Show simple item record

dc.contributor.authorLiu, Sisi
dc.contributor.authorLazos, Lukas
dc.contributor.authorKrunz, Marwan
dc.date.accessioned2021-07-13T09:25:59Z
dc.date.available2021-07-13T09:25:59Z
dc.date.issued2011-06-15
dc.identifier.urihttp://hdl.handle.net/20.500.12761/119
dc.description.abstractWe address the problem of jamming-resistant broadcast communications under an internal threat model. We propose a time-delayed broadcast scheme (TDBS), which implements the broadcast operation as a series of unicast transmissions, distributed in frequency and time. TDBS does not rely on commonly shared secrets, or the existence of jamming immune control channels for coordinating broadcasts. Instead, each node follows a unique pseudo-noise (PN) frequency hopping sequence. Contrary to conventional PN sequences designed for multi-access systems, our sequences exhibit high correlation to enable broadcast. Moreover, their design limits the information leakage due to the exposure of a subset of sequences by compromised nodes. We map the problem of constructing such PN sequences to the 1-factorization problem for complete graphs. Our evaluation results show that TDBS can maintain broadcast communications in the presence of inside jammers.
dc.language.isoeng
dc.subject.lccQ Science::Q Science (General)
dc.subject.lccQ Science::QA Mathematics::QA75 Electronic computers. Computer science
dc.subject.lccT Technology::T Technology (General)
dc.subject.lccT Technology::TA Engineering (General). Civil engineering (General)
dc.subject.lccT Technology::TK Electrical engineering. Electronics Nuclear engineering
dc.titleThwarting inside jamming attacks on wireless broadcast communicationsen
dc.typeconference object
dc.conference.date15-17 June 2011
dc.conference.placeHamburg, Germany
dc.conference.titleThe 4th ACM Conference on Wireless Network Security (ACM WiSec 2011)*
dc.event.typeconference
dc.pres.typepaper
dc.type.hasVersionVoR
dc.rights.accessRightsopen access
dc.subject.keywordComputer
dc.subject.keywordCommunication Networks
dc.subject.keywordSecurity and Protection
dc.subject.keywordSecurity
dc.subject.keywordreliability
dc.subject.keywordalgorithms
dc.subject.keyworddesign
dc.subject.keywordJamming
dc.subject.keywordbroadcast communications
dc.subject.keyworddenial-of-service
dc.subject.keywordwireless networks
dc.subject.keywordgraph factorization
dc.subject.keywordsecurity
dc.description.refereedTRUE
dc.description.statuspub
dc.eprint.idhttp://eprints.networks.imdea.org/id/eprint/117


Files in this item

This item appears in the following Collection(s)

Show simple item record