TY - GEN
T1 - Compromise-resilient anti-jamming for wireless sensor networks
AU - Jiang, Xuan
AU - Hu, Wenhui
AU - Zhu, Sencun
AU - Cao, Guohong
N1 - Funding Information:
This work was supported in part by Army Research Office under MURI grant W911NF-07-1-0318 and NSF CAREER 0643906.
PY - 2010
Y1 - 2010
N2 - Jamming is a kind of Denial-of-Service (DoS) attack in which an adversary purposefully emits radio frequency signals to corrupt wireless transmissions. Thus, the communications among normal sensor nodes become difficult or even impossible. Although some research has been conducted on countering jamming attacks, few works considered jamming by insiders. Here, an attacker first compromises some legitimate sensor nodes to acquire the common cryptographic information of the sensor network and then jams the network through those compromised sensors. In this paper, as our initial effort, we propose a compromise-resilient anti-jamming scheme called split-pairing scheme to deal with single insider jamming problem in a one-hop network setting. In our solution, the physical communication channel of a sensor network is determined by the group key shared by all the sensor nodes. When insider jamming happens, the network will generate a new group key to be shared only by all non-compromised nodes. After that, the insider jammer is revoked and will be unable to predict the future communication channels used by non-compromised nodes. We implement and evaluate our solution using the Mica2 Mote platform and show it has low recovery latency and communication overhead, and it is a practical solution for resource constrained sensor networks under the single insider jamming attack.
AB - Jamming is a kind of Denial-of-Service (DoS) attack in which an adversary purposefully emits radio frequency signals to corrupt wireless transmissions. Thus, the communications among normal sensor nodes become difficult or even impossible. Although some research has been conducted on countering jamming attacks, few works considered jamming by insiders. Here, an attacker first compromises some legitimate sensor nodes to acquire the common cryptographic information of the sensor network and then jams the network through those compromised sensors. In this paper, as our initial effort, we propose a compromise-resilient anti-jamming scheme called split-pairing scheme to deal with single insider jamming problem in a one-hop network setting. In our solution, the physical communication channel of a sensor network is determined by the group key shared by all the sensor nodes. When insider jamming happens, the network will generate a new group key to be shared only by all non-compromised nodes. After that, the insider jammer is revoked and will be unable to predict the future communication channels used by non-compromised nodes. We implement and evaluate our solution using the Mica2 Mote platform and show it has low recovery latency and communication overhead, and it is a practical solution for resource constrained sensor networks under the single insider jamming attack.
UR - http://www.scopus.com/inward/record.url?scp=78650862556&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78650862556&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-17650-0_11
DO - 10.1007/978-3-642-17650-0_11
M3 - Conference contribution
AN - SCOPUS:78650862556
SN - 3642176496
SN - 9783642176494
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 140
EP - 154
BT - Information and Communications Security - 12th International Conference, ICICS 2010, Proceedings
T2 - 2010 International Conference on Information and Communications Security, ICICS 2010
Y2 - 15 December 2010 through 17 December 2010
ER -