
Indication of Attacker or Jammer in IEEE 802.11-18/0539r0 Document
Explore the proposed methods for detecting attackers or jammers in wireless communication systems outlined in the IEEE 802.11-18/0539r0 document by Feng Jiang et al. The document suggests utilizing a parameter field in the LMR frame to indicate the presence of potential threats, enabling prompt action by both initiator and responder in maintaining security.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
March 2018 doc.: IEEE 802.11-18/0539r0 Existence Indication of Attacker or Jammer in LMR Date: 2018-03-06 Name Feng Jiang Affiliations Address Intel Phone Email 3600 Juliette Ln, Santa Clara, CA 95054 feng1.jiang@intel.com Qinghua Li Jonathan Segev Robert Stacey Intel Intel Intel qinghua.li@intel.com jonathan.segev@intel.com robert.stacey@intel.com Feng Jiang, et al, Intel Corporation Feng Jiang, et al, Intel Corporation Submission Slide 1
March 2018 doc.: IEEE 802.11-18/0539r0 Introduction In 11az PHY security mode, methods are proposed for interference detection The repeated LTF symbols for consistency check Energy detector for detecting replay attacker Attacker or jammer significantly degrade the ToA estimation accuracy, and the polluted ToA estimations should be discarded. For security protection, the wireless ranging may be disabled. When initiator or responder detects the attacker or jammer, it s necessary for the other side to be notified, such that both sides can behave properly. In this submission, we propose to define a parameter field in the LMR frame to indicate the existence of the attacker or jammer. Feng Jiang, et al, Intel Corporation Feng Jiang, et al, Intel Corporation Submission 2
March 2018 doc.: IEEE 802.11-18/0539r0 Definition of the New Indication Field in LMR Option 1: Add a new information field in the LMR Option 2: Use reserved bits in the ToA error field The Bit B5 can be used for interference indication Only valid for the security mode Feng Jiang, et al, Intel Corporation Feng Jiang, et al, Intel Corporation Submission 3
March 2018 doc.: IEEE 802.11-18/0539r0 Usage Example for Immediate LMR When attacker or jammer is detected, the responder sets the existence indication field in the immediate LMR to notify the initiator. Similar rule applied to bidirectional LMR and MU measurement sequence. Feng Jiang, et al, Intel Corporation Feng Jiang, et al, Intel Corporation Submission 4
March 2018 doc.: IEEE 802.11-18/0539r0 Usage Example for Delayed LMR For delayed LMR, if attacker or jammer is detected, the responder will set the existence indication of attacker or jammer for the previous round measurement. Similar rule applied to bidirectional LMR and MU measurement sequence. Feng Jiang, et al, Intel Corporation Feng Jiang, et al, Intel Corporation Submission 5
March 2018 doc.: IEEE 802.11-18/0539r0 Straw Poll #1 Do you support to indicate an invalid measurement in LMR frame? Y: N: A: Feng Jiang, et al, Intel Corporation Feng Jiang, et al, Intel Corporation Submission 6
March 2018 doc.: IEEE 802.11-18/0539r0 Motion #1 We agree to include an invalid measurement indication in LMR. Y: N: A: Feng Jiang, et al, Intel Corporation Feng Jiang, et al, Intel Corporation Submission 7