Jam me if you can: Mitigating the Impact of Inside Jammers
Loukas Lazos - University of Arizona
Nov 16, 2011Size: 443.7MB
Download: MP4 Video
Watch in your Browser Watch on YouTube
AbstractThe open nature of the wireless medium leaves wireless communications exposed to interference caused by the concurrent operation of co-located wireless devices over the same frequency bands. While unintentional signal interference is managed at the physical and mac layers using an array of techniques (advanced signal processing, channel coding and error correction, spread spectrum communications, multiple access protocols, etc.), in a hostile environment, wireless communications remain vulnerable to intentional interference attacks typically referred to as jamming. Jamming can take the form of an external attack launched by "foreign" devices that are unaware of the network secrets (e.g., cryptographic credentials) or its protocols. Such external attacks are relatively easy to neutralize through a combination of cryptography-based measures and
spreading techniques. In contrast, when jamming attacks are launched from compromised nodes, they are much more sophisticated in nature.
These attacks exploit knowledge of network secrets (e.g., cryptographic keys and pseudo-random spreading codes) and its protocol semantics to maximize their detrimental impact by selectively and adaptively targeting critical data transmissions. In this talk, we
discuss the feasibility and impact of selective jamming attacks in the presence of inside adversaries. The attacker's selectivity is considered at different granularities, namely on a per-channel basis and on a per-packet basis. We describe several mitigation methods that
do not rely on the existence of shared secrets, but defeat selectivity via a combination of temporary packet hiding and uncoordinated frequency hopping.
About the SpeakerLoukas Lazos is an Assistant Professor in the Electrical and Computer Engineering Department at the University of Arizona. He received his Ph.D. in Electrical Engineering from the University of Washington, Seattle, in 2006. He is a recipient of the NSF CAREER Award (2009), for his research in security of multi-channel wireless networks. His main research interests are in the areas of networking, security, and wireless communications, focusing on the identiﬁcation, modeling, and mitigation of security vulnerabilities, visualization of network threats, and analysis of network performance.
The views, opinions and assumptions expressed in these videos are those of the presenter and do not necessarily reflect the official policy or position of CERIAS or Purdue University. All content included in these videos, are the property of Purdue University, the presenter and/or the presenter’s organization, and protected by U.S. and international copyright laws. The collection, arrangement and assembly of all content in these videos and on the hosting website exclusive property of Purdue University. You may not copy, reproduce, distribute, publish, display, perform, modify, create derivative works, transmit, or in any other way exploit any part of copyrighted material without permission from CERIAS, Purdue University.