Electronic Warfare in the Information Age
Electronic Warfare in the Information Age
JAM: A Jammed-Area Mapping Service for Sensor Networks
RTSS '03 Proceedings of the 24th IEEE International Real-Time Systems Symposium
Low-power DoS attacks in data wireless LANs and countermeasures
ACM SIGMOBILE Mobile Computing and Communications Review
Channel surfing and spatial retreats: defenses against wireless denial of service
Proceedings of the 3rd ACM workshop on Wireless security
IP covert timing channels: design and detection
Proceedings of the 11th ACM conference on Computer and communications security
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
The Pump: A Decade of Covert Fun
ACSAC '05 Proceedings of the 21st Annual Computer Security Applications Conference
Wormhole-Based Antijamming Techniques in Sensor Networks
IEEE Transactions on Mobile Computing
Channel surfing: defending wireless sensor networks from interference
Proceedings of the 6th international conference on Information processing in sensor networks
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
IEEE Transactions on Information Theory
Jammer localization in wireless sensor networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Compromise-resilient anti-jamming for wireless sensor networks
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Computer Networks: The International Journal of Computer and Telecommunications Networking
CrowdLoc: wireless jammer localization with crowdsourcing measurements
Proceedings of the 2nd international workshop on Ubiquitous crowdsouring
Jamming aware routing for MHWN with dynamic measurement
Computers and Electrical Engineering
An 802.11 MAC layer covert channel
Wireless Communications & Mobile Computing
Survey Cyber security in the Smart Grid: Survey and challenges
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |
Wireless communication is susceptible to radio interference, which prevents the reception of communications. Although evasion strategies have been proposed, such strategies are costly or ineffective against broadband jammers. In this paper, we explore an alternative to evasion strategies that involves the establishment of a timing channel that exists in spite of the presence of jamming. The timing channel is built using failed packet reception times. We first show that it is possible to detect failed packet events inspite of jamming. We then explore single sender and multisender timing channel constructions that may be used to build a low-rate overlay link-layer. We discuss implementation issues that we have overcome in constructing such jamming-resistant timing channel, and present the results of validation efforts using the MICA2 platform. Finally, we examine additional error correction and authentication mechanisms that may be used to cope with adversaries that both jam and seek to corrupt our timing channel.