Motivation Uncoordinated DSSS UDSSS Application Conclusion
Jamming-resistant Broadcast Communication without Shared Keys
Christina P¨
- pper
Joint work with Mario Strasser and Srdjan ˇ Capkun System Security Group ETH Z¨ urich
August 2009
1/18
Jamming-resistant Broadcast Communication without Shared Keys - - PowerPoint PPT Presentation
Motivation Uncoordinated DSSS UDSSS Application Conclusion Jamming-resistant Broadcast Communication without Shared Keys Christina P opper Joint work with Mario Strasser and Srdjan Capkun System Security Group ETH Z urich August
Motivation Uncoordinated DSSS UDSSS Application Conclusion
1/18
Motivation Uncoordinated DSSS UDSSS Application Conclusion Broadcast Communication Jamming Attacks Problem Statement Our Solution
◮ Broadcast of (authenticated) messages to a (large) number of
◮ Wireless RF communication ◮ Receivers may be unknown and/or untrusted
◮ Alarm broadcast ◮ Broadcast of navigation signals ◮ ... 2/18
Motivation Uncoordinated DSSS UDSSS Application Conclusion Broadcast Communication Jamming Attacks Problem Statement Our Solution
◮ Jamming devices are cheap and easy to obtain
◮ Spread Spectrum Techniques, e.g., ◮ Frequency Hopping Spread Spectrum ◮ Direct-Sequence Spread-Spectrum (DSSS) ◮ Rely on a secret key (or code) pre-shared between sender
3/18
Motivation Uncoordinated DSSS UDSSS Application Conclusion Broadcast Communication Jamming Attacks Problem Statement Our Solution
◮ Pre-sharing keys is complex or infeasible ◮ Public key cryptography does not help ◮ Even if secret keys are pre-shared, receivers still need to be
4/18
Motivation Uncoordinated DSSS UDSSS Application Conclusion Broadcast Communication Jamming Attacks Problem Statement Our Solution
5/18
Motivation Uncoordinated DSSS UDSSS Application Conclusion Broadcast Communication Jamming Attacks Problem Statement Our Solution
◮ Scheme called Uncoordinated DSSS (UDSSS) ◮ Achieve communication to an unknown/untrusted set of
6/18
Motivation Uncoordinated DSSS UDSSS Application Conclusion UDSSS Scheme Security Analysis Performance Evaluation UDSSS Enhancement
7/18
Motivation Uncoordinated DSSS UDSSS Application Conclusion UDSSS Scheme Security Analysis Performance Evaluation UDSSS Enhancement
7/18
Motivation Uncoordinated DSSS UDSSS Application Conclusion UDSSS Scheme Security Analysis Performance Evaluation UDSSS Enhancement
7/18
Motivation Uncoordinated DSSS UDSSS Application Conclusion UDSSS Scheme Security Analysis Performance Evaluation UDSSS Enhancement
◮ lacking synchronization between sender and receivers ◮ the possibility of successful jamming attacks
8/18
Motivation Uncoordinated DSSS UDSSS Application Conclusion UDSSS Scheme Security Analysis Performance Evaluation UDSSS Enhancement
◮ E.g., N = 100 chips →
◮ Auto-correlation and
N chips per code n code sequen- ces M M[1] M[2] cs,1
cs c1 c2
cs,ℓ M[ℓ] ℓ codes per code sequence cn,1 cn,ℓ cs,1 cs,2 c2,2 c1,2 c1,ℓ
cn
c1,1 c2,1 cs,ℓ c2,ℓ cn,2
9/18
Motivation Uncoordinated DSSS UDSSS Application Conclusion UDSSS Scheme Security Analysis Performance Evaluation UDSSS Enhancement
◮ Non-reactive jammers blindly jam part of the spectrum ◮ Reactive jammers sense for ongoing transmissions ◮ Decoding jammers: try to find the used spreading codes and
◮ Repeater jammers: intercept the signal and re-radiate it
10/18
Motivation Uncoordinated DSSS UDSSS Application Conclusion UDSSS Scheme Security Analysis Performance Evaluation UDSSS Enhancement
◮ One receiver: Expected time for message recovery at a receiver
◮ Multiple receivers: Expected time until all l receivers have
n 2 kqN|M|+|M|
◮ R = 1/Tc chip rate ◮ q samples per chip ◮ ΛB(N): # bit despreading operations that the receiver can
◮ despread k bits before decision on code sequence, etc. 11/18
Motivation Uncoordinated DSSS UDSSS Application Conclusion UDSSS Scheme Security Analysis Performance Evaluation UDSSS Enhancement
0.2 0.4 0.6 0.8 1 10 20 30 40 50 number of message decodings (i) Probability that a message is received by all l = 100 receivers m = 1 pj = 0.0 pj = 0.2 pj = 0.5 pj = 0.8 10 20 30 40 50 60 1 10 100 1000 number of receivers (l) Time (in sec) after which all l receivers have decoded the message Td = 2s m = 1 pj = 0.0 pj = 0.2 pj = 0.5 pj = 0.8
12/18
Motivation Uncoordinated DSSS UDSSS Application Conclusion UDSSS Scheme Security Analysis Performance Evaluation UDSSS Enhancement
◮ Carrier frequency of 2.4 GHz ◮ (8,4)-Hamming-code ECC ◮ 2 USRPs positioned indoors at a distance of around 5 m USRP usrp sink bit scrambling usrp source bit despreading bit unscrambling USRP ECC encoding message sender message receiver ECC decoding bit spreading 13/18
Motivation Uncoordinated DSSS UDSSS Application Conclusion UDSSS Scheme Security Analysis Performance Evaluation UDSSS Enhancement
20 40 60 80 100 120 140 100 200 300 400 500 code length N per bit Duration (in sec) to receive and decode a message n IPS = 100 = 4.7⋅108 |M| = 256 |M| = 512 |M| = 1024 |M| = 1536 |M| = 2048 20 40 60 80 100 120 140 100 200 300 400 500 number of code sequences n Duration (in sec) to receive and decode a message N IPS = 256 = 4.7⋅108 |M| = 256 |M| = 512 |M| = 1024 |M| = 1536 |M| = 2048
14/18
Motivation Uncoordinated DSSS UDSSS Application Conclusion UDSSS Scheme Security Analysis Performance Evaluation UDSSS Enhancement
15/18
Motivation Uncoordinated DSSS UDSSS Application Conclusion Navigation Signals
◮ signals from three to four different base stations ◮ precise time-stamping of signal reception
Receiver
buffer UDSSS
J A4 A1 A2 A3
t2, pos2 t3, pos3 t1, pos1 t, pos t4, pos4 noise level
received power broadband recording
UDSSS signals
t
tr tr + Tr
◮ anti-jamming transmission of multiple signals in parallel ◮ precise time-stamping of signal reception (despite delayed
◮ anti-spoofing protection of authenticated messages 16/18
Motivation Uncoordinated DSSS UDSSS Application Conclusion
◮ UDSSS ◮ ZPK-DSSS [Jin et al, MobiHoc09] ◮ UFH [Strasser et al., S&P08], [Strasser et al., MobiHoc09],
17/18
Motivation Uncoordinated DSSS UDSSS Application Conclusion
18/18