学位论文详细信息
Secure protocols for wireless availability
Wireless;Security;Medium access control;Physical layer;Jamming;Interference;Channel capacity
Chang, Sang-Yoon
关键词: Wireless;    Security;    Medium access control;    Physical layer;    Jamming;    Interference;    Channel capacity;   
Others  :  https://www.ideals.illinois.edu/bitstream/handle/2142/45414/Sang-Yoon_Chang.pdf?sequence=1&isAllowed=y
美国|英语
来源: The Illinois Digital Environment for Access to Learning and Scholarship
PDF
【 摘 要 】

Since wireless networks share a communication medium, multiple transmissionson the same channel cause interference to each other and degrade thechannel quality, much as multiple people talking at the same time make forinefficient meetings. To avoid transmission collision, the network dividesthe medium into multiple orthogonal channels (by interleaving the channelaccess in frequency or time) and often uses medium access control (MAC)to coordinate channel use. Alternatively (e.g., when the wireless users usethe same physical channel), the network users can emulate such orthogonalchannel access in processing by spreading and coding the signal. Buildingon such orthogonal access technology, this dissertation studies protocols thatsupport the coexistence of wireless users and ensure wireless availability.In contrast to other studies focusing on improving the overall e fficiencyof the network, I aim to achieve reliability at all times. Thus, to study theworst-case misbehavior, I pose the problem within a security framework andintroduce an adversary who compromised the network and has insider access.In this dissertation, I propose three schemes for wireless availability:SimpleMAC, Ignore-False-Reservation MAC (IFR-MAC), and RedundancyO ffset Narrow Spectrum (RONS). SimpleMAC and IFR-MAC build on MACprotocols that utilize explicit channel coordination in control communication.SimpleMAC counters MAC-aware adversary that uses the information beingexchanged at the MAC layer to perform a more power e fficient jammingattack. IFR-MAC nulli ffies the proactive attack of denial-of-service injectionof false reservation control messages. Both SimpleMAC and IFR-MACquickly outperform the Nash equilibrium of disabling MAC and converge tothe capacity-optimal performance in worst-case failures. When the MACfails to coordinate channel use for orthogonal access or in a single-channelsetting (both cases of which, the attacker knows the exact frequency and timelocation of the victim's channel access), RONS introduces a physical-layer, processing-based technique for interference mitigation. RONS is a narrowspectrum technology that bypasses the spreading cost and eff ectively countersthe attacker's information-theoretically optimal strategy of correlatedjamming.

【 预 览 】
附件列表
Files Size Format View
Secure protocols for wireless availability 1936KB PDF download
  文献评价指标  
  下载次数:15次 浏览次数:19次