I played with games like that too :)

One option I looked at was to obfuscate the MAC addresses based on ASN
(http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/netahtml/srchnum.htm&r=1&f=G&l=50&s1=%279,883,382%27.PN.&OS=PN/9,883,382&RS=PN/9,883,382)

Another was to swap transmissions happening at a same time so an attacker who 
knows the hopping sequence could not interfere with the same cell over and over 
at PHY layer
(http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=/netahtml/srchnum.htm&r=1&f=G&l=50&s1=%279,673,856%27.PN.&OS=PN/9,673,856&RS=PN/9,673,856)

I also tried to use the channel swapping technique to avoid frequencies that 
are bad for certain pairs (swap around interference) but never found the time 
to dig and publish.

This shows the richness of TSCH I guess : )

Regards,

Pascal

Le 29 juin 2018 à 19:55, Keoma 
<[email protected]<mailto:[email protected]>> a écrit :

Hi,

I am very happy to read your draft as I a was recently thinking about
building such a jammer.

Just being a french chauvinist:
randez-vous cells -> rendez-vous cells

Thank you,

On 6/29/18 6:09 PM, Marco Tiloca wrote:
Hi all,

We have just submitted a new draft proposing a security solution to
protect 6TiSCH networks from selective jamming.

Feedback and comments are of course very welcome. Thanks a lot!

Best,
/Marco


-------- Forwarded Message --------
Subject:    New Version Notification for
draft-tiloca-6tisch-robust-scheduling-00.txt
Date:    Fri, 29 Jun 2018 08:55:12 -0700
From:    [email protected]<mailto:[email protected]>
To:    Marco Tiloca <[email protected]<mailto:[email protected]>>, Gianluca 
Dini
<[email protected]<mailto:[email protected]>>, Simon Duquennoy 
<[email protected]<mailto:[email protected]>>



A new version of I-D, draft-tiloca-6tisch-robust-scheduling-00.txt
has been successfully submitted by Marco Tiloca and posted to the
IETF repository.

Name:        draft-tiloca-6tisch-robust-scheduling
Revision:    00
Title:        Robust scheduling against selective jamming in 6TiSCH networks
Document date:    2018-06-29
Group:        Individual Submission
Pages:        12
URL:            
https://www.ietf.org/internet-drafts/draft-tiloca-6tisch-robust-scheduling-00.txt
Status:         
https://datatracker.ietf.org/doc/draft-tiloca-6tisch-robust-scheduling/
Htmlized:       
https://tools.ietf.org/html/draft-tiloca-6tisch-robust-scheduling-00
Htmlized:       
https://datatracker.ietf.org/doc/html/draft-tiloca-6tisch-robust-scheduling


Abstract:
  This document defines a method to generate robust TSCH schedules in a
  6TiSCH (IPv6 over the TSCH mode of IEEE 802.15.4-2015) network, so as
  to protect network nodes against selective jamming attack.  Network
  nodes independently compute the new schedule at each slotframe, by
  altering the one originally available from 6top or alternative
  protocols, while preserving a consistent and collision-free
  communication pattern.  This method can be added on top of the
  minimal security framework for 6TiSCH.




Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at 
tools.ietf.org<http://tools.ietf.org>.

The IETF Secretariat


_______________________________________________
6tisch mailing list
[email protected]<mailto:[email protected]>
https://www.ietf.org/mailman/listinfo/6tisch


_______________________________________________
6tisch mailing list
[email protected]<mailto:[email protected]>
https://www.ietf.org/mailman/listinfo/6tisch
_______________________________________________
6tisch mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/6tisch

Reply via email to