This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Countering Intelligent Jamming with Full Protocol Stack Agility
PrePrint
ISSN: 1540-7993
Angela Dalton, The Johns Hopkins University, Laurel
Cherita Corbett, The Johns Hopkins University, Laurel
Jason Uher, The Johns Hopkins University, Laurel
Jarriel Cook, The Johns Hopkins University, Laurel
We create a moving-target in the network protocol stack, specifically focused on mitigating intelligent jamming (IJ). IJ goes beyond applying brute-force power at the physical link and instead exploits vulnerabilities specific to protocols. An IJ-equipped attacker that can gain a foothold into a network by exploiting vulnerabilities can operate with a lower chance of detection and a highly targeted impact on the network. We introduce protocol agility at multiple layers of the stack to inhibit protocol driven attacks. Our prototype counter-intelligent jamming (CIJ) system leverages software-defined radio (SDR) and software-defined networking (SDN) technologies. SDRs implement communication algorithms in software as close to the RF signal as possible. SDRs are used for modulation and coding at the physical and data link layers. SDN provides an interface and abstractions allowing software definition of network forwarding behavior. We use the SDR/SDN combination to apply a variety of moving-target defenses across the network stack.
Citation:
Angela Dalton, Cherita Corbett, Jason Uher, Jarriel Cook, "Countering Intelligent Jamming with Full Protocol Stack Agility," IEEE Security & Privacy, 07 Dec. 2013. IEEE computer Society Digital Library. IEEE Computer Society, <http://doi.ieeecomputersociety.org/10.1109/MSP.2013.136>
Usage of this product signifies your acceptance of the Terms of Use.