TY - JOUR
T1 - Compromise-resilient anti-jamming communication in wireless sensor networks
AU - Jiang, Xuan
AU - Hu, Wenhui
AU - Zhu, Sencun
AU - Cao, Guohong
N1 - Funding Information:
Acknowledgments The authors would like to thank anonymous reviewers for their insightful comments and helpful suggestions. This work was supported in part by Army Research Office under MURI grant W911NF-07-1-0318 and NSF CAREER 0643906.
PY - 2011/8
Y1 - 2011/8
N2 - Jamming is a kind of Denial-of-Service attack in which an adversary purposefully emits radio frequency signals to corrupt the wireless transmissions among normal nodes. Although some research has been conducted on countering jamming attacks, few works consider jamming attacks launched by insiders, where an attacker first compromises some legitimate sensor nodes to acquire the common cryptographic information of the sensor network and then jams the network through those compromised nodes. In this paper, we address the insider jamming problem in wireless sensor networks. In our proposed solutions, the physical communication channel of a sensor network is determined by the group key shared by all the sensor nodes. When insider jamming happens, the network will generate a new group key to be shared only by the noncompromised nodes. After that, the insider jammers are revoked and will not be able to predict the future communication channels used by the non-compromised nodes. Specifically, we propose two compromise-resilient antijamming schemes: the split-pairing scheme which deals with a single insider jammer, and the key-tree-based scheme which copes with multiple colluding insider jammers. We implement and evaluate the proposed solutions using Mica2 Motes. Experimental results show that our solutions have low recovery latency and low communication overhead, and hence they are suitable for resource constrained sensor networks.
AB - Jamming is a kind of Denial-of-Service attack in which an adversary purposefully emits radio frequency signals to corrupt the wireless transmissions among normal nodes. Although some research has been conducted on countering jamming attacks, few works consider jamming attacks launched by insiders, where an attacker first compromises some legitimate sensor nodes to acquire the common cryptographic information of the sensor network and then jams the network through those compromised nodes. In this paper, we address the insider jamming problem in wireless sensor networks. In our proposed solutions, the physical communication channel of a sensor network is determined by the group key shared by all the sensor nodes. When insider jamming happens, the network will generate a new group key to be shared only by the noncompromised nodes. After that, the insider jammers are revoked and will not be able to predict the future communication channels used by the non-compromised nodes. Specifically, we propose two compromise-resilient antijamming schemes: the split-pairing scheme which deals with a single insider jammer, and the key-tree-based scheme which copes with multiple colluding insider jammers. We implement and evaluate the proposed solutions using Mica2 Motes. Experimental results show that our solutions have low recovery latency and low communication overhead, and hence they are suitable for resource constrained sensor networks.
UR - http://www.scopus.com/inward/record.url?scp=80053609582&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=80053609582&partnerID=8YFLogxK
U2 - 10.1007/s11276-011-0361-8
DO - 10.1007/s11276-011-0361-8
M3 - Article
AN - SCOPUS:80053609582
SN - 1022-0038
VL - 17
SP - 1513
EP - 1527
JO - Wireless Networks
JF - Wireless Networks
IS - 6
ER -