Dynamic Jamming Mitigation for Wireless Broadcast Networks Jerry T. Chiang Yih-Chun Hu 2007.

Slides:



Advertisements
Similar presentations
Interference Cancellation in Two-Path Successive Relay System with Network Coding Chunbo Luo, Dr. Yu Gong & Prof. Fuchun Zheng School of Systems Engineering.
Advertisements

EE578 Assignment #5 Abdul-Aziz.M Al-Yami November 8 th 2010.
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
Prashant Bajpayee Advisor: Dr. Daniel Noneaker SURE 2005 Motivation Currently most radio-frequency spectrum is assigned exclusively to “primary” users.
KAIS T Message-In-a-Bottle: User-Friendly and Secure Key Deployment for Sensor Nodes Cynthia Kuo, Mark Luk, Rohit Negi, Adrian Perrig(CMU), Sensys
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Computer Communication & Networks Lecture # 06 Physical Layer: Analog Transmission Nadeem Majeed Choudhary
Song Han, Xiuming Zhu, Al Mok University of Texas at Austin
Presented at ICC 2012 – Wireless Network Symposium – June 14 th 2012.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Multimedia Streaming in Dynamic Peer-to-Peer Systems and Mobile Wireless.
Data Hiding within Audio Signals Matthew Wiedemer CSE691 November 20, 2001.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
1 Enhancing Cellular Multicast Performance Using Ad Hoc Networks Jun Cheol Park Sneha Kumar Kasera School of.
Secure Localization using Dynamic Verifiers Nashad A. Safa Joint Work With S. Sarkar, R. Safavi-Naini and M.Ghaderi.
Security in Wireless Sensor Networks Perrig, Stankovic, Wagner Jason Buckingham CSCI 7143: Secure Sensor Networks August 31, 2004.
Lower-Layer Security in Mobility Yih-Chun Hu. Wireless Physical Layer Security The problem: prevent the jamming of broadcast to a group of nodes, some.
Xiaohua (Edward) Li1 and E. Paul Ratazzi2
The National Centres of Competence in Research are managed by the Swiss National Science Foundation on behalf of the Federal Authorities NCCR MICS review.
2002 MURI Minisymposium Cooperative Control of Distributed Autonomous Vehicles in Adversarial Environments 2002 MURI Minisymposium Ameesh Pandya Prof.
Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui Wei, Wenye Wang Department of Electrical and Computer.
Kyle Wesson, Mark Rothlisberger, and Todd Humphreys
On the Coded Complex Field Network Coding Scheme for Multiuser Cooperative Communications with Regenerative Relays Caixi Key Lab of Information.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Cooperative Molecular Communication for Nanonetwork Liang Hong 1, Wei Chen 1, Feng Liu 2 1 College of Engineering, Tennessee State University, U.S.A. 2.
CDMA WIRELESS DATA TRANSMITTER By Vijay kumar kintali B.tech 7 th semester Regd no:
RELIABLE MULTIMEDIA TRANSMISSION OVER COGNITIVE RADIO NETWORKS USING FOUNTAIN CODES Proceedings of the IEEE | Vol. 96, No. 1, January 2008 Harikeshwar.
INTRODUCTION. TITLE OF PROJECT SIMULATION OF FREQUENCY HOPPING SPREAD SPECTRUM IN MATLAB TITLE OF PROJECT SIMULATION OF FREQUENCY HOPPING SPREAD SPECTRUM.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Thrust 2 Layerless Dynamic Networks Lizhong Zheng, Todd Coleman.
Mingyuan Yan, Shouling Ji, and Zhipeng Cai Presented by: Mingyuan Yan.
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Robust Motion Watermarking based on Multiresolution Analysis Tae-hoon Kim Jehee Lee Sung Yong Shin Korea Advanced Institute of Science and Technology.
Protecting Sensitive Labels in Social Network Data Anonymization.
1 Energy Efficiency of MIMO Transmissions in Wireless Sensor Networks with Diversity and Multiplexing Gains Wenyu Liu, Xiaohua (Edward) Li and Mo Chen.
 Leaf test codes are secure sine they would not be jammed by jammers.  When few normal users are present, many leaf code tests are wasted since absent.
Adaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing (ICDCS ‘10) Qi Dong and Donggang Liu Presented by Ying Xuan.
Improving MBMS Security in 3G Wenyuan Xu Rutgers University.
Secure Authentication Scheme with Anonymity for Wireless Communications Speaker : Hong-Ji Wei Date :
Authors: Yih-Chun Hu, Adrian Perrig, David B. Johnson
EE578 Assignment #5 Abdul-Aziz.M Al-Yami November 8 th 2010.
RF network in SoC1 SoC Test Architecture with RF/Wireless Connectivity 1. D. Zhao, S. Upadhyaya, M. Margala, “A new SoC test architecture with RF/wireless.
ECE External Research Board Meeting Wireless Network and Communications Tan F. Wong Wireless Information and Networking Group
WCDMA Introduction Code Division Multiple Access
Computer Science CSC 774 Adv. Net. Security1 Presenter: Tong Zhou 11/21/2015 Practical Broadcast Authentication in Sensor Networks.
1 Probabilistic Coverage in Wireless Sensor Networks Nadeem Ahmed, Salil S. Kanhere and Sanjay Jha Computer Science and Engineering, University of New.
Wireless Multiple Access Schemes in a Class of Frequency Selective Channels with Uncertain Channel State Information Christopher Steger February 2, 2004.
Efficient Distribution of Key Chain Commitments for Broadcast Authentication in Distributed Sensor Networks Donggang Liu and Peng Ning Department of Computer.
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Nonbinary Orthogonal Modulation in Direct- Sequence Spread Spectrum Communication Systems Michael Y. Tan Home Institution: Clemson University Advisor:
Copyright © 2010 Houman Homayoun Houman Homayoun National Science Foundation Computing Innovation Fellow Department of Computer Science University of California.
University of Toronto – Connection Fast Wideband Electromagnetic Modeling of Indoor Wireless Channels Abbas Alighanbari Supervised by: Prof. Costas.
Evaluation of ad hoc routing over a channel switching MAC protocol Ethan Phelps-Goodman Lillie Kittredge.
Distributed Network Coding Based Opportunistic Routing for Multicast Abdallah Khreishah, Issa Khalil, and Jie Wu.
EC 2401*** WIRELESS COMMUNICATION. Why Wireless Benefits – Mobility: Ability to communicate anywhere!! – Easier configuration, set up and lower installation.
Why PHY Really Matters Hari Balakrishnan MIT CSAIL August 2007 Joint work with Kyle Jamieson and Ramki Gummadi.
CRMA: Collision Resistant Multiple Access Lili Qiu University of Texas at Austin Joint work with Tianji Li, Mi Kyung Han, Apurv Bhartia, Eric Rozner, Yin.
Doc.: IEEE /0070r2 SubmissionSlide 1 Efficient Error Control Using Network Coding for Multicast Transmission Date: Authors: DooJung.
Exploring the Energy-Latency Trade-off for Broadcasts in Energy-Saving Sensor Networks Matthew J. Miller, Cigdem Sengul, Indranil Gupta Department of Computer.
1 LSB Matching Revisited Source: IEEE Signal Processing Letters (Accepted for future publication) Authors: Jarno Mielikainen Speaker: Chia-Chun Wu ( 吳佳駿.
On Mobile Sink Node for Target Tracking in Wireless Sensor Networks Thanh Hai Trinh and Hee Yong Youn Pervasive Computing and Communications Workshops(PerComW'07)
Doc.: IEEE Submission H.S.Lee(ETRI),D.Y.Kim (Chungnam Univ.), & S.M.Ryu(Casuh) Slide 1 Project: IEEE P Working Group for.
Cognitive Information Service Basic Principles and Implementation of A Cognitive Inter-Node Protocol Optimization Scheme Dzmitry Kliazovich Fabrizio Granelli.
Group Multicast Capacity in Large Scale Wireless Networks
Universal Opportunistic Routing Scheme using Network Coding
Wireless Communication Project
Information Technology - Information Networks
Qi Dong and Donggang Liu Presented by Ying Xuan
Jamming Resistant Encoding
Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Multi preamble to support Single MAC for.
Feedback-jamming ARQ mechanisms
Presentation transcript:

Dynamic Jamming Mitigation for Wireless Broadcast Networks Jerry T. Chiang Yih-Chun Hu 2007

Problem description What is Wireless communications? - inherently symmetric. - often susceptible to the jamming attack. - takes an attacker the same amount of power to modulate a signal. Many methods to Jamming Mitigation for wireless. - Spread spectrum. - Binary key tree. - Multiple-unicast system.

Related Work Spread spectrum A. J. Viterbi. CDMA Principles of Spread Spectrum Communication. Addison-Wesley, has long been used to resist jamming attacks in unicast environments. Tree keying scheme - Jerry T. Chiang Yih-Chun Hu (achieves asymmetry in a broadcast wireless network). Cut et al Try to detect and avoid jammed regions.

Solution approach Using Tree keying scheme: A.Types of Covers. B. Loss Due to Jamming Is Limited. C. Remerging Trees. What is Tree keying scheme? Achieves asymmetry in a broadcast wireless network. How to use Tree keying scheme? Use Tree Remerging Scheme. Fig 1 Fig 3 Fig 2

Dynamic Tree-remerging Scheme scales to number of receivers without increasing the number of codes in use, and uses fewer codes even in relatively small networks. Remerging Scheme no system can escape jamming without using at least j +1 codes. Analyzed False Alarms using both experimental and theoretical techniques. extensive analysis mitigated in a wireless broadcast network - These techniques will be even more promising in the future, as the use of Ultra-Wideband expands Evaluation

Tree keying scheme - Achieves asymmetry in a broadcast wireless network. - Best Spread Spectrum - demonstrated that false alarms can be reduced to -negligible levelsTheoretical Environment. - can be efficiently and effectively detected and a chip-accurate MATLAB simulation and an bit-accurate event-driven simulation in the ns-2 network simulator. conclusion

Thank You Questions?