2009
DOI: 10.1109/tmc.2009.33
|View full text |Cite
|
Sign up to set email alerts
|

Mitigation of Control Channel Jamming under Node Capture Attacks

Abstract: Abstract-Availability of service in many wireless networks depends on the ability for network users to establish and maintain communication channels using control messages from base stations and other users. An adversary with knowledge of the underlying communication protocol can mount an efficient denial of service attack by jamming the communication channels used to exchange control messages. The use of spread spectrum techniques can deter an external adversary from such control channel jamming attacks. Howe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
57
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 96 publications
(57 citation statements)
references
References 20 publications
0
57
0
Order By: Relevance
“…A sensor network consists of wireless ad hoc network which means that each sensor supports a multi-hop routing algorithm (quite a few nodes forwards data packets to a base station). Each node in the sensor network is equipped with a radio transceiver or wireless communication device, microcontroller and an energy source (battery) in addition to one or more sensors [2].The wireless sensor network field provides prosperous, multi-disciplinary area of research where a various tools and concepts are engaged for addressing diverse set of application. However, adopting an "al-ways-on" strategy has several disadvantages.…”
Section: A Wireless Sensor Network (Wsn)mentioning
confidence: 99%
“…A sensor network consists of wireless ad hoc network which means that each sensor supports a multi-hop routing algorithm (quite a few nodes forwards data packets to a base station). Each node in the sensor network is equipped with a radio transceiver or wireless communication device, microcontroller and an energy source (battery) in addition to one or more sensors [2].The wireless sensor network field provides prosperous, multi-disciplinary area of research where a various tools and concepts are engaged for addressing diverse set of application. However, adopting an "al-ways-on" strategy has several disadvantages.…”
Section: A Wireless Sensor Network (Wsn)mentioning
confidence: 99%
“…Weak message authentication [21] Rogue messages transmitted Encryption [22,23] Control channel jamming [24,25] Loss of availability Antijamming mechanisms [24,26] Amateur Radio Fake GSM and other stations [27] Calls spoofed/intercepted No known solutions Professional Mobile Radio TETRA authentication key cloning [28] TETRA authentication process compromised No known solutions Radio location privacy attack [29] P25 Location privacy breached No known solutions Physical layer jamming [29] P25 Denial of service No known solutions Brute Force Key recovery [30] P25 authentication process compromised No known solutions…”
Section: Sms Messagingmentioning
confidence: 99%
“…Researchers studied jamming attacks on a broadcast control channel in [12,13]. [12] considered an inside attacker who could compromise nodes to obtain the cryptographic information such as hopping sequences.…”
Section: Related Workmentioning
confidence: 99%
“…The cluster head then updates the hopping sequences and redistributes them. Dealing with the similar problem, [13] proposed a framework for the control channel access scheme, using the random assignment of cryptographic keys to hide the location of control channels. Both the schemes, however, run in a centralized manner with the help of either cluster heads or trusted authorities.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation