Mostrar el registro sencillo del ítem
Thwarting inside jamming attacks on wireless broadcast communications
dc.contributor.author | Liu, Sisi | |
dc.contributor.author | Lazos, Lukas | |
dc.contributor.author | Krunz, Marwan | |
dc.date.accessioned | 2021-07-13T09:25:59Z | |
dc.date.available | 2021-07-13T09:25:59Z | |
dc.date.issued | 2011-06-15 | |
dc.identifier.uri | http://hdl.handle.net/20.500.12761/119 | |
dc.description.abstract | We address the problem of jamming-resistant broadcast communications under an internal threat model. We propose a time-delayed broadcast scheme (TDBS), which implements the broadcast operation as a series of unicast transmissions, distributed in frequency and time. TDBS does not rely on commonly shared secrets, or the existence of jamming immune control channels for coordinating broadcasts. Instead, each node follows a unique pseudo-noise (PN) frequency hopping sequence. Contrary to conventional PN sequences designed for multi-access systems, our sequences exhibit high correlation to enable broadcast. Moreover, their design limits the information leakage due to the exposure of a subset of sequences by compromised nodes. We map the problem of constructing such PN sequences to the 1-factorization problem for complete graphs. Our evaluation results show that TDBS can maintain broadcast communications in the presence of inside jammers. | |
dc.language.iso | eng | |
dc.subject.lcc | Q Science::Q Science (General) | |
dc.subject.lcc | Q Science::QA Mathematics::QA75 Electronic computers. Computer science | |
dc.subject.lcc | T Technology::T Technology (General) | |
dc.subject.lcc | T Technology::TA Engineering (General). Civil engineering (General) | |
dc.subject.lcc | T Technology::TK Electrical engineering. Electronics Nuclear engineering | |
dc.title | Thwarting inside jamming attacks on wireless broadcast communications | en |
dc.type | conference object | |
dc.conference.date | 15-17 June 2011 | |
dc.conference.place | Hamburg, Germany | |
dc.conference.title | The 4th ACM Conference on Wireless Network Security (ACM WiSec 2011) | * |
dc.event.type | conference | |
dc.pres.type | paper | |
dc.type.hasVersion | VoR | |
dc.rights.accessRights | open access | |
dc.subject.keyword | Computer | |
dc.subject.keyword | Communication Networks | |
dc.subject.keyword | Security and Protection | |
dc.subject.keyword | Security | |
dc.subject.keyword | reliability | |
dc.subject.keyword | algorithms | |
dc.subject.keyword | design | |
dc.subject.keyword | Jamming | |
dc.subject.keyword | broadcast communications | |
dc.subject.keyword | denial-of-service | |
dc.subject.keyword | wireless networks | |
dc.subject.keyword | graph factorization | |
dc.subject.keyword | security | |
dc.description.refereed | TRUE | |
dc.description.status | pub | |
dc.eprint.id | http://eprints.networks.imdea.org/id/eprint/117 |