Withdraw
Loading…
Secure protocols for wireless availability
Chang, Sang-Yoon
Loading…
Permalink
https://hdl.handle.net/2142/45414
Description
- Title
- Secure protocols for wireless availability
- Author(s)
- Chang, Sang-Yoon
- Issue Date
- 2013-08-22T16:39:29Z
- Director of Research (if dissertation) or Advisor (if thesis)
- Hu, Yih-Chun
- Doctoral Committee Chair(s)
- Hu, Yih-Chun
- Committee Member(s)
- Vaidya, Nitin H.
- Borisov, Nikita
- Gunter, Carl A.
- Department of Study
- Electrical & Computer Eng
- Discipline
- Electrical & Computer Engr
- Degree Granting Institution
- University of Illinois at Urbana-Champaign
- Degree Name
- Ph.D.
- Degree Level
- Dissertation
- Keyword(s)
- Wireless
- Security
- Medium access control
- Physical layer
- Jamming
- Interference
- Channel capacity
- Abstract
- Since wireless networks share a communication medium, multiple transmissions on the same channel cause interference to each other and degrade the channel quality, much as multiple people talking at the same time make for inefficient meetings. To avoid transmission collision, the network divides the medium into multiple orthogonal channels (by interleaving the channel access in frequency or time) and often uses medium access control (MAC) to coordinate channel use. Alternatively (e.g., when the wireless users use the same physical channel), the network users can emulate such orthogonal channel access in processing by spreading and coding the signal. Building on such orthogonal access technology, this dissertation studies protocols that support the coexistence of wireless users and ensure wireless availability. In contrast to other studies focusing on improving the overall e fficiency of the network, I aim to achieve reliability at all times. Thus, to study the worst-case misbehavior, I pose the problem within a security framework and introduce an adversary who compromised the network and has insider access. In this dissertation, I propose three schemes for wireless availability: SimpleMAC, Ignore-False-Reservation MAC (IFR-MAC), and Redundancy O ffset Narrow Spectrum (RONS). SimpleMAC and IFR-MAC build on MAC protocols that utilize explicit channel coordination in control communication. SimpleMAC counters MAC-aware adversary that uses the information being exchanged at the MAC layer to perform a more power e fficient jamming attack. IFR-MAC nulli ffies the proactive attack of denial-of-service injection of false reservation control messages. Both SimpleMAC and IFR-MAC quickly outperform the Nash equilibrium of disabling MAC and converge to the capacity-optimal performance in worst-case failures. When the MAC fails to coordinate channel use for orthogonal access or in a single-channel setting (both cases of which, the attacker knows the exact frequency and time location of the victim's channel access), RONS introduces a physical-layer, processing-based technique for interference mitigation. RONS is a narrow spectrum technology that bypasses the spreading cost and eff ectively counters the attacker's information-theoretically optimal strategy of correlated jamming.
- Graduation Semester
- 2013-08
- Permalink
- http://hdl.handle.net/2142/45414
- Copyright and License Information
- Copyright 2013 Sang-Yoon Chang
Owning Collections
Graduate Dissertations and Theses at Illinois PRIMARY
Graduate Theses and Dissertations at IllinoisDissertations and Theses - Electrical and Computer Engineering
Dissertations and Theses in Electrical and Computer EngineeringManage Files
Loading…
Edit Collection Membership
Loading…
Edit Metadata
Loading…
Edit Properties
Loading…
Embargoes
Loading…