Conference(C)/ Journal(J) |
Title/Authors/Abstract |
(C)IEEE Symposium on Information Theory (ISIT 2007) |
Title:
Control Channel Jamming: Resilience and Identification of Traitors |
Authors: Agnes Chan, Guevara Noubir, Bishal Thapa, Liu Xin |
Abstract: In this paper, we address the problem of
countering jamming of broadcast control channels in wireless
communication systems. Targeting control traffic on
a system, e.g., BCCH channel in GSM, leads to smart
attacks that can be four orders of magnitude more efficient
than blind jamming. We propose several schemes based
on coding theory and its applications that can counter
both external and internal attackers (traitors). We introduce
a T-(traitor) resilient scheme that requires less
than (TlogTN)2 control information transmissions and
guarantees delivery of control information against any
coalition of T traitors. The proposed scheme also allows
the identification of persistently jamming traitors.(Published)[Full Paper]
|
|
(J)AdHoc Networks (2008) |
Title: Experimentation-oriented platform for development
and evaluation of MANET cross-layer protocols |
Authors: Guevara Noubir, Wei Qian, Bishal Thapa, Yin Wang |
Abstract: We introduce a platform that simplifies the development, performance evaluation, and
comparison (DEC) of cross-layer protocols for multi-hop ad hoc networks (MANET). To
the best of our knowledge, this is the first platform that provides an integrated API for con-
trolling and assessing, on a per-packet basis, the physical layer and MAC/LLC parameters
(e.g. frequency channel, power, rate, coding/modulation, fragmentation, number of
retransmissions) for IEEE802.11 network interfaces.
Today, performance evaluation of wireless mobile ad hoc networks heavily relies on sim-
ulation, which is limited in reflecting real environment scenarios due to the channel
modeling approximations. Experimental comparisons of protocols in real-world propaga-
tion environment are difficult because of limited reproducibility of the channel propaga-
tion, environment, and mobility scenarios. We introduce a DEC platform that provides a
network virtualization above the physical/link layers. It runs multiple protocols in TDMA-
like timeslots guaranteeing an equitable share of the medium, seamless switching
between protocols and synchronization between the nodes, all in a transparent fashion
to developers. An extensive experimental evaluation demonstrates the usefulness of
the platform.(Published)[Full Paper]
|
|
(C)INFOCOM (2007) |
Title: On the Performance of IEEE 802.11 under Jamming |
Authors: Emrah Bayraktaroglu, Christopher King , Xin Liu, Guevara Noubir, Rajmohan Rajaraman, Bishal Thapa |
Abstract: In this paper, we study the performance of the
IEEE 802.11 MAC protocol under a range of jammers that
covers both channel-oblivious and channel-aware jamming. We
study two channel-oblivious jammers: a periodic jammer that
jams deterministically at a specified rate, and a memory less
jammer whose signals arrive according to a Poisson process. We
also develop new models for channel-aware jamming, including
a reactive jammer that only jams non-colliding transmissions
and an omniscient jammer that optimally adjusts its strategy
according to current states of the participating nodes.
Our study comprises of a theoretical analysis of the saturation
throughput of 802.11 under jamming, an extensive simulation
study, and a test bed to conduct real world experimentation of
jamming IEEE 802.11 using GNU Radio and USRP platform.
In our theoretical analysis, we use a discrete-time Markov chain
analysis to derive formulae for the saturation throughput of IEEE
802.11 under memory less, reactive and omniscient jamming. One
of our key results is a characterization of optimal omniscient jamming
that establishes a lower bound on the saturation throughput
of 802.11 under arbitrary jammer attacks. We validate the
theoretical analysis by means of Qualnet simulations. Finally, we
measure the real-world performance of periodic and memory less
jammers using our GNU radio jammer prototype.(Published)[Full Paper]
|
|
(C)International Conference on Information and Communications Security (ICCS 2008) |
Title:Broadcast Communication in the Presence of Inside Attackers: A Non-Cooperative Game |
Authors: Agnes Chan, Guevara Noubir, Masoud Salehi, Bishal Thapa |
Abstract: We propose a game theoretic model to study broadcast communication in the presence of internal attackers (traitors). The server preassigns channel access keys to all users including the unknown traitors. Each user
receives a unique set of access keys of fixed size. The traitor selectively jams the channels corresponding to the keys
he possesses to prevent users that share keys with him from successfully receiving the message. The server, on the
other hand, tries to counteract by transmitting information using a set of keys that maximizes the number of legitimate
users receiving the message. The jamming and anti-jamming between the traitor and the server can be modeled
as a two-player non-cooperative game. Assuming that the players are rational and they have complete information
on each other's payoff function and strategy space, we derive a closed expression for the Nash Equilibrium (NE)
for a general class of utility functions (not necessarily zero-sum). We show that under our game formulation, the
complexity for computing the NE is polynomial in the number of users.(Submitted)[Full Paper]
|
|
(C)International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2009) |
Title:Zero Pre-shared Secret Key Establishment in the presence of Jammers |
Authors: Tao Jin, Guevara Noubir, Bishal Thapa |
Abstract:
We consider the problem of key establishment over a wireless radio
channel in the presence of a communication jammer, initially
introduced in Strasser08. The communicating nodes are not
assumed to pre-share any secret. The established key can later be
used by a conventional spread-spectrum communication system. Our
approach is based on the novel concepts of intractable
forward-decoding and efficient backward-decoding. Decoding
under our mechanism requires at most twice the computation cost of
the conventional SS decoding and one packet worth of signal
storage. We introduce techniques that applies key schedule to
packet spreading and develop a provably optimal key schedule to
minimize the bit-despreading cost. We also use efficient FFT-based
algorithms for packet detection. We evaluate our techniques and show
that they are very efficient both in terms of resiliency against
jammers and computationally. Finally, our technique has additional
desirable features such as the inability to detect packet
transmission by non-source nodes until the last few bits are being
transmitted, and the destination-specific transmissions. To the best
of our knowledge, this is the first solution that is optimal in
terms of communication energy cost with little storage and
computation overhead.(Published)[Full Paper]
|
|
(J) IEEE Transactions on Mobile Computing (ITMC 2010) |
Title:Efficient Spread Spectrum Communication without Pre-shared Secrets |
Authors: Aldo Cassola, Tao Jin, Guevara Noubir, Bishal Thapa |
Abstract:
Spread spectrum (SS) communication relies on the assumption that some secret is shared beforehand
among communicating nodes in order to establish the spreading sequence for long-term wireless communication.
Strasser et al. identified the circular dependency problem (CDP), which arises from the fact that
a method designed to communicate secret messages over an insecure channel requires a safe medium
to pre-share secret for initialization itself [2]. This problem is exacerbated in large networks where
nodes join and leave the network frequently, and pre-configuration of secrets through physical contact
is infeasible. In this work, we introduce an efficient and adversary-resilient secret sharing mechanism
based on two novel paradigms (intractable forward-decoding, efficient backward-decoding) called Time
Reversed Message Extraction and Key Scheduling (TREKS) that enables SS communication with zero
pre-shared secret. TREKS is four orders of magnitude more efficient compared to previous solutions
to the CDP. Furthermore, our approach can either be used to establish SS keys pre-communication
or to operate long-term SS communication without ever needing any keys. Unlike previous solutions,
the energy cost under TREKS is provably optimal with minimal storage overhead, and computation
cost of at most twice that of traditional SS. We evaluate TREKS through simulation and real-world
implementation using an experimental testbed consisting of USRP, GNU Radio, and GPU-equipped
nodes. Using TREKS under a modest hardware setup, we can computationally sustain a 1Mbps longterm
SS communication spread by a factor of 100 (i.e., 100 Megachips per second) over a 200MHz
bandwidth in real-time. (Submitted)[Full Paper]
|
|
(J)ACM Mobile Networks and Applications (MONET 2010) |
Title:IEEE802.11 Communication under Adversarial Settings |
Authors: Emrah Bayraktaroglu, Christopher King , Xin Liu, Guevara Noubir, Rajmohan Rajaraman, Bishal Thapa |
Abstract:We study the performance of the IEEE 802.11
MAC protocol under a range of jammers that covers both
channel-oblivious and channel-aware jamming.We consider
two channel-oblivious jammers: a periodic jammer that jams
deterministically at a specified rate, and a memoryless jammer
whose interfering signals arrive according to a Poisson
process.We also develop new models for channel-aware
jamming, including a reactive jammer that only jams noncolliding
transmissions and an omniscient jammer that optimally
adjusts its strategy according to current states of the
participating nodes.
Our study comprises of a theoretical analysis of the saturation
throughput of 802.11 under jamming, an extensive
simulation study, and a testbed to conduct real world experimentation
of jamming IEEE 802.11 using a software
defined radio (GNU Radio combined with USRP boards).
In our theoretical analysis, we use a discrete-time Markov
chain analysis to derive formula for the saturation throughput
of 802.11 under memoryless, reactive and omniscient
jamming. One of our key results is a characterization of optimal
omniscient jamming that establishes a lower bound
on the saturation throughput of 802.11 under arbitrary jammer
attacks. We validate the theoretical analysis by means
of Qualnet simulations. Finally, we measure the real-world
performance of periodic, memoryless and reactive jammers
using our GNURadio/USRP aided experimentation testbed.
(To Appear)[Full Paper]
|
|
(J)IEEE Transactions on Mobile Computing (ITMC 2010) |
Title:Robust Broadcat Control Channel Communication in the presence of Insiders |
Authors: Agnes Chan, Xin Liu, Guevara Noubir, Bishal Thapa |
Abstract:Coordination (control) channels are essential to the operation of wireless communication
networks. Wireless networks are often constrained by the limited radio-frequency bandwidth
and energy available to the participating nodes. Therefore, wireless networks use various control
mechanisms to conserve energy and allow efficient medium access control. An example is the
use of broadcast control channels in celluar networks for sending system access and control
information. For example, in a GSM cellular network, multiple control channels are employed for
different functionalities [2], [3]. The broadcast channels, such as the Brodcast Control CHannel
(BCCH), the Synchronization CHannel (SCH), and the Frequency correction CHannel (FCH),
carry the network/cell identity, the structure of the current control channels and synchronization
information respectively. The common control channels (CCCH), such as the Access Grant
CHannel (AGCH) and the Paging CHannel (PCH) are used for the subscriber channel assignment
and paging notifications. A subscriber must first lock to a predefined channel of the nearby
base station to monitor the broadcast control channels and send a connection request before
getting assigned a dedicated control/traffic channel for initiating calls. Therefore, broadcast
control channels/mechanism are at the heart of operating mobile communication system in a
resource-efficient way. The extensive use of control channels is not unique to the GSM system,
it is a commonly used mechanism in all cellular networks to conserve resources and allow
efficient operation of the system. For example, the 4th generation Long Term Evolution (LTE)
wireless communication standard uses a Master Information Block (MIB), transmitted on the
Physical Broadcast Channel (PBCH), and is necessary for the cell search and synchronization
procedure [4]. BCCHs are usually defined by frequency, time, and spreading code.
(Submitted)[Full Paper]
|
|
(C) ACM Conference on Wireless Network Security (WiSec 2011)
|
Title:On the Robustness of IEEE802.11 Rate Adaptation Algorithms against Smart Jamming |
Authors: Guevara Noubir, Rajmohan Rajaraman, Bo Sheng, Bishal Thapa |
Abstract:We investigate the resiliency of IEEE802.11 rate adaptation algorithms (RAA) against smart jamming attacks. We consider several classes of state-of-the-art RAAs that include the SampleRate, ONOE, AMRR, and the RAA used in Microsoft Windows. We model the behavior of these algorithms, and show the existence of very efficient attacks that exploit RAA-specific vulnerabilities as well as the inherent weaknesses that exist in the design of IEEE802.11 MAC and link layer protocol, in particular the overt packet rate information being transmitted, predictable rate selection mechanism, performance anomaly caused by the equiprobability of transmissions among all nodes regardless of the data rates being employed, and finally the lack of interference differentiation from collisions with IEEE802.11 RAAs. In this work, we present algorithms that determine optimal jamming strategies against RAAs within a given jamming budget, and experimentally demonstrate the efficiency of these smart jamming attacks, which can be orders of magnitude more efficient than naive jamming. For example, in the case of SampleRate, eight reactive jamming pulses every second are sufficient to achieve the same network throughput degradation as achieved by a periodic jammer with the jamming energy cost 100 times higher. Some of the RAAs react even worse to smart jamming attacks; ONOE in particular suffers from the phenomenon of congestion collapse where the nodes fail to recover from the lowest data rate even after the jamming stops. Finally, we look at fundamental reasons behind such RAA vulnerabilities and propose a preliminary set of mitigation techniques. We leave the experimental demonstration of the efficiency of the proposed mitigation mechanisms for future work.
(Accepted)
|
|