검색 상세

전술 무선랜에서의 인증기반 적응적 채널 도약 기법

Authentication-based Adaptive Channel Hopping Schemes for Tactical WLAN

초록/요약

As the military continues its transformation towards network centric warfare (NCW), a quickly-deployable communication solution for a tactical operations center (TOC) is required. The U.S. Army uses secure wireless local area network (SWLAN) with IEEE 802.11 standard waveforms to quickly set up TOC communications without cables. The SWLAN provides extremely secure mobile wireless data communications with COMSEC, TRANSEC, and monitoring systems to encrypt data and detect PHY / MAC layer misbehaviors. In the near future, our military is going to adopt the SWLAN in tactical information communication network (TICN) due to above reasons. However, the SWLAN hardly prevents jamming attacks of MAC / PHY layer. Therefore, adversaries are likely to exploit the vulnerabilities. In this thesis, we show the weakness of the MAC / PHY layer and propose the authentication-based adaptive channel hopping scheme to overcome the weakness. Firstly, we analyze the characteristics of the SWLAN, its environments, and security holes. Secondly, we propose the authentication-based medium access control to mitigate the weakness of the MAC layer. Finally, we introduce the adaptive rapid channel hopping and outband-sensing based channel hopping scheme to overcome the weakness of the PHY layer. Simulation results and theoretical analysis show that the proposed schemes enhance the performance under the jamming environments. We hope that the proposed schemes can be applied practically in SWLAN for improving the operation effectiveness.

more

목차

CHAPTER 1 INTRODUCTION 1
1.1 Motivation 1
1.2 Contributions 2
1.3 Organization 4

CHAPTER 2 BACKGROUD AND RELATED WORKS 5
2.1 Background 5
2.1.1 Secure WLAN in Tactical Wireless Network 5
2.1.2 IEEE 802.11 MAC / PHY Layer 9
2.2 Related Works 16
2.2.1 MAC Layer Jamming methods 16
2.2.2 Countermeasures against MAC layer jamming 19
2.2.3 PHY Layer Jamming Methods 23
2.2.4 Countermesures against PHY Layer Jamming 24
2.3 The Necessity of the Proposed Schemes 28

2.4 Chapter Summary 30

CHAPTER 3 AUTHENTICATION-BASED MEDIUM ACCESS CONTROL 31
3.1 Problem Description 31
3.1.1 Jammer Model 36
3.2 Authentication-based medium access control (A-MAC) 39
3.2.1 Proposed Authentication-based MAC Scheme 39
3.2.2. Key Shift and SN Select Algorithm………………………………………… 42

3.3 Security Analysis and Simulation Results 46
3.3.1 Security Analysis 46
3.3.2 Simulation Results 48
3.4 Chapter Summary 52

CHAPTER 4 ADAPTIVE RAPID CHANNEL HOPPING 53
4.1 Problem Description 53
4.1.1 Jammer Model 56
4.2 Adaptive Rapid Channel Hopping (AR-CH) 60
4.2.1 Adaptive Transmission Time using Dwell Window 60
4.2.2 Deception Mechanism 63
4.2.3 Preventing a Compromised Station with Deception Mechanism 66
4.3 Numerical analysis and simulation results 72
4.3.1 Numerical Analysis 72
4.3.2 Simulation Results 76
4.4 Chapter Summary 83

CHAPTER 5 OUTBAND SENSING-BASED CHANNEL HOPPING 84
5.1 Problem Description 84
5.2 Outband Sensing-based Channel Hopping (OS-CH) 86
5.2.1 Outband Sensing-based Dynamic Frequency Selection 86
5.2.2 Immediate Jamming Detection Method 90
5.2.3 Synchronization between AP and Stations 92
5.3 Simulation results 94
5.4 Chapter Summary 101


CHAPTER 6 CONCLUSIONS AND FUTURE WORKS 102
6.1 Conclusions 102
6.2 Future Works 104

REFERENCES 105

more