adaptive jamming-resistant broadcast systems with partial channel sharing (icdcs ‘10) qi dong and...

19
Adaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing (ICDCS ‘10) Qi Dong and Donggang Liu Presented by Ying Xuan

Upload: elwin-young

Post on 02-Jan-2016

221 views

Category:

Documents


0 download

TRANSCRIPT

Adaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing (ICDCS ‘10)

Qi Dong and Donggang Liu

Presented by Ying Xuan

Problem Definition

•Jamming Attacks to wireless communications▫Jammer injects

interfering signals, significantly reducing SNR at the receiver.

▫Hard to locate the jammers.

Existing Solution•Spread Spectrum

▫Spread the signal over a larger bandwidth

▫Expensive for the jammer to search for the currently “used” frequency

Deficiency

•Broadcast Communication▫Attacker can compromise one

receiver▫The channel information is

exposed

Group-based scheme

•Multiple-group multiple frequencies▫Divide receivers into multiple groups▫Different channels for different groups▫Use divide-and-conquer to isolate

compromised receivers.

Each group needs a separate copy of each broadcast message.

Partial channel sharing• Each channel is divided

into multiple smaller ones.• Different groups partially

share these channels• Groups share the data copy

through the shared channels.

• Pro: much less communication cost

• Con: if attacker jams the shared channels….

Object

minimize the message complexity and isolate the malicious receivers.

Model and Parameter Setting

Binary Search Algorithm

• detect the traitors in the trusted group• partially share channels between suspicious group pair• detect untrustworthy group in a group pair• identify and remove traitors

Decision Variables

Performance Analysis• False rate by the system parameters

• Performance with worse-case (tricky attackers)▫ part 1: no traitors, one group containing traitors, both

groups containing traitors▫ part 2: how long will the attacker hide themselves▫ part 3: communication overhead

0 0

1 1

2 2

3,4,5

Pr Accept H | H F

Pr Accept H | H F

Pr Accept H | H F

Pr [Accept H | H F]x x x

• If no traitor, how likely does the attacker succeed in blocking the communications

1 1Pr Accept H | H F

( ; , , )

m n m

i j if i n m j

n

j

1 1Pr Accept H | H F ( ; , , )m

i m

f i n m j

•Hypotheses translation

3,4,5Pr [Accept H | H F]x x x

3 3 1 2Pr [Accept H | H F] max( , )P P

3 4 5 2( )H H H H

1 3 4 5

2 3 2

: Pr[Accept | ]

: Pr[Accept | ]

P H H H true

P H H true

2 1

1 11

| '| | '| 2 1

(| ' |; , (1 ) ,| ' |)

(| ' |; , (1 ) , | ' |)SG

EC EC SG

f EC m m CP

f EC n m m j C

Tricky Attackers• No traitors• Only one group contains tractors

▫ Strategy: jam channels in one group, and spend the rest energy for the other group

1m

Only one group contains tractors

How long will the attacker survive

1

log( 2( 1))t

x

R x

given compromised receiverst

Communication Overhead

As increases, the proportion of the shared channel increases, and the false rate increases too. But it is not that perfect, what to do next?

Need more precise decision

• Risk function, where is the variable for # of obervations collected

• Use Lai’s Bayes Sequential Test to make decision at each observaton (sub-test)

[ ] Pr[this iswrong decision]z c E S

S

False Rate and Decision Making Rate

The End