Correlation-Based Search against Friendly Jamming Data Exchange Schemes

Friendly jamming is a physical-layer approach to protecting the confidentiality of short range wireless communication. In recent years, several practical friendly jamming scenes have been proposed based on the general principle that the recipient jams the channel while the data is being sent by anot...

Full description

Saved in:
Bibliographic Details
Published in2019 IEEE Conference on Dependable and Secure Computing (DSC) pp. 1 - 8
Main Authors Zhang, Jingyi, Hu, Qiao, Hancke, Gerhard Petrus
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.11.2019
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Friendly jamming is a physical-layer approach to protecting the confidentiality of short range wireless communication. In recent years, several practical friendly jamming scenes have been proposed based on the general principle that the recipient jams the channel while the data is being sent by another party. However, the security analysis of these schemes is a tricky subject, with works often showing that the scheme is secure against a specific implementation of a passive attacker or multiple attackers. These attackers are often modeled as conventional receivers, but interesting questions can be raised about whether there are better or new methods for attackers to use to recover jammed data. This paper introduces a signal correlation-based message recovery method against friendly jamming. Using this method a single eavesdropper is able to recover large parts of the secret message under the condition which is assumed to be secure enough by previous practical friendly jamming schemes. We analyze the impact of factors on our attack such as start positions, relation thresholds, the length of the section signals and plaintext by simulation. Results of experiment attacking an acoustic friendly jamming system indicative of this approach shows a much lower SNR upper threshold.
AbstractList Friendly jamming is a physical-layer approach to protecting the confidentiality of short range wireless communication. In recent years, several practical friendly jamming scenes have been proposed based on the general principle that the recipient jams the channel while the data is being sent by another party. However, the security analysis of these schemes is a tricky subject, with works often showing that the scheme is secure against a specific implementation of a passive attacker or multiple attackers. These attackers are often modeled as conventional receivers, but interesting questions can be raised about whether there are better or new methods for attackers to use to recover jammed data. This paper introduces a signal correlation-based message recovery method against friendly jamming. Using this method a single eavesdropper is able to recover large parts of the secret message under the condition which is assumed to be secure enough by previous practical friendly jamming schemes. We analyze the impact of factors on our attack such as start positions, relation thresholds, the length of the section signals and plaintext by simulation. Results of experiment attacking an acoustic friendly jamming system indicative of this approach shows a much lower SNR upper threshold.
Author Hancke, Gerhard Petrus
Hu, Qiao
Zhang, Jingyi
Author_xml – sequence: 1
  givenname: Jingyi
  surname: Zhang
  fullname: Zhang, Jingyi
  organization: Department of Computer Science, City University of Hong Kong, Hong Kong
– sequence: 2
  givenname: Qiao
  surname: Hu
  fullname: Hu, Qiao
  organization: College of Computer Science and Electronic Engineering, Hunan University, Hunan, China
– sequence: 3
  givenname: Gerhard Petrus
  surname: Hancke
  fullname: Hancke, Gerhard Petrus
  organization: Department of Computer Science, City University of Hong Kong, Hong Kong
BookMark eNotj8tKxDAYRiPoQsd5AhHyAq25tLkstXNTBlx09sM_zZ820KaSduG8vQVndRbf4YPzRO7jGJGQV85yzpl929RVoYVVuWDc5sZKXSp2R9ZWG66F4UJyqx7JvhpTwh7mMMbsAyZ0tEZITUehhRCnme5SwOj6K_2CYQixpRuYgW5_mw5ii7RuOhxweiYPHvoJ1zeuyGm3PVWH7Pi9_6zej1mwbM5Ae-saZbBQ2l2EZ8ILX6LjTGshwQHKQsjSa7dMZtGcsN7aRVC6YPoiV-Tl_zYg4vknhQHS9Xyrk3-fmUmP
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/DSC47296.2019.8937560
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781728123196
1728123194
EndPage 8
ExternalDocumentID 8937560
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i90t-a7f9dc68e467db2f02f2f5ed107723adae34235f7df0288e4d29f99ed167407b3
IEDL.DBID RIE
IngestDate Thu Jun 29 18:39:24 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-a7f9dc68e467db2f02f2f5ed107723adae34235f7df0288e4d29f99ed167407b3
PageCount 8
ParticipantIDs ieee_primary_8937560
PublicationCentury 2000
PublicationDate 2019-Nov.
PublicationDateYYYYMMDD 2019-11-01
PublicationDate_xml – month: 11
  year: 2019
  text: 2019-Nov.
PublicationDecade 2010
PublicationTitle 2019 IEEE Conference on Dependable and Secure Computing (DSC)
PublicationTitleAbbrev DESEC
PublicationYear 2019
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.7062937
Snippet Friendly jamming is a physical-layer approach to protecting the confidentiality of short range wireless communication. In recent years, several practical...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Correlation
eavesdropping
friendly jamming
Jamming
message recovery
Receivers
Satellite broadcasting
Security
Signal to noise ratio
Spread spectrum communication
Title Correlation-Based Search against Friendly Jamming Data Exchange Schemes
URI https://ieeexplore.ieee.org/document/8937560
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDLa2nTgB2hBv5cCRbE26NcuVPZgmDSFtSLtNSeMiBHuIdRLw63GaMQTiwK1pXLWNq352-302wJVQqZVSxFwliJwQL-IWbcKNcpFECkiwKGA6uksGD83htDUtwfVOC4OIBfkM636z-JfvlunGfypreGwlhC5DmRK3oNXainJEpBvdcadJoaLnHQh6AILtj6YpBWb092H0dbZAFXmub3JbTz9-FWL87-UcQO1bncfud7hzCCVcVOG249tsBGIbvyFociwwiZl5pOR_nbO-r2jsXt7Z0MzndCDrmtyw3luQ_rIxeW-O6xpM-r1JZ8C3TRL4k45yWtNMuzRpI73wnJVZJDOZtdBRVqdkbJxBX-KvlSlHU20yc1JnWpNBoiiXs_ERVBbLBR4Dc2lM4ZpR2mamKYyhRAhlYmkUCyuUPYGqX4PZKpTBmG1v__Tv3Wew5_0QZHvnUMlfN3hB-J3by8JxnyjenOo
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NT8JAEJ0gHvSkBozf7sGjhXZLu-xVPkQEYgIm3Mhud2qMAkZKov56Z7uI0Xjw1u1O03an6Ztp35sBuAhEojkPQk_EiB4hnu9p1LGnhPE5UkCCeQHT_iDu3Ne642hcgMu1FgYRc_IZVuxm_i_fzJOl_VRWtdhKCL0Bm4T7EXdqrZUsJ_BltTls1ChYtMyDgB4BZ_2jbUqOGu0d6H-dz5FFnirLTFeSj1-lGP97QbtQ_tbnsbs18uxBAWcluG7YRhuO2uZdETgZ5rjETD1Q-r_IWNvWNDbP76yrplM6kDVVpljrzYl_2ZD8N8VFGUbt1qjR8VZtErxH6We0qqk0SVxHeuUZzVOfpzyN0FBeJ3iojEJb5C9KhaGpOpkZLlMpySAWlM3pcB-Ks_kMD4CZJKSATQmpU1ULlKJUCHmsaRQGOhD6EEp2DSYvrhDGZHX7R3_vPoetzqjfm_RuBrfHsG194kR8J1DMXpd4Smie6bPciZ-KtaA0
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2019+IEEE+Conference+on+Dependable+and+Secure+Computing+%28DSC%29&rft.atitle=Correlation-Based+Search+against+Friendly+Jamming+Data+Exchange+Schemes&rft.au=Zhang%2C+Jingyi&rft.au=Hu%2C+Qiao&rft.au=Hancke%2C+Gerhard+Petrus&rft.date=2019-11-01&rft.pub=IEEE&rft.spage=1&rft.epage=8&rft_id=info:doi/10.1109%2FDSC47296.2019.8937560&rft.externalDocID=8937560