skip to main content
10.1145/1514274.1514298acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Jamming for good: a fresh approach to authentic communication in WSNs

Published: 16 March 2009 Publication History

Abstract

While properties of wireless communications are often considered as a disadvantage from a security perspective, this work demonstrates how multipath propagation, a broadcast medium, and frequency jamming can be used as valuable security primitives. Instead of conventional message authentication by receiving, verifying, and then discarding fake data, sensor nodes are prevented from receiving fake data at all. The erratic nature of signal propagation distributes the jamming activity over the network which hinders an adversary in predicting jamming nodes and avoids selective battery-depletion attacks. By conducting real-world measurements, we justify the feasibility of such a security design and provide details on implementing it within a realistic wireless sensor network.

References

[1]
B. A.-Sadjadi, A. Kiayias, A. Mercado, and B. Yener. Robust key generation from signal envelopes in wireless networks. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 401-410, New York, NY, USA, November 2007. ACM.
[2]
A. Bachorek, I. Martinovic, and J. B. Schmitt. Enabling Authentic Transmissions in WSNs -- Turning Jamming against the Attacker. In Proceedings of the IEEE ICNP 4th Annual Workshop on Secure Network Protocols (NPSec 2008), Orlando, FL, USA, October 2008.
[3]
Y. Chen, W. Trappe, and R. Martin. Detecting and localizing wireless spoofing attacks. In Proceedings of the Fourth Annual IEEE Communications Society Conference on Sensor, Mesh, and Ad Hoc Communications and Networks, pages 193--202, May 2007.
[4]
D. B. Faria and D. R. Cheriton. Detecting Identity-based Attacks in Wireless Networks using Signalprints. In WiSe '06: Proceedings of the 5th ACM workshop on Wireless Security, pages 43--52, September 2006.
[5]
Z. Li, W. Xu, R. Miller, and W. Trappe. Securing Wireless Systems Via Lower Layer Enforcements. In WiSe '06: Proceedings of the 5th ACM Workshop on Wireless Security, pages 33--42, September 2006.
[6]
I. Martinovic, L. Cappellaro, and J. B. Schmitt. Chaotic Communication Improves Authentication -- Protecting WSNs Against Injection Attacks. Security and Communication Networks Journal (Special Issue on Wireless Sensor Networks), December 2008. Accepted for publication.
[7]
I. Martinovic, P. Pichota, and J. B. Schmitt. Jamming for Good: A Fresh Approach to Authentic Communication in WSNs. Technical Report, University of Kaiserslautern, Germany, July 2008.
[8]
I. Martinovic, F. Zdarsky, M. Wilhelm, C. Wegmann, and J. B. Schmitt. Wireless Client Puzzles in IEEE 802.11 Networks: Security by Wireless. In Proc. ACM Conference on Wireless Network Security (WiSec 2008), pages 43--52, Alexandria, VA, USA, March 2008.
[9]
S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik. Radio-Telepathy: Extracting a Secret Key from an Unauthenticated Wireless Channel. In The 14th Annual International Conference on Mobile Computing and Networking (MobiCom). ACM Press, September 2008.
[10]
T. Rappaport. Wireless Communications: Principles and Practice. Prentice Hall PTR, Upper Saddle River, NJ, USA, 2001.
[11]
D. Son, B. Krishnamachari, and J. Heidemann. Experimental study of concurrent transmissions in wireless sensor networks. In 4th Conference on Embedded Networked Sensor Systems (SenSys), 2006.
[12]
L. Song and A. Arora. Spatial Signatures for Lightweight Security in Wireless Sensor Networks. In 27th IEEE International Conference on Computer Communications (INFOCOM 2008), Phoenix, AZ, USA, April 2008.
[13]
Texas Instruments. 2.4 GHz IEEE 802.15.4 / ZigBee-ready RF Transceiver, mar 2007.
[14]
M. Čagalj, S. Čapkun, R. Rengaswamy, I. Tsigkogiannis, M. Srivastava, and J.-P. Hubaux. Integrity (I) Codes: Message Integrity Protection and Authentication Over Insecure Channels. In SP '06: Proceedings of the 2006 IEEE Symposium on Security and Privacy (S'06), pages 280--294, May 2006.
[15]
S. Čapkun, R. Rengaswamy, I. Tsigkogiannis, and M. Srivastava. Implications of Radio Fingerprinting on the Security of Sensor Networks. In Proceedings of the 3rd International Conference on Security and Privacy in Communication Networks, September 2007.

Cited By

View all
  • (2024)Let Me Do It For You: On the Feasibility of Inter-Satellite Friendly Jamming2024 Security for Space Systems (3S)10.23919/3S60530.2024.10592285(1-6)Online publication date: 27-May-2024
  • (2023)A Lightweight Self-Organized Friendly JammingInternational Journal of Information Security Science10.55859/ijiss.119464312:1(13-20)Online publication date: 10-Mar-2023
  • (2023)A Lightweight and Energy Efficient Secrecy Outage Probability-based Friendly Jamming2023 11th International Symposium on Digital Forensics and Security (ISDFS)10.1109/ISDFS58141.2023.10131740(1-5)Online publication date: 11-May-2023
  • Show More Cited By

Index Terms

  1. Jamming for good: a fresh approach to authentic communication in WSNs

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WiSec '09: Proceedings of the second ACM conference on Wireless network security
      March 2009
      280 pages
      ISBN:9781605584607
      DOI:10.1145/1514274
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 16 March 2009

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. authentication
      2. jamming
      3. wireless sensor networks

      Qualifiers

      • Research-article

      Conference

      WISEC '09
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 98 of 338 submissions, 29%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)11
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 20 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Let Me Do It For You: On the Feasibility of Inter-Satellite Friendly Jamming2024 Security for Space Systems (3S)10.23919/3S60530.2024.10592285(1-6)Online publication date: 27-May-2024
      • (2023)A Lightweight Self-Organized Friendly JammingInternational Journal of Information Security Science10.55859/ijiss.119464312:1(13-20)Online publication date: 10-Mar-2023
      • (2023)A Lightweight and Energy Efficient Secrecy Outage Probability-based Friendly Jamming2023 11th International Symposium on Digital Forensics and Security (ISDFS)10.1109/ISDFS58141.2023.10131740(1-5)Online publication date: 11-May-2023
      • (2023)Efficient Protective Jamming in 2D SINR NetworksEuro-Par 2023: Parallel Processing10.1007/978-3-031-39698-4_36(533-546)Online publication date: 24-Aug-2023
      • (2022)Security and Reliability Performance of Noise-Loop Modulation: Theoretical Analysis and ExperimentationIEEE Transactions on Vehicular Technology10.1109/TVT.2022.316009471:6(6335-6350)Online publication date: Jun-2022
      • (2021)Bandwidth Efficient IoT Traffic Shaping Technique for Protecting Smart Home Privacy from Data Breaches in Wireless LANIEICE Transactions on Communications10.1587/transcom.2020EBP3182E104.B:8(961-973)Online publication date: 1-Aug-2021
      • (2021)Exact and Efficient Protective Jamming in SINR-based Wireless Networks2021 29th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)10.1109/MASCOTS53633.2021.9614261(1-8)Online publication date: 3-Nov-2021
      • (2020)Countering cross-technology jamming attackProceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3395351.3399367(99-110)Online publication date: 8-Jul-2020
      • (2020)A review on machine learning–based approaches for Internet traffic classificationAnnals of Telecommunications10.1007/s12243-020-00770-775:11-12(673-710)Online publication date: 22-Jun-2020
      • (2019)Privacy Protection for Audio Sensing Against Multi-Microphone AdversariesProceedings on Privacy Enhancing Technologies10.2478/popets-2019-00242019:2(146-165)Online publication date: 4-May-2019
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media