Int J Performability Eng ›› 2012, Vol. 8 ›› Issue (2): 173-182.doi: 10.23940/ijpe.12.2.p173.mag

• Original articles • Previous Articles     Next Articles

Long PN Code Based Traceback in Wireless Networks

XIAN PAN1, JUNWEI HUANG1, ZHEN LING2, BIN LU3, and XINWEN FU1   

  1. 1 University of Massachusetts Lowell, Lowell, MA 01854, U.S.A.
    2 Southeast University, China
    3 West Chester University, West Chester, PA 19383, U.S.A.

Abstract:

Cyber criminals may abuse open wireless networks or those with weak encryption for cyber crimes. To locate such criminals, law enforcement has to first identify which mobile (MAC) is generating suspect traffic behind a wireless router. The challenge is how to correlate the private wireless traffic and the identified suspect public traffic on the Internet. In this paper, we propose a new technique called long Pseudo-Noise (PN) code based Direct Sequence Spread Spectrum (DSSS) flow marking technique for invisibly tracing suspect anonymous wireless flows. In this technique, a long PN code is shared by two investigators, interferer and sniffer. Different bits of the signal will be encoded with different segments of the long PN code. By interfering with a sender's traffic and marginally varying its rate, interferer can embed a secret spread spectrum signal into the sender's traffic. By tracing where the embedded signal goes, sniffer can trace the sender and receiver of the suspect flow despite the use of anonymous encrypted wireless networks. Traffic embedded with long PN code modulated watermarks is much harder to detect. We have conducted extensive analysis and experiments to show the effectiveness of this new technique. We are able to prove that existing detection approaches cannot detect the long PN code modulated traffic. The technique is generic and has broad usage.


Received on October 1, 2010, revised on March 25, 2011
References: 17