Typical wireless communication networks provide and maintain a plurality of data communication channels, and one or more control channels. The control channels may present attractive targets to adversaries seeking to undermine the communication networks. If such adversaries may jam or otherwise interfere with the operations of the control channels, the adversaries may deny network services to legitimate users.
It should be appreciated that this Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to limit the scope of the claimed subject matter.
This description discusses probabilistic mitigation of control channel jamming via random key distribution in wireless communications networks. The description provides computer-based methods that generate random cryptographic keys, and send the keys to client devices. These methods may send channel locator functions to the client devices, which may use the channel locator functions to locate particular control channels, using the random keys as input. The tools may provide additional computer-based methods that receive the keys and the channel locator functions from base stations within the networks. The tools may also provide key distribution systems for operation within the networks, with these systems generating representations of the keys, and associating the keys respectively with control channel locations. These systems may allocate and send the keys to subscriber devices within the network, may define timeslots within the networks, and may allocate the keys to respective timeslots.
The features, functions, and advantages discussed herein may be achieved independently in various embodiments of the present description or may be combined in yet other embodiments, further details of which can be seen with reference to the following description and drawings.
The following detailed description discloses various tools and techniques for probabilistic mitigation of control channel jamming via random key distribution. This description proceeds with reference to various drawings, and to numerals appearing within the drawings. The first digit within a given reference numeral indicates the drawing in which that numeral first appears.
These servers 102 may communicate with any number of client devices 104, with
In the example shown in
These servers 102 and the client devices 104 may communicate via one or more instances of wireless communication networks, denoted generally at 108. More specifically, standards and/or protocols governing communications between the servers 102 and 104 may define one or more communication channels 110 by which the base stations and client devices may communicate via the network. One non-limiting example of such standards or protocols is the global system for mobile communications (GSM). For ease of description and illustration,
Turning to the communication channels 110 in more detail, these channels may include at least one or more instances of data channels 112 and at least one or more instances of control channels 114. The particular number of data channels and control channels may vary in different implementations, according to which standard or protocol is in place. Assuming an illustrative GSM implementation, the control channels 114 may include a dedicated uplink control channel (e.g., random-access channel (RACH)).
In general, the data channels 112 may transmit voice or data (which may be digitized into packets or other suitable structures for transmission) between client devices and these servers. The control channels 114 may support a wide variety of services, including for example propagating network topology for routing, control access to services for which the subscribers have enrolled, or the like. For example, the servers may coordinate with system subscribers over a variety of control channels to perform access control, traffic channel allocation, handing calls from station-to-station, and any number of other functions. In many wireless networks, the control channels, and data transmitted thereon, may serve as a platform on which higher-level protocols are built.
In some instances, an adversary may disable the functionality of the overall systems 100 by attacking and disabling the control channels 114, and thereby may deny services to the subscribers 106. However, the description herein provides various tools and techniques for mitigating the consequences of such attacks, and providing improved resiliency to the systems 100 as a whole, as now described in more detail.
Turning to the base stations/servers 102 in more detail, these may include one or more processors 116, which may have a particular type or architecture, chosen as appropriate for particular implementations. The processors 116 may couple to one or more bus systems 118 that are chosen for compatibility with the processors 116.
The servers 102 may include one or more instances of computer-readable storage media 120, which couple to the bus systems 118. The bus systems may enable the processors 116 to read code and/or data to/from the computer-readable storage media 120. The media 120 may represent storage elements implemented using any suitable technology, including but not limited to semiconductors, magnetic materials, optics, or the like. The media 120 may include memory components, whether classified as random-access memory (RAM), read-only memory (ROM), flash, or other types, and may also represent hard disk drives.
The storage media 120 may include one or more modules 122 of instructions that, when loaded into the processor 116 and executed, cause the server 102 to execute the various tools and techniques described herein for probabilistic mitigation of control channel jamming via random key distribution. These modules may implement the various algorithms and data flows described and illustrated herein, to the extent that the servers 102 may perform various aspects of those algorithms and data flows.
Turning now to the client devices 104 in more detail, these may include one or more processors 124, which may have a particular type or architecture, chosen as appropriate for particular implementations. The processors 124 may or may not be same type and/or architecture as the processor 116 shown in the base stations. The processors 124 may couple to one or more bus systems 126 that are chosen for compatibility with the processors 124.
The devices 104 may include one or more instances of computer-readable storage media 128, which couple to the bus systems 126. The bus systems may enable the processors 124 to read code and/or data to/from the computer-readable storage media 128. The media 128 may represent storage elements implemented using any suitable technology, including but not limited to semiconductors, magnetic materials, optics, or the like. The media 128 may include memory components, whether classified as RAM, ROM, flash, or other types, and may also represent hard disk drives.
The storage media 128 may include one or more modules 130 of instructions that, when loaded into the processor 116 and executed, cause the device 104 to execute the various tools and techniques described herein for probabilistic mitigation of control channel jamming via random key distribution. These modules may implement the various algorithms and data flows described and illustrated herein, to the extent that the devices 104 may perform various aspects of those algorithms and data flows.
Having described the overall systems 100, the discussion now proceeds to a description of illustrative process and data flows for probabilistic mitigation of control channel jamming via a random key distribution. This discussion is now presented with
Beginning at the base station, block 202 represents generating and assigning one or more random keys to be associated with client devices. As described in further detail below in
Block 204 represents sending one or more instances of the random keys to one or more client devices 104.
At the client devices, block 208 represents receiving one or more random keys 206 from the servers. Block 208 may include storing the random keys 206 for later reference. For example, block 208 may include storing the random keys into the media elements 128 shown in
Returning to the server 102, block 210 represents sending a representation of a function for locating control channels to one or more of the client devices 104.
Turning to the client device, block 214 represents receiving the channel locator function 212. In turn, having received the random key 206 and the channel locator function 212, the client device may now compute locations of control channels. Block 216 generally represents the client computing the location of the control channel, using the locator function 218 and an input random key 220.
Returning briefly to the server, block 224 represents computing locations of control channels. On the server side,
In the example shown in
In the example shown, block 304 represents inserting the input control information into the control channel, whose location 230 was calculated in block 224.
On the device side, block 216 may calculate the location 222 (located in terms of frequency and time), using the locator function 218 and the random key 220. Block 308 represents retrieving the control information from the calculated location 222 within the control channel 114. More specifically, block 308 may include retrieving or extracting the control information that the server previously inserted into the control channel.
For ease of illustration,
Having described the process and data flows in
Referring first to the lower portion of
Generally, time is assumed to be slotted into a set of p time slots that are repeated periodically, such that at time n, users may access control channels within i≡n (mod p). Locations of the control channels may be arbitrarily located in time and frequency. Moreover, the time duration of a particular packet of control information is assumed to be negligible compared to overall duration of a timeslot.
Servers may transmit a common control packet over all control channels in a period of p time slots. To enable control channel hiding, both servers and users may locate control channels within a given time slot by using a control channel locator function (e.g., 218 and 226, as described above). More formally, the locator function may be expressed as ƒ(kil, n), where kil represents a control channel identifier that uniquely identifies the lth control channel in time slot i, and where n represents the current time, such that i≡n (mod p).
Referring to the upper portion of
In turn, different instances of these control channels within a given time slot (e.g., 406b) may be associated with different keys that are unique within the given timeslot.
A given wireless communications network may generally include M mobile wireless users or subscribers using respective instances of the client devices 104.
The lower part of
Before turning to a detailed description of random key distribution in
For purposes of this description, the effect of internal and external adversaries on the scheme for accessing the control channel may be indistinguishable. Accordingly, for ease of discussion, this description combines both internal and external adversaries into a common adversary model. Users who are either malicious insiders or who have been compromised by an external adversary are referred to herein as compromised users. More formally, this description refers to the set of such compromised users as C. This discussion proceeds under the assumption that adversaries will jam every control channel that can be located using the keys held by compromised users. The ability for a set of compromised users to locate and jam a set of control channels depends on the control channel locator function ƒ described above. Beginning with
For the purposes of this description, the p time slots in each period are assumed to be independent. Thus, this discussion describes representative processing for a single time slot, with the understanding that implementations could similarly process any number of other such independent timeslots.
For the purposes of this description, the right node set in
To facilitate the description below, Table 1 below provides the following summary of notation:
Having established the above notational scheme, let Ki={ki0, . . . , ki(qi−1)} denote the set of qi control channel keys used to locate the qi control channels in slot i. The sets Ki are assumed to be pairwise disjoint. The key distribution system 508 may assign users j ∈ {0, . . . , N−1} a subset Sij ⊂ Ki of mi control channel keys for particular slots i denoted Sij={sij(0), . . . , sij(m
As denoted at 510, the key distribution system 508 may randomly select the subsets of keys Sij for each slot i from Ki, while probabilistically controlling the number λ(kil) of subsets that contain given particular keys kil.
The environment shown in
Performance Analysis
The performance of random control channel key distribution schemes in the framework of
A. Resilience To Compromised Users
The performance of a distribution schemes for random control channel keys can be evaluated in terms of the ability for a given user to access a control channel that is not jammed by compromised users. The probabilistic metric of resilience to compromised users is thus defined as follows. Define rji(c) as the probability that a given user j may access, in a time slot i, a control channel that is not jammed by any of the c compromised users. This is equivalent to the probability that user j has a control channel key in Ki that is not held by any of the c compromised users, given by:
The resilience for user j is then defined as the probability rji(c) that user j can access a least one control channel in p slots that are not jammed by the c compromised users, given by:
The resilience can be averaged over all users j∈ {0, . . . , N−1} and expressed as r(c). The intermediate step of computing rji(c) is provided by Lemma 1.
Lemma 1: The probability rji(c) can be approximated as
Proof: The probability rji(c) given in (1) can be written as:
Since λ(sij(m)) users hold the key sij(m), the probability that a compromised user does not hold sij(m) is:
and substitution of (5) into (4) completes the proof.
The resilience rj (c) for user j can be computed using (2) and the result of Lemma 1. The average resilience for any user in the system can then be computed using Theorem 2 as follows:
Theorem 2: The average resilience r(c) for c=|C| compromised users can be approximated as:
Where μi is the expected value of λ(sij(m)) according to a probability distribution Pi(λ).
Proof: The result is obtained from (2) and Lemma 1 by replacing each λ(sij(m)) with its expected value μi.
When qi=q and mi=m for all i, the resilience r(c) in Theorem 2 takes the form
The above analysis yields the average resilience probability taken over all sets of compromised users C such that |C|=c and does not assume that the adversary has any knowledge about the keys assigned to particular users.
B. Identification of Compromised Users
Implementations of the tools and techniques for resilient control channel access may provide the ability for servers to identify the set of compromised users in a centralized manner. Assuming that the server maintains a record of the sets Sij and can detect jamming, it may be possible to identify the set of compromised users, revoke them from the system, and update the remaining users with fresh keys. However, if all the keys held by a valid user are held by compromised users, the valid user may be falsely accused and revoked from the system, characterized probabilistically as follows.
Let ρj (c) represent the probability that user j is falsely accused by the centralized server, when there are c compromised users. Assuming that one or more adversaries jam all accessible channels, the probability of false accusation is the complement of the resilience probability rj(c) for user j. Hence, the probability ρj(c) can be approximated using the results of Lemma 1 and Theorem 2.
When qi=q and mi=m for all i, the false accusation probability ρ(c) can be approximated using Theorem 2 as:
Given the probabilities r(c) and ρ(c)=1−r(c), the probability distribution of the number M(c) a falsely accused users can be computed as a function of the number of compromised users c as follows.
Theorem 3: The probability that M(c)=η of the (N−c) valid users are falsely accused when there are c compromised users is approximated as:
Proof This result follows by treating each false accusation as a Bernoulli random variable with probability ρ(c)=1−r(c), yielding the desired binomial representation.
The result of theorem three can be used to evaluate further metrics of false accusation, such as the expected number of falsely accused users (given by the mean of the distribution), or the probability that the c compromised users are uniquely identified (given by Pr[M(c)=0]).
C. Delay
When there are compromised users in the system and a fraction of the available control channels have been jammed, a user may wait for multiple timeslots before an accessible channel is available. In light of such possible circumstances, this discussion proceeds with a description of distribution user delay as a function of the number of compromised users c.
With probability 1−rj(c), every control channel that a user j can locate would be jammed, and the user j would be unable to access a control channel, corresponding to an infinite delay. However, with probability rj(c), the user j would have a finite delay of 0 to (p−1) timeslots. Thus, the discussion proceeds to compute the conditional delay of user j given that the delay is finite.
Suppose that a user j ∉ C attempts to access a control channel at time n, but that the next accessible control channel is not available to the user j until time n′, n≦n′≦n+p−1. The delay for user j at time n is thus defined as dj(c,n)=n′−n. Note that n and n′ may exist in adjacent periods of the control channel access scheme, corresponding to reception of distinct control packets. The distribution of this user delay may be characterized as follows.
Lemma 4: The probability distribution Pr[dj(c,n)=δ] of delay for user j is given by:
where γ is a normalization constant that may cause the probability to sum to 1 over all δ∈{0, . . . , p−1}.
Proof: The probability that user j would wait δ time steps before a channel is available is the probability that there is no channel available at times n, . . . , n+δ−1 and that there is a channel available at time n+δ. For each n′, the probability that there is not a channel available is (1−rjn′ mod p(c)), and the probability that there is a channel available is rjn′ mod p(c).
When qi=q and mi=m for all i, the slot-specific resilience probabilities rji(c) for all i will be equal, and the delay distribution will not depend on n on average. The delay can further be averaged over all users j ∉ C as d(c) as follows:
Theorem 5: The average delay d(c) when qi=q and mi=m satisfies the probability distribution
Where r0(c) is the slot-specific resilience for each of the p timeslots obtained by averaging rj0 (c) over all users j.
Proof: Since qi=q and mi=m, these slot-specific resilience rji(c) is equal for all i, and can be replaced in the result of Lemma 4 by rj0 (c). Averaging over all users j ∉ C effectively replaces each rj0(c) with r0(c). The normalization constant γ=1/r(c) is computed algebraically using the fact that the summation of Pr[d(c)=δ] is a finite geometric sum.
The results of Lemma 4 and Theorem 5 characterizing user delay can then be used to study delay characteristics. For example, the expected value of the delay distribution may yield the expected average delay D(c) experienced by users in the system, as a function of the number of compromised users c. In a more specific example, the graph below illustrates relationships between the numbers of compromised users and resulting average delay, with the parameters N=100, q=8, and m=2, with N representing the number of users, q representing the total number of keys allocated per slot, and m representing the number of keys allocated to each user. Graph 1, shown at 600 in
Discussion and Observations
The framework for random control channel key distribution as described above, and the related performance analysis, can be used to design control channel key distribution schemes with a variety of application- and platform-specific details. As compared to previous approaches that feature deterministic schemes, the frameworks described herein exhibit less dependence between the parameters p, qi, and mi≦qi in a random control channel key distribution scheme. In implementations of the framework described herein, various trade-offs can be identified relating the efficiency or overhead of the control channel access protocol any resilience to compromised users. In the interest of conciseness, this description identifies these trade-offs as follows:
Variations on Number of Slots: As seen in Lemma 1 and Theorem 2, an increase in the number of slots p may lead to an exponential improvement in the resilience to attack. However, this increase may also lead to a linear increase in key storage for the user devices and for the system servers. In addition, if there are a large number of compromised users, the average delay between receiving successive control packets may increase linearly with p, as seen in Graph 1 above.
Variations on the Number of Keys: The resilience probability given in Theorem 2 and the definition μi=Nmi/qi suggests that increasing both mi and qi by a constant multiple a does not change μi, yielding an exponential improvement in resilience to compromised users. Hence, a linear increase in both user and server storage may lead to an exponential improvement in resilience. This may also increase the total number of control channels and, thus, may increase system overhead.
Graph 2, shown at 700 in
The subject matter described above is provided by way of illustration only and does not limit possible implementations. Various modifications and changes may be made to the subject matter described herein without following the example embodiments and applications illustrated and described, and without departing from the true spirit and scope of the present description, which is set forth in the following claims.
Number | Name | Date | Kind |
---|---|---|---|
20020147906 | Lotspiech et al. | Oct 2002 | A1 |
20030065747 | Sakamoto et al. | Apr 2003 | A1 |
20040091116 | Staddon et al. | May 2004 | A1 |
20050108309 | Tsuboka et al. | May 2005 | A1 |
20050141706 | Regli et al. | Jun 2005 | A1 |
20080187136 | Zhang et al. | Aug 2008 | A1 |
Entry |
---|
Chan, Agnes; Liu, Xin; Noubir, Guevara; Thapa, Bishal; “Control Channel Jamming: Resilience and Identification of Traitors”, In Proc. IEEE International Symposium on Information Theory, Nice, France, Jun. 2007. |
Chan, et al., Abstract Paper entitled “Control Channel Jamming: Resilience and Identification of Traitors,” College of Computer and Information Science, Northeastern University, Boston, MA; 5 pages. |
Chan, et al. Abstract Paper entitled “Random Key Predistribution Schemes for Sensor Networks,” Carnegie Mellon University; 17 pages. |
Number | Date | Country | |
---|---|---|---|
20090220092 A1 | Sep 2009 | US |