Chorti, Arsenia (2016) Overcoming limitations of secret key generation in block fading channels under active attacks. In: 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2016-07-03 - 2016-07-06.
Chorti, Arsenia (2016) Overcoming limitations of secret key generation in block fading channels under active attacks. In: 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2016-07-03 - 2016-07-06.
Chorti, Arsenia (2016) Overcoming limitations of secret key generation in block fading channels under active attacks. In: 2016 IEEE 17th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2016-07-03 - 2016-07-06.
Abstract
The topic of physical layer key agreement in Gaussian block fading channels in the presence of active adversaries is investigated in the present contribution. Frequency hopping versus frequency spreading are studied as potential defence strategies against denial of service (DoS) attacks in the form of jamming. We begin by investigating the optimal power allocation policy for the jammer - in the case of frequency spreading - when side information is available. Through numerical evaluations it is shown that effect of the availability of side information on the jammer's impact is minimal. Next, the competitive interaction between the legitimate nodes and the jammer is formulated as a one-shot zero-sum game; it is found that under short term power constraints, the legitimate nodes should not always employ frequency hopping while the jammer should always use frequency spreading. This result contradicts the common practice of using frequency hopping to defend against jamming attacks in standard wireless systems.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
Additional Information: | Published proceedings: IEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC |
Uncontrolled Keywords: | Physical layer security; secret key generation; frequency hopping; denial of service attacks; active attack |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Faculty of Science and Health Faculty of Science and Health > Computer Science and Electronic Engineering, School of |
SWORD Depositor: | Unnamed user with email elements@essex.ac.uk |
Depositing User: | Unnamed user with email elements@essex.ac.uk |
Date Deposited: | 12 Dec 2016 16:32 |
Last Modified: | 05 Dec 2024 19:00 |
URI: | http://repository.essex.ac.uk/id/eprint/18483 |