전술 무선랜에서의 인증기반 적응적 채널 도약 기법
Authentication-based Adaptive Channel Hopping Schemes for Tactical WLAN
- 주제(키워드) IEEE 802.11+ anti-jamming
- 발행기관 아주대학교
- 지도교수 임재성
- 발행년도 2012
- 학위수여년월 2012. 2
- 학위명 박사
- 학과 및 전공 일반대학원 NCW학과
- 실제URI http://www.dcollection.net/handler/ajou/000000012102
- 본문언어 영어
- 저작권 아주대학교 논문은 저작권에 의해 보호받습니다.
초록/요약
As the military continues its transformation towards network centric warfare (NCW), a quickly-deployable communication solution for a tactical operations center (TOC) is required. The U.S. Army uses secure wireless local area network (SWLAN) with IEEE 802.11 standard waveforms to quickly set up TOC communications without cables. The SWLAN provides extremely secure mobile wireless data communications with COMSEC, TRANSEC, and monitoring systems to encrypt data and detect PHY / MAC layer misbehaviors. In the near future, our military is going to adopt the SWLAN in tactical information communication network (TICN) due to above reasons. However, the SWLAN hardly prevents jamming attacks of MAC / PHY layer. Therefore, adversaries are likely to exploit the vulnerabilities. In this thesis, we show the weakness of the MAC / PHY layer and propose the authentication-based adaptive channel hopping scheme to overcome the weakness. Firstly, we analyze the characteristics of the SWLAN, its environments, and security holes. Secondly, we propose the authentication-based medium access control to mitigate the weakness of the MAC layer. Finally, we introduce the adaptive rapid channel hopping and outband-sensing based channel hopping scheme to overcome the weakness of the PHY layer. Simulation results and theoretical analysis show that the proposed schemes enhance the performance under the jamming environments. We hope that the proposed schemes can be applied practically in SWLAN for improving the operation effectiveness.
more목차
CHAPTER 1 INTRODUCTION 1
1.1 Motivation 1
1.2 Contributions 2
1.3 Organization 4
CHAPTER 2 BACKGROUD AND RELATED WORKS 5
2.1 Background 5
2.1.1 Secure WLAN in Tactical Wireless Network 5
2.1.2 IEEE 802.11 MAC / PHY Layer 9
2.2 Related Works 16
2.2.1 MAC Layer Jamming methods 16
2.2.2 Countermeasures against MAC layer jamming 19
2.2.3 PHY Layer Jamming Methods 23
2.2.4 Countermesures against PHY Layer Jamming 24
2.3 The Necessity of the Proposed Schemes 28
2.4 Chapter Summary 30
CHAPTER 3 AUTHENTICATION-BASED MEDIUM ACCESS CONTROL 31
3.1 Problem Description 31
3.1.1 Jammer Model 36
3.2 Authentication-based medium access control (A-MAC) 39
3.2.1 Proposed Authentication-based MAC Scheme 39
3.2.2. Key Shift and SN Select Algorithm………………………………………… 42
3.3 Security Analysis and Simulation Results 46
3.3.1 Security Analysis 46
3.3.2 Simulation Results 48
3.4 Chapter Summary 52
CHAPTER 4 ADAPTIVE RAPID CHANNEL HOPPING 53
4.1 Problem Description 53
4.1.1 Jammer Model 56
4.2 Adaptive Rapid Channel Hopping (AR-CH) 60
4.2.1 Adaptive Transmission Time using Dwell Window 60
4.2.2 Deception Mechanism 63
4.2.3 Preventing a Compromised Station with Deception Mechanism 66
4.3 Numerical analysis and simulation results 72
4.3.1 Numerical Analysis 72
4.3.2 Simulation Results 76
4.4 Chapter Summary 83
CHAPTER 5 OUTBAND SENSING-BASED CHANNEL HOPPING 84
5.1 Problem Description 84
5.2 Outband Sensing-based Channel Hopping (OS-CH) 86
5.2.1 Outband Sensing-based Dynamic Frequency Selection 86
5.2.2 Immediate Jamming Detection Method 90
5.2.3 Synchronization between AP and Stations 92
5.3 Simulation results 94
5.4 Chapter Summary 101
CHAPTER 6 CONCLUSIONS AND FUTURE WORKS 102
6.1 Conclusions 102
6.2 Future Works 104
REFERENCES 105