Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios

<p dir="ltr">Electronic Warfare (EW) scenarios contemplate powerful and stealthy jamming attacks, able to disrupt any competing wireless communication in the target area. Reactive jamming techniques are especially suitable to this aim. Indeed, by first eavesdropping on the whole radi...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Savio Sciancalepore (16864152) (author)
مؤلفون آخرون: Roberto Di Pietro (16864155) (author)
منشور في: 2019
الموضوعات:
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1864513561198329856
author Savio Sciancalepore (16864152)
author2 Roberto Di Pietro (16864155)
author2_role author
author_facet Savio Sciancalepore (16864152)
Roberto Di Pietro (16864155)
author_role author
dc.creator.none.fl_str_mv Savio Sciancalepore (16864152)
Roberto Di Pietro (16864155)
dc.date.none.fl_str_mv 2019-10-25T00:00:00Z
dc.identifier.none.fl_str_mv 10.1109/access.2019.2949716
dc.relation.none.fl_str_mv https://figshare.com/articles/journal_contribution/Bittransfer_Mitigating_Reactive_Jamming_in_Electronic_Warfare_Scenarios/24006723
dc.rights.none.fl_str_mv CC BY 4.0
info:eu-repo/semantics/openAccess
dc.subject.none.fl_str_mv Engineering
Communications engineering
Information and computing sciences
Cybersecurity and privacy
Distributed computing and systems software
Jamming
Wireless communication
Protocols
Hardware
Physical layer
Communication system security
Electronic warfare
Anti-jamming protocols
Cyber-physical systems security
dc.title.none.fl_str_mv Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios
dc.type.none.fl_str_mv Text
Journal contribution
info:eu-repo/semantics/publishedVersion
text
contribution to journal
description <p dir="ltr">Electronic Warfare (EW) scenarios contemplate powerful and stealthy jamming attacks, able to disrupt any competing wireless communication in the target area. Reactive jamming techniques are especially suitable to this aim. Indeed, by first eavesdropping on the whole radio spectrum used for communications, and then timely injecting random noise as soon as a transmission is detected, reactive jamming represents both an effective and hard-to-detect attack tool. In such a challenging EW scenario, all the solutions currently available in the literature to mitigate reactive jamming require either the deployment of specialized hardware, or the modifications of physical layer protocols-the former solution being expensive, and the latter one usually not viable when considering commercially available wireless devices. In this paper we propose BitTransfer, an anti-jamming protocol enabling wireless communications between neighboring devices even under the above-described stringent requirements and powerful attacker model. BitTransfer embeds information bits in radio activity operations, a 0 being represented by the absence of any radio activity, and a 1 by the reception of a (corrupted) packet at the receiver. To demonstrate its applicability to a wide class of commercial wireless devices, BitTransfer has been implemented using a real constrained hardware platform (the Openmote-b), released as freely available and open-source, and tested using the IEEE 802.15.4 communication technology, adopted within the Bluetooth and Zigbee 3.0 protocol stacks. When under attack by a reactive jammer, BitTransfer can transfer a message of 127 Bit in 11.17 seconds, while competing approaches simply fail. Other than being completely tunable, BitTransfer can also enjoy further improvements by simply increasing the transmission rate of the devices. Finally, its detailed design, open-source availability, robustness, and superior performance when compared against competing solutions, make it a solution of choice in challenging EW scenarios, also paving the way to further research along the highlighted directions.</p><h2>Other Information</h2><p dir="ltr">Published in: IEEE Access<br>License: <a href="https://creativecommons.org/licenses/by/4.0/legalcode" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2019.2949716" target="_blank">https://dx.doi.org/10.1109/access.2019.2949716</a></p>
eu_rights_str_mv openAccess
id Manara2_87e44bbc14fa222476a256ab02e77f94
identifier_str_mv 10.1109/access.2019.2949716
network_acronym_str Manara2
network_name_str Manara2
oai_identifier_str oai:figshare.com:article/24006723
publishDate 2019
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
rights_invalid_str_mv CC BY 4.0
spelling Bittransfer: Mitigating Reactive Jamming in Electronic Warfare ScenariosSavio Sciancalepore (16864152)Roberto Di Pietro (16864155)EngineeringCommunications engineeringInformation and computing sciencesCybersecurity and privacyDistributed computing and systems softwareJammingWireless communicationProtocolsHardwarePhysical layerCommunication system securityElectronic warfareAnti-jamming protocolsCyber-physical systems security<p dir="ltr">Electronic Warfare (EW) scenarios contemplate powerful and stealthy jamming attacks, able to disrupt any competing wireless communication in the target area. Reactive jamming techniques are especially suitable to this aim. Indeed, by first eavesdropping on the whole radio spectrum used for communications, and then timely injecting random noise as soon as a transmission is detected, reactive jamming represents both an effective and hard-to-detect attack tool. In such a challenging EW scenario, all the solutions currently available in the literature to mitigate reactive jamming require either the deployment of specialized hardware, or the modifications of physical layer protocols-the former solution being expensive, and the latter one usually not viable when considering commercially available wireless devices. In this paper we propose BitTransfer, an anti-jamming protocol enabling wireless communications between neighboring devices even under the above-described stringent requirements and powerful attacker model. BitTransfer embeds information bits in radio activity operations, a 0 being represented by the absence of any radio activity, and a 1 by the reception of a (corrupted) packet at the receiver. To demonstrate its applicability to a wide class of commercial wireless devices, BitTransfer has been implemented using a real constrained hardware platform (the Openmote-b), released as freely available and open-source, and tested using the IEEE 802.15.4 communication technology, adopted within the Bluetooth and Zigbee 3.0 protocol stacks. When under attack by a reactive jammer, BitTransfer can transfer a message of 127 Bit in 11.17 seconds, while competing approaches simply fail. Other than being completely tunable, BitTransfer can also enjoy further improvements by simply increasing the transmission rate of the devices. Finally, its detailed design, open-source availability, robustness, and superior performance when compared against competing solutions, make it a solution of choice in challenging EW scenarios, also paving the way to further research along the highlighted directions.</p><h2>Other Information</h2><p dir="ltr">Published in: IEEE Access<br>License: <a href="https://creativecommons.org/licenses/by/4.0/legalcode" target="_blank">https://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1109/access.2019.2949716" target="_blank">https://dx.doi.org/10.1109/access.2019.2949716</a></p>2019-10-25T00:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1109/access.2019.2949716https://figshare.com/articles/journal_contribution/Bittransfer_Mitigating_Reactive_Jamming_in_Electronic_Warfare_Scenarios/24006723CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/240067232019-10-25T00:00:00Z
spellingShingle Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios
Savio Sciancalepore (16864152)
Engineering
Communications engineering
Information and computing sciences
Cybersecurity and privacy
Distributed computing and systems software
Jamming
Wireless communication
Protocols
Hardware
Physical layer
Communication system security
Electronic warfare
Anti-jamming protocols
Cyber-physical systems security
status_str publishedVersion
title Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios
title_full Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios
title_fullStr Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios
title_full_unstemmed Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios
title_short Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios
title_sort Bittransfer: Mitigating Reactive Jamming in Electronic Warfare Scenarios
topic Engineering
Communications engineering
Information and computing sciences
Cybersecurity and privacy
Distributed computing and systems software
Jamming
Wireless communication
Protocols
Hardware
Physical layer
Communication system security
Electronic warfare
Anti-jamming protocols
Cyber-physical systems security