Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios
<p dir="ltr">Electronic Warfare (EW) scenarios contemplate powerful and stealthy jamming attacks, able to disrupt any competing wireless communication in the target area. Reactive jamming techniques are especially suitable to this aim. Indeed, by first eavesdropping on the whole radi...
محفوظ في:
| المؤلف الرئيسي: | |
|---|---|
| مؤلفون آخرون: | |
| منشور في: |
2019
|
| الموضوعات: | |
| الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
| _version_ | 1864513561198329856 |
|---|---|
| author | Savio Sciancalepore (16864152) |
| author2 | Roberto Di Pietro (16864155) |
| author2_role | author |
| author_facet | Savio Sciancalepore (16864152) Roberto Di Pietro (16864155) |
| author_role | author |
| dc.creator.none.fl_str_mv | Savio Sciancalepore (16864152) Roberto Di Pietro (16864155) |
| dc.date.none.fl_str_mv | 2019-10-25T00:00:00Z |
| dc.identifier.none.fl_str_mv | 10.1109/access.2019.2949716 |
| dc.relation.none.fl_str_mv | https://figshare.com/articles/journal_contribution/Bittransfer_Mitigating_Reactive_Jamming_in_Electronic_Warfare_Scenarios/24006723 |
| dc.rights.none.fl_str_mv | CC BY 4.0 info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Engineering Communications engineering Information and computing sciences Cybersecurity and privacy Distributed computing and systems software Jamming Wireless communication Protocols Hardware Physical layer Communication system security Electronic warfare Anti-jamming protocols Cyber-physical systems security |
| dc.title.none.fl_str_mv | Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios |
| dc.type.none.fl_str_mv | Text Journal contribution info:eu-repo/semantics/publishedVersion text contribution to journal |
| description | <p dir="ltr">Electronic Warfare (EW) scenarios contemplate powerful and stealthy jamming attacks, able to disrupt any competing wireless communication in the target area. Reactive jamming techniques are especially suitable to this aim. Indeed, by first eavesdropping on the whole radio spectrum used for communications, and then timely injecting random noise as soon as a transmission is detected, reactive jamming represents both an effective and hard-to-detect attack tool. In such a challenging EW scenario, all the solutions currently available in the literature to mitigate reactive jamming require either the deployment of specialized hardware, or the modifications of physical layer protocols-the former solution being expensive, and the latter one usually not viable when considering commercially available wireless devices. In this paper we propose BitTransfer, an anti-jamming protocol enabling wireless communications between neighboring devices even under the above-described stringent requirements and powerful attacker model. BitTransfer embeds information bits in radio activity operations, a 0 being represented by the absence of any radio activity, and a 1 by the reception of a (corrupted) packet at the receiver. To demonstrate its applicability to a wide class of commercial wireless devices, BitTransfer has been implemented using a real constrained hardware platform (the Openmote-b), released as freely available and open-source, and tested using the IEEE 802.15.4 communication technology, adopted within the Bluetooth and Zigbee 3.0 protocol stacks. When under attack by a reactive jammer, BitTransfer can transfer a message of 127 Bit in 11.17 seconds, while competing approaches simply fail. Other than being completely tunable, BitTransfer can also enjoy further improvements by simply increasing the transmission rate of the devices. Finally, its detailed design, open-source availability, robustness, and superior performance when compared against competing solutions, make it a solution of choice in challenging EW scenarios, also paving the way to further research along the highlighted directions.</p><h2>Other Information</h2><p dir="ltr">Published in: IEEE Access<br>License: <a href="https://creativecommons.org/licenses/by/4.0/legalcode" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2019.2949716" target="_blank">https://dx.doi.org/10.1109/access.2019.2949716</a></p> |
| eu_rights_str_mv | openAccess |
| id | Manara2_87e44bbc14fa222476a256ab02e77f94 |
| identifier_str_mv | 10.1109/access.2019.2949716 |
| network_acronym_str | Manara2 |
| network_name_str | Manara2 |
| oai_identifier_str | oai:figshare.com:article/24006723 |
| publishDate | 2019 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| rights_invalid_str_mv | CC BY 4.0 |
| spelling | Bittransfer: Mitigating Reactive Jamming in Electronic Warfare ScenariosSavio Sciancalepore (16864152)Roberto Di Pietro (16864155)EngineeringCommunications engineeringInformation and computing sciencesCybersecurity and privacyDistributed computing and systems softwareJammingWireless communicationProtocolsHardwarePhysical layerCommunication system securityElectronic warfareAnti-jamming protocolsCyber-physical systems security<p dir="ltr">Electronic Warfare (EW) scenarios contemplate powerful and stealthy jamming attacks, able to disrupt any competing wireless communication in the target area. Reactive jamming techniques are especially suitable to this aim. Indeed, by first eavesdropping on the whole radio spectrum used for communications, and then timely injecting random noise as soon as a transmission is detected, reactive jamming represents both an effective and hard-to-detect attack tool. In such a challenging EW scenario, all the solutions currently available in the literature to mitigate reactive jamming require either the deployment of specialized hardware, or the modifications of physical layer protocols-the former solution being expensive, and the latter one usually not viable when considering commercially available wireless devices. In this paper we propose BitTransfer, an anti-jamming protocol enabling wireless communications between neighboring devices even under the above-described stringent requirements and powerful attacker model. BitTransfer embeds information bits in radio activity operations, a 0 being represented by the absence of any radio activity, and a 1 by the reception of a (corrupted) packet at the receiver. To demonstrate its applicability to a wide class of commercial wireless devices, BitTransfer has been implemented using a real constrained hardware platform (the Openmote-b), released as freely available and open-source, and tested using the IEEE 802.15.4 communication technology, adopted within the Bluetooth and Zigbee 3.0 protocol stacks. When under attack by a reactive jammer, BitTransfer can transfer a message of 127 Bit in 11.17 seconds, while competing approaches simply fail. Other than being completely tunable, BitTransfer can also enjoy further improvements by simply increasing the transmission rate of the devices. Finally, its detailed design, open-source availability, robustness, and superior performance when compared against competing solutions, make it a solution of choice in challenging EW scenarios, also paving the way to further research along the highlighted directions.</p><h2>Other Information</h2><p dir="ltr">Published in: IEEE Access<br>License: <a href="https://creativecommons.org/licenses/by/4.0/legalcode" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2019.2949716" target="_blank">https://dx.doi.org/10.1109/access.2019.2949716</a></p>2019-10-25T00:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1109/access.2019.2949716https://figshare.com/articles/journal_contribution/Bittransfer_Mitigating_Reactive_Jamming_in_Electronic_Warfare_Scenarios/24006723CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/240067232019-10-25T00:00:00Z |
| spellingShingle | Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios Savio Sciancalepore (16864152) Engineering Communications engineering Information and computing sciences Cybersecurity and privacy Distributed computing and systems software Jamming Wireless communication Protocols Hardware Physical layer Communication system security Electronic warfare Anti-jamming protocols Cyber-physical systems security |
| status_str | publishedVersion |
| title | Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios |
| title_full | Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios |
| title_fullStr | Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios |
| title_full_unstemmed | Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios |
| title_short | Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios |
| title_sort | Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios |
| topic | Engineering Communications engineering Information and computing sciences Cybersecurity and privacy Distributed computing and systems software Jamming Wireless communication Protocols Hardware Physical layer Communication system security Electronic warfare Anti-jamming protocols Cyber-physical systems security |