Anti-jamming timing channels for wireless networks

Research output: Chapter in Book/Report/Conference proceedingConference contribution

69 Scopus citations

Abstract

Wireless communication is susceptible to radio interference, which prevents the reception of communications. Although evasion strategies have been proposed, such strategies are costly or ineffective against broadband jammers. In this paper, we explore an alternative to evasion strategies that involves the establishment of a timing channel that exists in spite of the presence of jamming. The timing channel is built using failed packet reception times. We first show that it is possible to detect failed packet events in spite of jamming. We then explore single sender and multi-sender timing channel constructions that may be used to build a low-rate overlay link-layer. We discuss implementation issues that we have overcome in constructing such jamming-resistant timing channel, and present the results of validation efforts using the MICA2 platform. Finally, we examine additional error correction and authentication mechanisms that may be used to cope with adversaries that both jam and seek to corrupt our timing channel.

Original languageEnglish (US)
Title of host publicationWiSec'08
Subtitle of host publicationProceedings of the 1st ACM Conference on Wireless Network Security
Pages203-213
Number of pages11
DOIs
StatePublished - 2008
EventWiSec'08: 1st ACM Conference on Wireless Network Security - Alexandria, VA, United States
Duration: Mar 31 2008Apr 2 2008

Publication series

NameWiSec'08: Proceedings of the 1st ACM Conference on Wireless Network Security

Other

OtherWiSec'08: 1st ACM Conference on Wireless Network Security
CountryUnited States
CityAlexandria, VA
Period3/31/084/2/08

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Hardware and Architecture
  • Software

Keywords

  • Jamming
  • Radio interference
  • Timing channel

Fingerprint Dive into the research topics of 'Anti-jamming timing channels for wireless networks'. Together they form a unique fingerprint.

Cite this