Cross-layer jamming detection and mitigation in wireless broadcast networks

Jerry T. Chiang, Yih Chun Hu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Mobile communication systems are often susceptible to high level of noise injected by adversaries, known as jamming attack. Jamming is difficult to prevent in broadcast networks because a user that can decode a transmission can also jam the transmission. In this paper, we describe a code tree system that helps the physical layer circumvent jammers. This system works with any spread-spectrum communications system. In our system, the transmitter has more information than any single receiver. Each receiver cooperates with the transmitter to detect any jamming that affects that receiver. Our scheme mitigates the jamming attack while allowing the transmitter to transmit on fewer codes than the number of users. We simulated our system in a theoretical setting using MATLAB. The result shows significant improvement over naively transmitting on a single shared code.

Original languageEnglish (US)
Title of host publicationMobiCom'07
Subtitle of host publicationProceedings of the Thirteenth ACM International Conference on Mobile Computing and Networking
Pages346-349
Number of pages4
DOIs
StatePublished - Dec 1 2007
EventMobiCom'07: Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking - Montreal, QC, Canada
Duration: Sep 9 2007Sep 14 2007

Publication series

NameProceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM

Other

OtherMobiCom'07: Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking
CountryCanada
CityMontreal, QC
Period9/9/079/14/07

Keywords

  • Performance
  • Security

ASJC Scopus subject areas

  • Software
  • Hardware and Architecture
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Cross-layer jamming detection and mitigation in wireless broadcast networks'. Together they form a unique fingerprint.

Cite this