JIM-beam: Jamming-resilient wireless flooding based on spatial randomness

Jerry T. Chiang, Yih-Chun Hu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Many network operations rely on the flooding operation to provide long-term performance. Mitigating malicious interference in a flooding network is thus crucial in assuring availability. Recently, several protocols based on uncoordinated spread spectrum have been proposed for secure key establishment and jamming mitigation. In this paper, we present the JIM-Beam flooding protocol that randomizes the orientation of the main lobe of a node's directional antenna so that: (1) the attacker must jam in an inherently narrowband fashion, and (2) JIM-Beam is secure regardless of the attacker's computational and reaction abilities. We perform Monte Carlo simulations and show that JIM-Beam provides substantial performance improvements for packet flooding. We also discuss how combining JIM-Beam with existing antijamming schemes can provide substantial advantages to the combined system.

Original languageEnglish (US)
Title of host publicationProceedings - 2013 IEEE Military Communications Conference, MILCOM 2013
Pages464-469
Number of pages6
DOIs
StatePublished - Dec 1 2013
Event2013 IEEE Military Communications Conference, MILCOM 2013 - San Diego, CA, United States
Duration: Nov 18 2013Nov 20 2013

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM

Other

Other2013 IEEE Military Communications Conference, MILCOM 2013
CountryUnited States
CitySan Diego, CA
Period11/18/1311/20/13

Fingerprint

Jamming
Availability
Antennas
Monte Carlo simulation

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Cite this

Chiang, J. T., & Hu, Y-C. (2013). JIM-beam: Jamming-resilient wireless flooding based on spatial randomness. In Proceedings - 2013 IEEE Military Communications Conference, MILCOM 2013 (pp. 464-469). [6735666] (Proceedings - IEEE Military Communications Conference MILCOM). https://doi.org/10.1109/MILCOM.2013.86

JIM-beam : Jamming-resilient wireless flooding based on spatial randomness. / Chiang, Jerry T.; Hu, Yih-Chun.

Proceedings - 2013 IEEE Military Communications Conference, MILCOM 2013. 2013. p. 464-469 6735666 (Proceedings - IEEE Military Communications Conference MILCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chiang, JT & Hu, Y-C 2013, JIM-beam: Jamming-resilient wireless flooding based on spatial randomness. in Proceedings - 2013 IEEE Military Communications Conference, MILCOM 2013., 6735666, Proceedings - IEEE Military Communications Conference MILCOM, pp. 464-469, 2013 IEEE Military Communications Conference, MILCOM 2013, San Diego, CA, United States, 11/18/13. https://doi.org/10.1109/MILCOM.2013.86
Chiang JT, Hu Y-C. JIM-beam: Jamming-resilient wireless flooding based on spatial randomness. In Proceedings - 2013 IEEE Military Communications Conference, MILCOM 2013. 2013. p. 464-469. 6735666. (Proceedings - IEEE Military Communications Conference MILCOM). https://doi.org/10.1109/MILCOM.2013.86
Chiang, Jerry T. ; Hu, Yih-Chun. / JIM-beam : Jamming-resilient wireless flooding based on spatial randomness. Proceedings - 2013 IEEE Military Communications Conference, MILCOM 2013. 2013. pp. 464-469 (Proceedings - IEEE Military Communications Conference MILCOM).
@inproceedings{0fedd07b256844ec893783e5925b777a,
title = "JIM-beam: Jamming-resilient wireless flooding based on spatial randomness",
abstract = "Many network operations rely on the flooding operation to provide long-term performance. Mitigating malicious interference in a flooding network is thus crucial in assuring availability. Recently, several protocols based on uncoordinated spread spectrum have been proposed for secure key establishment and jamming mitigation. In this paper, we present the JIM-Beam flooding protocol that randomizes the orientation of the main lobe of a node's directional antenna so that: (1) the attacker must jam in an inherently narrowband fashion, and (2) JIM-Beam is secure regardless of the attacker's computational and reaction abilities. We perform Monte Carlo simulations and show that JIM-Beam provides substantial performance improvements for packet flooding. We also discuss how combining JIM-Beam with existing antijamming schemes can provide substantial advantages to the combined system.",
author = "Chiang, {Jerry T.} and Yih-Chun Hu",
year = "2013",
month = "12",
day = "1",
doi = "10.1109/MILCOM.2013.86",
language = "English (US)",
isbn = "9780769551241",
series = "Proceedings - IEEE Military Communications Conference MILCOM",
pages = "464--469",
booktitle = "Proceedings - 2013 IEEE Military Communications Conference, MILCOM 2013",

}

TY - GEN

T1 - JIM-beam

T2 - Jamming-resilient wireless flooding based on spatial randomness

AU - Chiang, Jerry T.

AU - Hu, Yih-Chun

PY - 2013/12/1

Y1 - 2013/12/1

N2 - Many network operations rely on the flooding operation to provide long-term performance. Mitigating malicious interference in a flooding network is thus crucial in assuring availability. Recently, several protocols based on uncoordinated spread spectrum have been proposed for secure key establishment and jamming mitigation. In this paper, we present the JIM-Beam flooding protocol that randomizes the orientation of the main lobe of a node's directional antenna so that: (1) the attacker must jam in an inherently narrowband fashion, and (2) JIM-Beam is secure regardless of the attacker's computational and reaction abilities. We perform Monte Carlo simulations and show that JIM-Beam provides substantial performance improvements for packet flooding. We also discuss how combining JIM-Beam with existing antijamming schemes can provide substantial advantages to the combined system.

AB - Many network operations rely on the flooding operation to provide long-term performance. Mitigating malicious interference in a flooding network is thus crucial in assuring availability. Recently, several protocols based on uncoordinated spread spectrum have been proposed for secure key establishment and jamming mitigation. In this paper, we present the JIM-Beam flooding protocol that randomizes the orientation of the main lobe of a node's directional antenna so that: (1) the attacker must jam in an inherently narrowband fashion, and (2) JIM-Beam is secure regardless of the attacker's computational and reaction abilities. We perform Monte Carlo simulations and show that JIM-Beam provides substantial performance improvements for packet flooding. We also discuss how combining JIM-Beam with existing antijamming schemes can provide substantial advantages to the combined system.

UR - http://www.scopus.com/inward/record.url?scp=84897707159&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84897707159&partnerID=8YFLogxK

U2 - 10.1109/MILCOM.2013.86

DO - 10.1109/MILCOM.2013.86

M3 - Conference contribution

AN - SCOPUS:84897707159

SN - 9780769551241

T3 - Proceedings - IEEE Military Communications Conference MILCOM

SP - 464

EP - 469

BT - Proceedings - 2013 IEEE Military Communications Conference, MILCOM 2013

ER -