[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/SP.2008.9guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping

Published: 18 May 2008 Publication History

Abstract

We consider the following problem: how can two devices that do not share any secrets establish a shared secret key over a wireless radio channel in the presence of a communication jammer? An inherent challenge in solving this problem is that known anti-jamming techniques (e.g.,frequency hopping or direct-sequence spread spectrum) which should support device communication during the key establishment require that the devices share a secret spreading key (or code) prior to the start of their communication. This requirement creates a circular dependency between anti-jamming spread-spectrum communication and key establishment, which has so far not been addressed. In this work, we propose an Uncoordinated Frequency Hopping (UFH) scheme that breaks this dependencyand enables key establishment in the presence of a communication jammer. We perform a detailed analysis of our UFH scheme and show its feasibility, both in terms of execution time and resource requirements.

Cited By

View all
  • (2024)A dynamic symmetric key generation at wireless link layer: information-theoretic perspectivesEURASIP Journal on Wireless Communications and Networking10.1186/s13638-024-02396-y2024:1Online publication date: 27-Aug-2024
  • (2023)JaX: Detecting and Cancelling High-power Jammers Using Convolutional Neural NetworkProceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3558482.3590178(293-304)Online publication date: 29-May-2023
  • (2022)Channel hopping for blind rendezvous in cognitive radio networksComputer Communications10.1016/j.comcom.2022.08.011195:C(82-98)Online publication date: 1-Nov-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy
May 2008
408 pages
ISBN:9780769531687

Publisher

IEEE Computer Society

United States

Publication History

Published: 18 May 2008

Author Tags

  1. Anti-jamming
  2. Frequency Hopping
  3. Key Establishment
  4. Wireless Security

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A dynamic symmetric key generation at wireless link layer: information-theoretic perspectivesEURASIP Journal on Wireless Communications and Networking10.1186/s13638-024-02396-y2024:1Online publication date: 27-Aug-2024
  • (2023)JaX: Detecting and Cancelling High-power Jammers Using Convolutional Neural NetworkProceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3558482.3590178(293-304)Online publication date: 29-May-2023
  • (2022)Channel hopping for blind rendezvous in cognitive radio networksComputer Communications10.1016/j.comcom.2022.08.011195:C(82-98)Online publication date: 1-Nov-2022
  • (2018)Path HoppingSecurity and Communication Networks10.1155/2018/84758182018Online publication date: 7-May-2018
  • (2018)Signal Jamming Attacks Against Communication-Based Train ControlProceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks10.1145/3212480.3212500(160-171)Online publication date: 18-Jun-2018
  • (2017)Anti-Jamming Rendezvous Scheme for Cognitive Radio NetworksIEEE Transactions on Mobile Computing10.1109/TMC.2016.256127516:3(648-661)Online publication date: 1-Mar-2017
  • (2017)Analysis of vulnerabilities, attacks, countermeasures and overall risk of the Automatic Dependent Surveillance-Broadcast (ADS-B) systemInternational Journal of Critical Infrastructure Protection10.1016/j.ijcip.2017.10.00219:C(16-31)Online publication date: 1-Dec-2017
  • (2017)Who are you? Secure identities in single hop ad hoc networksDistributed Computing10.1007/s00446-016-0280-030:2(103-125)Online publication date: 1-Apr-2017
  • (2016)Interleaving Jamming in Wi-Fi NetworksProceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks10.1145/2939918.2939935(31-42)Online publication date: 18-Jul-2016
  • (2016)Jamming Resilient Communication Using MIMO Interference CancellationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2016.253590611:7(1486-1499)Online publication date: 1-Jul-2016
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media