Entry Pietro:2015:SGE from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Pietro:2015:SGE,
  author =       "Roberto {Di Pietro} and Gabriele Oligeri",
  title =        "Silence is Golden: Exploiting Jamming and Radio
                 Silence to Communicate",
  journal =      j-TISSEC,
  volume =       "17",
  number =       "3",
  pages =        "9:1--9:??",
  month =        mar,
  year =         "2015",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2699906",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Fri Mar 27 17:03:46 MDT 2015",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "Jamming techniques require only moderate resources to
                 be deployed, while their effectiveness in disrupting
                 communications is unprecedented. In this article, we
                 introduce several contributions to jamming mitigation.
                 In particular, we introduce a novel adversary model
                 that has both (unlimited) jamming reactive capabilities
                 as well as powerful (but limited) proactive jamming
                 capabilities. Under this adversary model, to the best
                 of our knowledge more powerful than any other adversary
                 model addressed in the literature, the communication
                 bandwidth provided by current anti-jamming solutions
                 drops to zero. We then present Silence is Golden (SiG):
                 a novel anti-jamming protocol that, introducing a
                 tunable, asymmetric communication channel, is able to
                 mitigate the adversary capabilities, enabling the
                 parties to communicate. For instance, with SiG it is
                 possible to deliver a 128-bits-long message with a
                 probability greater than 99\% in 4096 time slots
                 despite the presence of a jammer that jams all
                 on-the-fly communications and 74\% of the silent radio
                 spectrum-while competing proposals simply fail.
                 Moreover, when SiG is used in a scenario in which the
                 adversary can jam only a subset of all the available
                 frequencies, performance experiences a boost: a
                 128-bits-long message is delivered within just 17 time
                 slots for an adversary able to jam 90\% of the
                 available frequencies. We present a thorough
                 theoretical analysis for the solution, which is
                 supported by extensive simulation results, showing the
                 viability of our proposal.",
  acknowledgement = ack-nhfb,
  articleno =    "9",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

Related entries