Server and Clients Node Capture Attacks

In this project, we addressed the mitigation of control channel jamming by malicious colluding insiders and compromised system users as well as the identification of compromised users without prior knowledge of the number of compromised users in the system. We mapped the problem of control channel access that is robust to jamming by compromised users to the problem of secure key establishment under node capture attacks. Based on the mapping, we proposed a framework for control channel access schemes using random key assignment.

We proposed and evaluated metrics for resilience and delay which quantify the availability of control messages under control channel jamming attacks. In future work, we will investigate modifications to the adversary’s jamming strategy and the effect on the availability of control messages and the ability to identify compromised users.