STIR-ing the Wireless Medium with Self-Tuned, Inference-Based, Real-Time Jamming. DeBruhl, B., Kim, Y. S., Weinberg, Z., & Tague, P. In Mobile Ad hoc and Sensor Systems, pages 326-334, 2012. IEEE. _mendeley Paper doi abstract bibtex Jamming broadcasting to intentionally interfere with wireless reception, has long been a problem for wireless systems. Recent research demonstrates numerous advances in jamming techniques that increase attack efficiency or reduce the probability an attack will be detected by choosing attack parameters based on a system's configuration. In this work, we extend the attacker's capabilities by modifying the attack parameters in response to the observed performance of the target system, effectively creating a feedback loop in our attack model. This framework allows for more intricate attack models that are tuned online allowing for closer to optimal attacks against legitimate systems. To show the feasibility of the listening and attacking framework we introduce an attack called Self-Tuned, Inference-based, Real-time jamming or STIR-jamming. This attack listens to legitimate communication traffic, infers the systems performance, and optimizes jamming parameters. We propose the two types of STIR-jamming, mSTIR-jamming and tSTIR-jamming, and implement these attacks against an IEEE 802.15.4 link as a case study. With the empirical results, we demonstrate the attack system adapting to various scenarios and finding stable solutions.
@inproceedings{ mendeley_6087108074,
isauthor = {1},
abstract = {Jamming broadcasting to intentionally interfere with wireless reception, has long been a problem for wireless systems. Recent research demonstrates numerous advances in jamming techniques that increase attack efficiency or reduce the probability an attack will be detected by choosing attack parameters based on a system's configuration. In this work, we extend the attacker's capabilities by modifying the attack parameters in response to the observed performance of the target system, effectively creating a feedback loop in our attack model. This framework allows for more intricate attack models that are tuned online allowing for closer to optimal attacks against legitimate systems. To show the feasibility of the listening and attacking framework we introduce an attack called Self-Tuned, Inference-based, Real-time jamming or STIR-jamming. This attack listens to legitimate communication traffic, infers the systems performance, and optimizes jamming parameters. We propose the two types of STIR-jamming, mSTIR-jamming and tSTIR-jamming, and implement these attacks against an IEEE 802.15.4 link as a case study. With the empirical results, we demonstrate the attack system adapting to various scenarios and finding stable solutions.},
canonical_id = {3e02148f-a0a7-4042-848a-a479d3c8102f},
added = {1378849008},
year = {2012},
keywords = {broadcasting, feedback, jamming, probability, radio links, radio reception, real-time systems, telecommunication security, telecommunication traffic, tuning},
isstarred = {0},
id = {6087108074},
discipline = {Computer and Information Science},
series = {Mobile Ad hoc and Sensor Systems},
title = {STIR-ing the Wireless Medium with Self-Tuned, Inference-Based, Real-Time Jamming},
deletionpending = {0},
version = {1379770609},
type = {Conference Proceedings},
url_mendeley = {http://www.mendeley.com/research/stiring-wireless-medium-selftuned-inferencebased-realtime-jamming-2/},
isread = {1},
author = {Bruce {DeBruhl} and Yu Seung {Kim} and Zachary {Weinberg} and Patrick {Tague}},
pages = {326-334 },
publisher = {IEEE},
doi = {10.1109/MASS.2012.6502532},
url = {http://wnss.sv.cmu.edu/papers/mass-12.pdf},
modified = {1379770609},
citation_key = {DeBruhl2012},
booktitle = {Mobile Ad hoc and Sensor Systems},
subdiscipline = {Computer Security}
}
Downloads: 0
{"_id":{"_str":"5241dfd7b1392ed1430013f8"},"__v":0,"authorIDs":[],"author_short":["DeBruhl, B.","Kim, Y.<nbsp>S.","Weinberg, Z.","Tague, P."],"bibbaseid":"debruhl-kim-weinberg-tague-stiringthewirelessmediumwithselftunedinferencebasedrealtimejamming-2012","bibdata":{"html":"<div class=\"bibbase_paper\">\n\n\n<span class=\"bibbase_paper_titleauthoryear\">\n\t<span class=\"bibbase_paper_title\"><a name=\"mendeley_6087108074\"> </a>STIR-ing the Wireless Medium with Self-Tuned, Inference-Based, Real-Time Jamming.</span>\n\t<span class=\"bibbase_paper_author\">\nDeBruhl, B.; Kim, Y. S.; Weinberg, Z.; and Tague, P.</span>\n\t<!-- <span class=\"bibbase_paper_year\">2012</span>. -->\n</span>\n\n\n\nIn\n<i>Mobile Ad hoc and Sensor Systems</i>, page 326-334, 2012.\n\n\nIEEE.\n\n\n\n\n<br class=\"bibbase_paper_content\"/>\n\n<span class=\"bibbase_paper_content\">\n \n \n <!-- <i -->\n <!-- onclick=\"javascript:log_download('debruhl-kim-weinberg-tague-stiringthewirelessmediumwithselftunedinferencebasedrealtimejamming-2012', 'http://wnss.sv.cmu.edu/papers/mass-12.pdf')\">DEBUG -->\n <!-- </i> -->\n\n <a href=\"http://wnss.sv.cmu.edu/papers/mass-12.pdf\"\n onclick=\"javascript:log_download('debruhl-kim-weinberg-tague-stiringthewirelessmediumwithselftunedinferencebasedrealtimejamming-2012', 'http://wnss.sv.cmu.edu/papers/mass-12.pdf')\">\n <img src=\"http://www.bibbase.org/img/filetypes/pdf.png\"\n\t alt=\"STIR-ing the Wireless Medium with Self-Tuned, Inference-Based, Real-Time Jamming [.pdf]\" \n\t class=\"bibbase_icon\"\n\t style=\"width: 24px; height: 24px; border: 0px; vertical-align: text-top\" ><span class=\"bibbase_icon_text\">Paper</span></a> \n \n <!-- <i -->\n <!-- onclick=\"javascript:log_download('debruhl-kim-weinberg-tague-stiringthewirelessmediumwithselftunedinferencebasedrealtimejamming-2012', 'http://www.mendeley.com/research/stiring-wireless-medium-selftuned-inferencebased-realtime-jamming-2/')\">DEBUG -->\n <!-- </i> -->\n\n <a href=\"http://www.mendeley.com/research/stiring-wireless-medium-selftuned-inferencebased-realtime-jamming-2/\"\n onclick=\"javascript:log_download('debruhl-kim-weinberg-tague-stiringthewirelessmediumwithselftunedinferencebasedrealtimejamming-2012', 'http://www.mendeley.com/research/stiring-wireless-medium-selftuned-inferencebased-realtime-jamming-2/')\">\n <img src=\"http://www.bibbase.org/img/filetypes/blank.png\"\n\t alt=\"STIR-ing the Wireless Medium with Self-Tuned, Inference-Based, Real-Time Jamming [.com/research/stiring-wireless-medium-selftuned-inferencebased-realtime-jamming-2/]\" \n\t class=\"bibbase_icon\"\n\t style=\"width: 24px; height: 24px; border: 0px; vertical-align: text-top\" ><span class=\"bibbase_icon_text\">_mendeley</span></a> \n \n \n <a href=\"javascript:showBib('mendeley_6087108074')\">\n <img src=\"http://www.bibbase.org/img/filetypes/bib.png\" \n\t alt=\"STIR-ing the Wireless Medium with Self-Tuned, Inference-Based, Real-Time Jamming [bib]\" \n\t class=\"bibbase_icon\"\n\t style=\"width: 24px; height: 24px; border: 0px; vertical-align: text-top\"><span class=\"bibbase_icon_text\">Bibtex</span></a>\n \n \n\n \n \n \n \n \n\n \n <a class=\"bibbase_abstract_link\" href=\"javascript:showAbstract('mendeley_6087108074')\">Abstract</a>\n \n \n</span>\n\n<!-- -->\n<!-- <div id=\"abstract_mendeley_6087108074\"> -->\n<!-- Jamming broadcasting to intentionally interfere with wireless reception, has long been a problem for wireless systems. Recent research demonstrates numerous advances in jamming techniques that increase attack efficiency or reduce the probability an attack will be detected by choosing attack parameters based on a system's configuration. In this work, we extend the attacker's capabilities by modifying the attack parameters in response to the observed performance of the target system, effectively creating a feedback loop in our attack model. This framework allows for more intricate attack models that are tuned online allowing for closer to optimal attacks against legitimate systems. To show the feasibility of the listening and attacking framework we introduce an attack called Self-Tuned, Inference-based, Real-time jamming or STIR-jamming. This attack listens to legitimate communication traffic, infers the systems performance, and optimizes jamming parameters. We propose the two types of STIR-jamming, mSTIR-jamming and tSTIR-jamming, and implement these attacks against an IEEE 802.15.4 link as a case study. With the empirical results, we demonstrate the attack system adapting to various scenarios and finding stable solutions. -->\n<!-- </div> -->\n<!-- -->\n\n</div>\n","downloads":0,"bibbaseid":"debruhl-kim-weinberg-tague-stiringthewirelessmediumwithselftunedinferencebasedrealtimejamming-2012","urls":{"_mendeley":"http://www.mendeley.com/research/stiring-wireless-medium-selftuned-inferencebased-realtime-jamming-2/","Paper":"http://wnss.sv.cmu.edu/papers/mass-12.pdf"},"role":"author","year":"2012","version":"1379770609","url_mendeley":"http://www.mendeley.com/research/stiring-wireless-medium-selftuned-inferencebased-realtime-jamming-2/","url":"http://wnss.sv.cmu.edu/papers/mass-12.pdf","type":"Conference Proceedings","title":"STIR-ing the Wireless Medium with Self-Tuned, Inference-Based, Real-Time Jamming","subdiscipline":"Computer Security","series":"Mobile Ad hoc and Sensor Systems","publisher":"IEEE","pages":"326-334","modified":"1379770609","keywords":"broadcasting, feedback, jamming, probability, radio links, radio reception, real-time systems, telecommunication security, telecommunication traffic, tuning","key":"mendeley_6087108074","isstarred":"0","isread":"1","isauthor":"1","id":"mendeley_6087108074","doi":"10.1109/MASS.2012.6502532","discipline":"Computer and Information Science","deletionpending":"0","citation_key":"DeBruhl2012","canonical_id":"3e02148f-a0a7-4042-848a-a479d3c8102f","booktitle":"Mobile Ad hoc and Sensor Systems","bibtype":"inproceedings","bibtex":"@inproceedings{ mendeley_6087108074,\n isauthor = {1},\n abstract = {Jamming broadcasting to intentionally interfere with wireless reception, has long been a problem for wireless systems. Recent research demonstrates numerous advances in jamming techniques that increase attack efficiency or reduce the probability an attack will be detected by choosing attack parameters based on a system's configuration. In this work, we extend the attacker's capabilities by modifying the attack parameters in response to the observed performance of the target system, effectively creating a feedback loop in our attack model. This framework allows for more intricate attack models that are tuned online allowing for closer to optimal attacks against legitimate systems. To show the feasibility of the listening and attacking framework we introduce an attack called Self-Tuned, Inference-based, Real-time jamming or STIR-jamming. This attack listens to legitimate communication traffic, infers the systems performance, and optimizes jamming parameters. We propose the two types of STIR-jamming, mSTIR-jamming and tSTIR-jamming, and implement these attacks against an IEEE 802.15.4 link as a case study. With the empirical results, we demonstrate the attack system adapting to various scenarios and finding stable solutions.},\n canonical_id = {3e02148f-a0a7-4042-848a-a479d3c8102f},\n added = {1378849008},\n year = {2012},\n keywords = {broadcasting, feedback, jamming, probability, radio links, radio reception, real-time systems, telecommunication security, telecommunication traffic, tuning},\n isstarred = {0},\n id = {6087108074},\n discipline = {Computer and Information Science},\n series = {Mobile Ad hoc and Sensor Systems},\n title = {STIR-ing the Wireless Medium with Self-Tuned, Inference-Based, Real-Time Jamming},\n deletionpending = {0},\n version = {1379770609},\n type = {Conference Proceedings},\n url_mendeley = {http://www.mendeley.com/research/stiring-wireless-medium-selftuned-inferencebased-realtime-jamming-2/},\n isread = {1},\n author = {Bruce {DeBruhl} and Yu Seung {Kim} and Zachary {Weinberg} and Patrick {Tague}},\n pages = {326-334 },\n publisher = {IEEE},\n doi = {10.1109/MASS.2012.6502532},\n url = {http://wnss.sv.cmu.edu/papers/mass-12.pdf},\n modified = {1379770609},\n citation_key = {DeBruhl2012},\n booktitle = {Mobile Ad hoc and Sensor Systems},\n subdiscipline = {Computer Security}\n}","author_short":["DeBruhl, B.","Kim, Y.<nbsp>S.","Weinberg, Z.","Tague, P."],"author":["DeBruhl, Bruce","Kim, Yu Seung","Weinberg, Zachary","Tague, Patrick"],"added":"1378849008","abstract":"Jamming broadcasting to intentionally interfere with wireless reception, has long been a problem for wireless systems. Recent research demonstrates numerous advances in jamming techniques that increase attack efficiency or reduce the probability an attack will be detected by choosing attack parameters based on a system's configuration. In this work, we extend the attacker's capabilities by modifying the attack parameters in response to the observed performance of the target system, effectively creating a feedback loop in our attack model. This framework allows for more intricate attack models that are tuned online allowing for closer to optimal attacks against legitimate systems. To show the feasibility of the listening and attacking framework we introduce an attack called Self-Tuned, Inference-based, Real-time jamming or STIR-jamming. This attack listens to legitimate communication traffic, infers the systems performance, and optimizes jamming parameters. We propose the two types of STIR-jamming, mSTIR-jamming and tSTIR-jamming, and implement these attacks against an IEEE 802.15.4 link as a case study. With the empirical results, we demonstrate the attack system adapting to various scenarios and finding stable solutions."},"bibtype":"inproceedings","biburl":"http://www.bibbase.org/mendeley/adadd28dd6","downloads":0,"search_terms":["stir","ing","wireless","medium","self","tuned","inference","based","real","time","jamming","debruhl","kim","weinberg","tague"],"title":"STIR-ing the Wireless Medium with Self-Tuned, Inference-Based, Real-Time Jamming","year":2012,"dataSources":["qo5PjPaEkJ4REgfb5"]}