Jamming for good: a fresh approach to authentic communication in WSNs

  • Authors:
  • Ivan Martinovic;Paul Pichota;Jens B. Schmitt

  • Affiliations:
  • Computer Science Department, TU Kaiserslautern, Kaiserslautern, Germany;Computer Science Department, TU Kaiserslautern, Kaiserslautern, Germany;Computer Science Department, TU Kaiserslautern, Kaiserslautern, Germany

  • Venue:
  • Proceedings of the second ACM conference on Wireless network security
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

While properties of wireless communications are often considered as a disadvantage from a security perspective, this work demonstrates how multipath propagation, a broadcast medium, and frequency jamming can be used as valuable security primitives. Instead of conventional message authentication by receiving, verifying, and then discarding fake data, sensor nodes are prevented from receiving fake data at all. The erratic nature of signal propagation distributes the jamming activity over the network which hinders an adversary in predicting jamming nodes and avoids selective battery-depletion attacks. By conducting real-world measurements, we justify the feasibility of such a security design and provide details on implementing it within a realistic wireless sensor network.