, AZ, USA, April 2008.Google Scholar
- Texas Instruments. 2.4 GHz IEEE 802.15.4 / ZigBee-ready RF Transceiver, mar 2007.Google Scholar
- M. Čagalj, S. Čapkun, R. Rengaswamy, I. Tsigkogiannis, M. Srivastava, and J.-P. Hubaux. Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels. In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S'06), pages 280--294, May 2006. Google ScholarDigital Library
- S. Čapkun, R. Rengaswamy, I. Tsigkogiannis, and M. Srivastava. Implications of Radio Fingerprinting on the Security of Sensor Networks. In Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, September 2007.Google Scholar
Index Terms
- Jamming for good: a fresh approach to authentic communication in WSNs
Recommendations
A survey on jamming attacks and countermeasures in WSNs
Jamming represents the most serious security threat in the field of wireless sensor networks (WSNs), as it can easily put out of order even WSNs that utilize strong highlayer security mechanisms, simply because it is often ignored in the initial WSN ...
Compromise-resilient anti-jamming communication in wireless sensor networks
Jamming is a kind of Denial-of-Service attack in which an adversary purposefully emits radio frequency signals to corrupt the wireless transmissions among normal nodes. Although some research has been conducted on countering jamming attacks, few works ...
An adaptive neuro-fuzzy logic based jamming detection system in WSN
Wireless sensor network (WSN) is employed in variety of applications ranging from agriculture to military. WSN is vulnerable to various security attacks, in which jamming attacks obstruct and disturb the exchange of information between sensor nodes in ...
Comments