Visible to the public SDR-Based Resilient Wireless Communications

TitleSDR-Based Resilient Wireless Communications
Publication TypeConference Paper
Year of Publication2017
AuthorsAlmoualem, F., Satam, P., Ki, J. G., Hariri, S.
Conference Name2017 International Conference on Cloud and Autonomic Computing (ICCAC)
Date PublishedSept. 2017
ISBN Number978-1-5386-1939-1
KeywordsAutonomic Security, Communication system security, Computer crime, cyberattacks, Denial of Service (DoS) Attack, Denial of Service attacks, Frequency modulation, jamming, jamming attack, jamming attacks, Metrics, moving target defense, Protocols, pubcrawl, radio channels, Resiliency, Resilient Communication System, Scalability, SDR-based resilient wireless communication, security of data, service attacks, session hijacking, software defined radio, Software Defined Radios, software radio, telecommunication security, wireless channels, Wireless communication, wireless communications attacks, wireless communications channels, wireless communications secure, wireless networks, wireless protocols, wireless technologies

As the use of wireless technologies increases significantly due to ease of deployment, cost-effectiveness and the increase in bandwidth, there is a critical need to make the wireless communications secure, and resilient to attacks or faults (malicious or natural). Wireless communications are inherently prone to cyberattacks due to the open access to the medium. While current wireless protocols have addressed the privacy issues, they have failed to provide effective solutions against denial of service attacks, session hijacking and jamming attacks. In this paper, we present a resilient wireless communication architecture based on Moving Target Defense, and Software Defined Radios (SDRs). The approach achieves its resilient operations by randomly changing the runtime characteristics of the wireless communications channels between different wireless nodes to make it extremely difficult to succeed in launching attacks. The runtime characteristics that can be changed include packet size, network address, modulation type, and the operating frequency of the channel. In addition, the lifespan for each configuration will be random. To reduce the overhead in switching between two consecutive configurations, we use two radio channels that are selected at random from a finite set of potential channels, one will be designated as an active channel while the second acts as a standby channel. This will harden the wireless communications attacks because the attackers have no clue on what channels are currently being used to exploit existing vulnerability and launch an attack. The experimental results and evaluation show that our approach can tolerate a wide range of attacks (Jamming, DOS and session attacks) against wireless networks.

Citation Keyalmoualem_sdr-based_2017