A Combined Approach for Distinguishing Different Types of Jamming Attacks Against Wireless Networks
|
|
- Rachel Golden
- 6 years ago
- Views:
Transcription
1 A Combined Approach for Distinguishing Different Types of Jamming Attacks Against Wireless Networks Le Wang, Alexander M. Wyglinski Wireless Innovation Laboratory Department of Electrical and Computer Engineering Worcester Polytechnic Institute, Worcester, MA , USA { lewang, alexw}@wpi.edu Abstract In this paper, we devised a Combined approach to distinguish different types of jamming attacks against wireless networks.based on the shared characteristics of the wireless medium, a wireless network can be easily affected by jamming attacks, which is one of the most effective forms of denial-ofservice (DoS) attacks against this type of networking architecture. Attacks can be implemented by either corrupting the operations of the medium access control (MAC) protocols or transmitting large amounts of interfering wireless signals without obeying the MAC protocols. Most jamming detection approaches cannot provide an effective way for differentiating between the various categories of jamming attacks. To enable the network to perform defense strategies more effectively, distinguishing the type of different jamming attacks is necessary. In this paper, we improve existing jamming detection approaches by using a novel statistical model and evaluate it both theoretically and experimentally. We begin by combining two existing jamming detection methods together to sort the jamming types roughly. Then, based on the statistical data of Packets Send Ratio (PSR) and Packets Delivery Ratio (PDR) in different jamming situations, we built a model to further subdivide the jamming attacks. Finally, we evaluate our proposed strategy using the ns-2 simulation platform. From the simulation results, we can observe the combined jamming detection technology can achieve a higher accuracy when distinguishing the types of jamming attacks. Index Terms DoS, PSR, PDR Wireless Network,Jamming Attacks. I. INTRODUCTION Wireless networks have already grown considerably and will certainly go on doing so, consequently the security and secrecy has become a critical issue especially in the military. To prevent people from communicating with each other, jamming the communication channel is one of the most efficient way and easy to implement. Wireless networks, however adopting the common are as the channel, are more susceptible to be disruptive than those who communicate based on a wire channel such as TP (twist pairs), coaxial cable and fiber. Usually, denial of service aims at filling user-domain and kernel-demain buffers. [6].Because of the shared characteristics, an adversary called Jammer can easily interfere the wireless communication channel using RF technologies either by transmitting a great deal of unmeaning signal disregarding MAC protocols or using valid signal to treat MAC protocols. A variety of jamming attacks can be performed in order to interfere the wireless communication channel.the most efficient attacks can be reduce into four type [1]: Constant Jammer: Continually send random and meaningless signal to the channel disregarding the MAC protocols. Deceptive Jammer: Continually injects valid packets which means a valid packet header with a useless payload or even no payload to the channel with no gap between packets. Random Jammer: Alternate between jamming and sleeping mode. In brief, the jammer perform constant jammer or deceptive jammer for a random period then shut down the jammer for another random period of time. The benefit of this jammer is saving energy which is especially important in a war. Reactive Jammer: Stay quiet till there is activity on the channel then devastate the reception. Its target aims at the receiver. Reactive Jammer spent more energy on sensing the channel then corrupted transmitting signal using only a minimum amount of power which brings more imperceptibility. To defend from jammers, the first step is to detect the existence of jammer because many other factors can also result in the similar appearance like jammer performed such as low SNR (Signal Noise Ratio), battery running out of power or receiver moving out of the range. A lot of detection methods have been proposed such as Signal Strength detection, Carrier sensing time detection and PDR (Packets Delivery Ratio) detection, however each of which has their own weak point. The current state of art is Signal Strength Consistency Checks which can differentiate jamming from normal signals. However, the only problem of Strength Consistency Checks is it can not differentiate between the various categories of jamming attacks. To enable the network to perform defense strategies more effectively such as saving power or quickly enough reaction, distinguishing the type of different jamming attacks is necessary.
2 Fig. 1. Network Layers Fig. 2. Hidden station problem In this paper we present a combined approach by using statistical model between PSR (Packets Sending Ratio) and PDR (Packet Delivery Ratio) to compensate this drawback. To explain the procedure more explicitly, we divide the procedure into two steps. We begin by comparing the correlation between Signal Strength (SS) and PDR to determine jamming attacks exist. Then, based on the statistical data of PSR and PDR in different jamming situations, we further subdivide the jamming attacks. The rest of the paper is organized as follows: Section II presents the MAC sublayer protocol of wireless networks and the concept of PDR and PSR. In section III, we introduce the correlation between PSR and PDR used in our proposed method to differentiate Jamming attack types. The simulation models and results are given in Section IV. Finally, we summarize the main contribution of our work and its perspectives in section V. II. BACKGROUND To reduce the design complexity, the networks are usually differentiated by layers. Each layer is in charge of different functions.see Fig[1]. As the noise exists in the common channel, messages cannot be sent from one node to another directly. Once some part of the message was damaged by disturbing, a duplicate message has to be retransmitted, which cost a long delay and huge bandwidth will waste. Under the circumstances, Data Link Layer was designed to solve the problem by further breaking up the segments received from network layer into data frames (usually hundreds of bytes) and transmit the frames sequentially through the channel. The shared nature of channel demands a necessary mechanism to control access to the channel. A sublayer of data link layer, the Medium Access Control (MAC) Sublayer, determines which frame goes next on a multi-access channel. One of the basic protocols is Carrier Sense Multiple Access (CSMA) protocol. When a node has frame to send,it has to sense the channel to see if the channel is idle first. If the channel is busy, the node will stay quiet and keep sensing the channel periodically. Once the node detects an idle channel, it will transmit frames with a probability of P (p belongs to (0-1)). This is one of the weaknesses of MAC Sublayer protocol which can be used by jammer to conduct deceptive jamming attack. If a jammer keep transmitting a valid frame, according to the protocol, the nodes at each end of the channel will stay quiet without sending any frames. If a collision occurs, either by two nodes transmitting frames simultaneously or corrupting frames by jammers, the nodes will abruptly stop transmitting as long as the collision is detected so as to saving time and bandwidth. This this the famous CSMA/CD protocol which can be widely used on Ethernet LAN but not suitable for wireless networks. [5] In wireless networks, what really matters is the situation of receiver instead of condition of the transmitter compared to wired networks. Before starting a transmission, a node has to decide if whether the receiver is idle or not. In wired networks, transmission can only be taken place simultaneously in channel such as twisted pair or coaxial, which is how CSMA/CD works properly. In wireless networks based on radio waves, however, multiple transmissions may occur at the same time. Hidden station problem Consider Fig[2],where node A B C are illustrated. The circle means the range of each node.in Fig[2],node B is in the range of C while C is out of the range of A.If A is communicating with B while C is trying to contact B at the same time, C will sense the channel between B and C is idle.c will send frames to B without knowing B is busy with A.In this situation,frames sent from C will corrupt the frames between A and B. Exposed station problem Consider Fig[3],where node A B C D are illustrated. B is communicating with A while C can only know that B is sending frames.due to the carrier sensing protocol,c will stay quiet to prevent from interfering with the transmission by B.Consequently,the communication between C and D,which will not interfere the communication between A and B actually,has to be canceled.one may conduct the MAC sublayer to increase network resources even if not a jamming attack. [4]
3 Fig. 5. Basic Jamming Attack Model Fig. 4. Fig. 3. Exposed station problem RTS/CTS standard of CSMA/CA As CSMA/CD cannot perform satisfied, a new approach called CSMA/CA was implemented.see Fig[4]. Before a communication channel was established,node A sends a frame named Request to Send(RTS) to Node B which informs B that A has messages to transmit.b will reply a Clear to Send(CTS) frame back to A which informs that B is clear and ready to receive message.then communication established. [3] A. Current Issues However, CSMA/CA mechanism will not be able to prevent the jammers from carrying out jamming attacks by corrupting RTS/CTS frames or just sending meaningless frames to make collisions.the weaknesses of MAC sublayer in has been revisited by the Australian CERT. [2] III. PROPOSED IMPLEMENTATION In order to understand Jamming attacks better, a basic jamming attack model was set up.see Fig [4]. A is a legitimate transmitting node in the channel while B as the receiver.both of them are within the range of the Jammer which can transmit either regular data keep Node A and B in receiving mode or undesired radio signal corrupting the normal frames between A and B.The former didn t break the CSMA/CA rules because the jammer,named Deceptive Jammer, keeps sending legitimate frames so that A and B will never sense the channel as idle.the latter ignores MAC sublayer protocol by sending junk messages into channel to corrupt normal messages. The MAC sublayer usually set up a fixed threshold. If the received signal is lower than the threshold,mac sublayer protocol will consider this channel as idle.only detecting a signal which is higher than the threshold,can the nodes receive and interpret the signal. To evaluate the efficiency of each, two metrics were proposed. Packets Send Ratio:Packets Send Ratio(PSR)is the ratio of frames(or packets in network layer) that are actually sent into the channel from a normal node compared to frames that are intended to be sent into the channel.for instance, A intends to send y frames to B but only x of y were send out.the PSR will be x y.one of the usual measure methods is tracking the number of frames a node intends to send out and the number of frames it actually sends out then compute the ratio. Packets Delivery Ratio:Packets Delivery Ratio(PDR)is the ratio of the number of frames which the destination(node B in Fig 4)receives successfully compared to the number of frames that have been sent out from source(node A in Fig4). the last instance,y frames were actually sent into the channel, if B finally receives z of them successfully,the PDR would be z y. According to Data link layer protocol,a has to wait to receive the ACK(acknowledgement)frame coming from Node B before it can send next frame. If A cannot receive this ACK frame within some period, a timeout will be counted and A has to resend the same frame till receiving the correct ACK frame. So as long as the ACK frames cannot be received successfully by A, the corresponding message frames cannot be considered sending out correctly.consequently, the PDR can be measured by computing the ratio of the numbers of ACK frames A received from B to the number of frames that A successfully sent out(y).this method can be implemented at transmitter.
4 Fig. 7. Algorithm: PDR SS Detect Jam Fig. 6. Combined Approach for Distinguishing Different Types of Jamming Attacks Another measurement is to compute the ratio of the number of frames received by receiver correctly compared to the numbers of frames that were sent into the channel which can be implemented at the receiver. We carried out four types jamming attacks based on NS platform and the results are as follows: Diagram[1] [1]. TABLE I PSR/PDR IN FOUR JAMMER MODEL PSR (%) PDR (%) Parameter 1 Constant Jammer Ra=38.6cm 2 Deceptive Jammer Ra=38.6cm 3 Random Jammer Ra=38.6cm 4 Reactive Jammer Ra=38.6cm From the data,we can find that nearly all types of jamming attacks will result in a sharp drop of PDR while not all jamming attacks can affect PSR. So detecting and differentiating Jamming attack types is very important. In this chapter we will proposed a combined approach to detect and differentiate jamming attacks in two types. See Fig[6]. Many jamming detection methods have been proposed [8], [10].One of the most efficient one is Signal Strength Consistency Checks(Step 1 in Fig[6]) [1]. The basic idea of this measurement is even in a congestion channel,the PDR measured from receiver is still around 78% meanwhile all kinds of jamming attacks can result a drop of PDR under 10%. However, the problem is many other factors can also result in a low PDR such that Node A ran out of battery or moved out of the range of Node B.In such case, setting up a consistency turns out to be necessary.during the experiments,the dynamic factors such as battery failure and move out of the range will also result in a low Signal Strength.Under this fact, if a drop of PDR as well as a high level signal strength can be measured at the same time, we can see that the channel has been jammed. Check Step 1 in Fig[6]. We first set up threshold 1 for PDR and threshold 2 for signal strength based on the statistics of normal situation.if PDR is no less than thresholds,the channel has not been jammed.on the other hand,compare the current signal strength with threshold 2.If the current signal strength is less than threshold 2,the channel is intact and we need to check other factors such as batteries. Otherwise,we can draw the conclusion that the channel has been jammed.all the procedures can be finished at Node B(i.e. the receiver). After Jamming attack was detected, Node B will send a reminder frame to Node A in another frequency which should has been set up in advance reminding A that the channel has been jammed.this technology is always used in Jammer Defending such as Channel Surfing to avoid Jammer attacks.when A receives this special frame from B, it will further differentiate the type of jammer attacks.check step 2 in Fig[6]. According to the statistics in table1, we set up threshold3 and threshold4. First we compute PSR at Node A and compare it with threshold3. Depending on the result we divided the jamming attacks into two groups,constant Jammer/Deceptive Jammer and Random Jammer/reactive Jammer.For the first group, because of the nature of deceptive attack, Node A will be kept in receiving mode and PSR will be (0%).For the second group, as reactive attack aims at the receiver, the PSR will be nearly (100%). By comparing the value of PSR with threshold, Node A can differentiate the jammer attacks easily. IV. EXPERIMENTATION AND VALIDATION Based on the description above,we propose the detection protocol as follows. To explain it explicitly,the whole process was divided into two parts PDR detection part and PSR differentiation part.recently, some measures have been proposed to protect local services from being exploited by adversaries. [7] For PDR detection, the algorithm is in Fig[7].
5 Fig. 8. Algorithm: PSR Detect Jamtype In the PDRSS Detect Jam algorithm, If a high PDR can be detected, this node is not jammed. However, if the detected PDR is low, another variable,signal strength (SS) has to been measured by function Sample Signal Strength(). This function can be only implemented after the PDR is lower than a threshold which has been set up originally. The function SS ConsistencyCheck() is performed to see if the low PDR is consistent with the signal strength. If a large SS and a low PDR were detected at the same time, this function returns False, else returns True. The result can be found in Fig[8]. During the process, a table (PDR;SS) of packet delivery ratio and signal strength has to be established in advance in a non-jammed scenario. The output is the relationship between PDR and SS from which an upper bound for the maximum signal strength can be calculated. Based on this bound, the (PDR;SS) plane was show as [9] Fig [9] shows the results for different jammers. The upperleft region is the jammed-region.from Fig[8], we can see the jamming situation has been detected successfully. For PSR detection, the algorithm is in Fig[8]. The result can be found in Fig[10]. In the PSR detect Jamtype algorithm,two variables, MaxP- SR and MinPDR,has to be measured simultaneously at sender node. If MaxPSR is less than PSRThresh2 which has been set up in advance, the result can be divided into two groups. By comparing different PDR values with different thresholds, four kinds of jamming attacks can be distinguished explicitly. In Fig[10],different colors represent different jamming attacks.from Fig[10],we can see that the jamming attack types have be differentiated successfully. V. CONCLUSION Wireless networks has been developed into many forms such as ad hoc networks and wireless sensor networks. The shared nature of air channel enable enemy to carry out jamming attacks easily.in these paper, we first focus on the principle of MAC sublayer protocols and explain the process Fig. 9. Fig. 10. The (PDR,SS) measurement The (PDR,PSR) measurement of different jamming attacks.we then introduction one of the most common methods,signal Strength Consistency Checks,by comparing PDR and signal strength to detect the existence of jamming attacks. Finally, to differentiate the jamming attacks types, we showed a new method by comparing PDR and PSR at the sending node.if sending note distinguish the type of jamming attacks successfully, it will send a special signal to receiving node in a special frequency. After know the exact type of jamming attacks, the nodes can implement a more efficient method to defend jammers. [12]
6 A. Future Work When Jamming attacks detection is completed, the information on the jamming types may be used as two parts: jamming defence and jammer localization. Jamming defence was designed to decrease the influence of jamming attacks and keep the communication connected in an jamming area. One of the most popular strategies is Channel Surfing implemented by changing the communication frequency to a range avoiding the interference from the adversary.another methods is Spatial Retreats which can be achieve by moving wireless users to a new area where no interference exists. [11] While the Jamming defence was carrying out, another mechanism named jammer localization may be also implemented at the same time. Jammer localization was designed to lock the position of the jammer. One of the most popular methods is Virtual Force Iterative Localization (VFIL) realized by utilizing the network topology. REFERENCES [1] W. Xu, W. Trappe, Y. Zhang, and T. Wood, The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks,Proc. MobiHoc05, p. 46C57, May 25C27, Urbana-Champaign, IL [2] AusCERT. AA denial of service vulnerability in IEEE wireless devices. [3] R. Bruno, M. Conti, and E. Gregori, IEEE Optimal Performances: RTS/CTS Mechanism vs. Basic Access, PIMRC, 2002 [4] J. Bellardo and S. Savage denial-of-service attacks: Real vulnerabilities and practical solutions. In Proceedings of the USENIX Security Symposium, pages 15-28, 2003 [5] Y. Hu, A. Perrig, and D. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In 8th ACM International Conference on Mobile Computing and Networking, pages 12-23, September 2002 [6] Q. Huang, H. Kobayashi, and B. Liu. Modeling of distributed denial of service attacks in wireless networks. In IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, volume 1, pages 41-44, 2003 [7] Z. Li, W. Trappe, Y. Zhang, and B. Nath. Securing wireless localization: Living with bad guys. In DIMACS Workshop on Mobile and Wireless Security, 2004 [8] G. Noubir and G. Lin. Low-power DoS attacks in data wireless lans and countermeasures. SIGMOBILE Mob. Comput.Commun. Rev., 7(3):29-30, 2003 [9] A. Wood and J. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54-62, October 2002 [10] A. Wood, J. Stankovic, and S. Son. JAM: A jammed-area mapping service for sensor networks. In 24th IEEE Real-Time Systems Symposium, pages , 2003 [11] W. Xu, T. Wood, W. Trappe, and Y. Zhang. Channel surfing and spatial retreats: defenses against wireless denial of service. In Proceedings of the 2004 ACM workshop on Wireless security, pages 80 89, 2004 [12] H. Liu, W. Xu, Y. Chen and Z. Liu. Localizing Jammers in Wireless Networks. In Pervasive Computing and Communications, PerCom 2009, pages 1,2009
Jamming Wireless Networks: Attack and Defense Strategies
Jamming Wireless Networks: Attack and Defense Strategies Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang, WINLAB, Rutgers University IAB, Dec. 6 th, 2005 Roadmap Introduction and Motivation Jammer Models
More informationLightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,
More informationChannel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service
Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang WINLAB, Rutgers University IAB 2004 Roadmap Motivation and Introduction
More informationLOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.955
More informationPrevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods
Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods S.B.Gavali 1, A. K. Bongale 2 and A.B.Gavali 3 1 Department of Computer Engineering, Dr.D.Y.Patil College of Engineering,
More informationWireless Network Security Spring 2012
Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #8 Interference and Jamming Announcements Homework #1 is due today Questions? Not everyone has signed up for a Survey These are required,
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties
More informationMultiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks
Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like
More informationImproving Reliability of Jamming Attack Detection in Ad hoc Networks
Improving Reliability of Jamming Attack Detection in Ad hoc Networks Geethapriya Thamilarasu 1, Sumita Mishra 2 and Ramalingam Sridhar 3 1 State University of New York, Institute of Technology, Utica,
More informationWireless Sensor Networks
DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia June 19, 2007 Wireless
More informationDEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks
DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia Wireless Sensor Networks
More informationAnti-Jamming: A Study
Anti-Jamming: A Study Karthikeyan Mahadevan, Sojeong Hong, John Dullum December 14, 25 Abstract Addressing jamming in wireless networks is important as the number of wireless networks is on the increase.
More informationINTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster
INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise
More informationDetection and Prevention of Physical Jamming Attacks in Vehicular Environment
Detection and Prevention of Physical Jamming Attacks in Vehicular Environment M-Tech Student 1 Mahendri 1, Neha Sawal 2 Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal,
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationPerformance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming Attacks in WLAN
IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 02 July 2016 ISSN (online): 2349-6010 Performance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming
More informationLecture on Sensor Networks
Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU
More informationRandomized Channel Hopping Scheme for Anti-Jamming Communication
Randomized Channel Hopping Scheme for Anti-Jamming Communication Eun-Kyu Lee, Soon Y. Oh, and Mario Gerla Computer Science Department University of California at Los Angeles, Los Angeles, CA, USA {eklee,
More informationCryptography Based Method for Preventing Jamming Attacks in Wireless Network Ms. Bhoomi Patel 1
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 12, 2015 ISSN (online): 2321-0613 Cryptography Based Method for Preventing Jamming Attacks in Wireless Network Ms. Bhoomi
More informationAvoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks
Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks M. KIRAN KUMAR 1, M. KANCHANA 2, I. SAPTHAMI 3, B. KRISHNA MURTHY 4 1, 2, M. Tech Student, 3 Asst. Prof 1, 4, Siddharth Institute
More informationIsolation Mechanism for Jamming Attack in MANET
Isolation Mechanism for Jamming Attack in MANET Aditi 1, Joy Karan Singh 2 1 M.tech Student, Dept. of CSE,CT Institute of Technology & Research, Jalandhar,India 2 Assistant Professor, Dept. of ECE,CT Institute
More informationUNDERSTANDING AND MITIGATING
UNDERSTANDING AND MITIGATING THE IMPACT OF RF INTERFERENCE ON 802.11 NETWORKS RAMAKRISHNA GUMMADI UCS DAVID WETHERALL INTEL RESEARCH BEN GREENSTEIN UNIVERSITY OF WASHINGTON SRINIVASAN SESHAN CMU 1 Presented
More informationMitigating Inside Jammers in Manet Using Localized Detection Scheme
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 7ǁ July 2013 ǁ PP.13-19 Mitigating Inside Jammers in Manet Using Localized Detection
More informationMobile Communications
COMP61242 Mobile Communications Lecture 7 Multiple access & medium access control (MAC) Barry Cheetham 16/03/2018 Lecture 7 1 Multiple access Communication links by wire or radio generally provide access
More informationTIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS
TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University
More informationReliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks
Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks Giuseppe Anastasi Pervasive Computing & Networking Lab () Dept. of Information Engineering, University of Pisa E-mail:
More informationOn Denial of Service Attacks for Wireless Sensor Networks
On Denial of Service Attacks for Wireless Sensor Networks Nischay Bahl of Technology, Jalandhar, India Ajay K. Sharma of Technology, Jalandhar, India Harsh K. Verma of Technology, Jalandhar India ABSTRACT
More informationUsing Channel Hopping to Increase Resilience to Jamming Attacks
Using Channel Hopping to Increase 82.11 Resilience to Jamming Attacks Vishnu Navda, Aniruddha Bohra, Samrat Ganguly NEC Laboratories America {vnavda,bohra,samrat}@nec-labs.com Dan Rubenstein Columbia University
More informationDOPPLER SHIFT. Thus, the frequency of the received signal is
DOPPLER SHIFT Radio Propagation Doppler Effect: When a wave source and a receiver are moving towards each other, the frequency of the received signal will not be the same as the source. When they are moving
More informationOn Practical Selective Jamming of Bluetooth Low Energy Advertising
On Practical Selective Jamming of Bluetooth Low Energy Advertising S. Brauer, A. Zubow, S. Zehl, M. Roshandel, S. M. Sohi Technical University Berlin & Deutsche Telekom Labs Germany Outline Motivation,
More informationEfficient Anti-Jamming Technique Based on Detecting a Hopping Sequence of a Smart Jammer
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 12, Issue 3 Ver. II (May June 2017), PP 118-123 www.iosrjournals.org Efficient Anti-Jamming
More informationA novel jammer detection framework for cluster-based wireless sensor networks
Perumal et al. EURASIP Journal on Wireless Communications and Networking (2016) 2016:35 DOI 10.1186/s13638-016-0528-1 RESEARCH Open Access A novel jammer detection framework for cluster-based wireless
More informationUltra-Low Duty Cycle MAC with Scheduled Channel Polling
Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye and John Heidemann CS577 Brett Levasseur 12/3/2013 Outline Introduction Scheduled Channel Polling (SCP-MAC) Energy Performance Analysis Implementation
More informationWireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN
Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic
More informationControl Channel Jamming: Resilience and Identification of Traitors
Control Channel Jamming: Resilience and Identification of Traitors Agnes Chan, Xin Liu, Guevara Noubir, Bishal Thapa College of Computer and Information Scinece Northeastern University, Boston, MA 02115
More informationTrust Based Suspicious Route Categorization for Wireless Networks and its Applications to Physical Layer Attack S. RAJA RATNA 1, DR. R.
Trust Based Suspicious Route Categorization for Wireless Networks and its Applications to Physical Layer Attack S. RAJA RATNA 1, DR. R. RAVI 2 1 Research Scholar, Department of Computer Science and Engineering,
More informationAn Effective Defensive Node against Jamming Attacks in Sensor Networks
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 6ǁ June. 2013 ǁ PP.41-46 An Effective Defensive Node against Jamming Attacks in Sensor
More informationJamming Attacks with its Various Techniques and AODV in Wireless Networks
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 4 Ver. II (Jul. Aug. 2016), PP 48-52 www.iosrjournals.org Jamming Attacks with its
More informationANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau
ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS Xiaohua Li and Wednel Cadeau Department of Electrical and Computer Engineering State University of New York at Binghamton Binghamton, NY 392 {xli, wcadeau}@binghamton.edu
More informationVulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR
5 th Scandinavian Workshop on Wireless Ad-hoc Networks May 3-4, 2005 Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR Mikael Fredin - Ericsson Microwave Systems, Sweden
More informationUSD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure
USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure An Liu, Peng Ning, Huaiyu Dai, Yao Liu North Carolina State University, Raleigh, NC 27695 {aliu3,
More informationLocal Area Networks NETW 901
Local Area Networks NETW 901 Lecture 2 Medium Access Control (MAC) Schemes Course Instructor: Dr. Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents Why Multiple Access Random Access Aloha Slotted
More informationInterleaving And Channel Encoding Of Data Packets In Wireless Communications
Interleaving And Channel Encoding Of Data Packets In Wireless Communications B. Aparna M. Tech., Computer Science & Engineering Department DR.K.V.Subbareddy College Of Engineering For Women, DUPADU, Kurnool-518218
More informationA Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Networks Using Trigger Identification Service
International Journal of Security, Privacy and Trust Management (IJSPTM) vol 2, No 2, April 2013 A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Networks Using Trigger Identification
More informationUtilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks
Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,
More informationWireless Intro : Computer Networking. Wireless Challenges. Overview
Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional
More informationError Minimizing Jammer Localization Through Smart Estimation of Ambient Noise
Error Minimizing Jammer Localization Through Smart Estimation of Ambient Noise Zhenhua liu, Hongbo Liu, Wenyuan Xu and Yingying Chen Dept. of Computer Science and Engineering, University of South Carolina,
More informationJADE: Jamming-Averse Routing on Cognitive Radio Mesh Networks
JADE: Jamming-Averse Routing on Cognitive Radio Mesh Networks (Invited Paper) Yu Seung Kim, Bruce DeBruhl, and Patrick Tague Carnegie Mellon University Email: {yuseungk, bdebruhl, tague}@cmu.edu Abstract
More informationCS434/534: Topics in Networked (Networking) Systems
CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/
More informationUnderwater Communication in 2.4 Ghz ISM Frequency Band for Submarines
Underwater Communication in 2.4 Ghz ISM Frequency Band for Submarines S.Arulmozhi 1, M.Ashokkumar 2 PG Scholar, Department of ECE, Adhiyamaan College of Engineering, Hosur, Tamilnadu, India 1 Asst. Professor,
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #4 Physical Layer Threats; Jamming 2016 Patrick Tague 1 Class #4 PHY layer basics and threats Jamming 2016 Patrick Tague 2 PHY 2016 Patrick Tague
More informationISSN Vol.06,Issue.09, October-2014, Pages:
ISSN 2348 2370 Vol.06,Issue.09, October-2014, Pages:882-886 www.ijatir.org Wireless Network Packet Classification Selective Jamming Attacks VARTIKA GUPTA 1, M.VINAYA BABU 2 1 PG Scholar, Vishnu Sree Institute
More informationMedium Access Methods. Lecture 9
Medium Access Methods Lecture 9 Medium Access Control Medium Access Control (MAC) is the method that defines a procedure a station should follow when it needs to send a frame or frames. The use of regulated
More informationSimulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool
Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA and Improvement with PCF in TORA using OPNET tool Anupam Sharma, Deepinderjeet Kaur Dhaliwal Desh Bhagat University Mandi Gobindgarh Punjab
More informationIJSER 1. INTRODUCTION 2. ANALYSIS
International Journal of Scientific & Engineering Research, Volume 6, Issue 10, October-2015 1011 Packet-Hiding Methods for Preventing Selective Jamming Attacks Guttula Pavani Abstract The open nature
More informationChapter 1 Basic concepts of wireless data networks (cont d.)
Chapter 1 Basic concepts of wireless data networks (cont d.) Part 4: Wireless network operations Oct 6 2004 1 Mobility management Consists of location management and handoff management Location management
More informationADAPTIVE FORWARDING RATE CONTROL FOR NETWORK CODING IN TACTICAL MANETS
The Military Communications Conference - Unclassified Program - Networking Protocols and Performance Track ADAPTIVE FORWARDING RATE CONTROL FOR NETWORK CODING IN TACTICAL MANETS Soon Y. Oh UtopiaCompression
More informationDepartment of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.
Department of Computer Science and Engineering CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009 Final Examination Instructions: Examination time: 180 min. Print your name
More informationWireless Networked Systems
Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense
More informationFPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL
U.P.B. Sci. Bull., Series C, Vol. 79, Iss. 4, 2017 ISSN 2286-3540 FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL Xu ZHI 1, Ding HONGWEI 2, Liu LONGJUN 3, Bao LIYONG 4,
More information1 Interference Cancellation
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.829 Fall 2017 Problem Set 1 September 19, 2017 This problem set has 7 questions, each with several parts.
More informationLiving with Interference in Unmanaged Wireless. Environments. Intel Research & University of Washington
Living with Interference in Unmanaged Wireless Environments David Wetherall, Daniel Halperin and Tom Anderson Intel Research & University of Washington This talk 1. The problem: inefficient spectrum scheduling
More informationCognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks
Cognitive Wireless Network 15-744: Computer Networking L-19 Cognitive Wireless Networks Optimize wireless networks based context information Assigned reading White spaces Online Estimation of Interference
More informationLiterature Survey on Jamming Attack in Wireless Adhoc Network
Literature Survey on Jamming Attack in Wireless Adhoc Network Pinal Rupani Computer Engineering Department V.V.P. Engineering College, Rajkot Gujarat, India Prof. Naren Tada Computer Engineering Department
More informationAll Your Jammers Belong To Us - Localization of Wireless Sensors Under Jamming Attack
All Your ammers Belong To Us - Localization of Wireless Sensors Under amming Attack Yu Seung Kim, Frank Mokaya, Eric Chen, and Patrick Tague Electrical and Computer Engineering Carnegie Mellon University
More informationDDRS algorithm over DoS Attack in Wireless Communication Due to Jammers Prof. Bhaumik Machhi 1
Impact Factor (SJIF): 3.632 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 (Special Issue for ITECE 2016) DDRS algorithm over DoS Attack
More informationComputer Networks. Week 03 Founda(on Communica(on Concepts. College of Information Science and Engineering Ritsumeikan University
Computer Networks Week 03 Founda(on Communica(on Concepts College of Information Science and Engineering Ritsumeikan University Agenda l Basic topics of electromagnetic signals: frequency, amplitude, degradation
More information/13/$ IEEE
A Game-Theoretical Anti-Jamming Scheme for Cognitive Radio Networks Changlong Chen and Min Song, University of Toledo ChunSheng Xin, Old Dominion University Jonathan Backens, Old Dominion University Abstract
More informationFTSP Power Characterization
1. Introduction FTSP Power Characterization Chris Trezzo Tyler Netherland Over the last few decades, advancements in technology have allowed for small lowpowered devices that can accomplish a multitude
More informationMohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2
AN ATTEMPT TO FIND A SOLUTION FOR DESTRUCTING JAMMING PROBLEMS USING GAME THERORITIC ANALYSIS Abstract Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 1 P. G Scholar, E-mail: ghowsegk2326@gmail.com 2 Assistant
More informationPartial overlapping channels are not damaging
Journal of Networking and Telecomunications (2018) Original Research Article Partial overlapping channels are not damaging Jing Fu,Dongsheng Chen,Jiafeng Gong Electronic Information Engineering College,
More informationMinimization of Jamming Attack in Wireless Broadcast Networks Using Neighboring Node Technique
International Journal of Scientific and Research Publications, Volume 2, Issue 5, May 2012 1 Minimization of Jamming Attack in Wireless Broadcast Networks Using Neighboring Node Technique R.Priyadarshini,
More informationEnergy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks
Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer
More informationDetermining the position of a jammer using a virtual-force iterative approach
Wireless Netw (2) 7:53 547 DOI.7/s276--295-6 Determining the position of a jammer using a virtual-force iterative approach Hongbo Liu Zhenhua Liu Yingying Chen Wenyuan Xu Published online: 23 October 2
More information6.1 Multiple Access Communications
Chap 6 Medium Access Control Protocols and Local Area Networks Broadcast Networks: a single transmission medium is shared by many users. ( Multiple access networks) User transmissions interfering or colliding
More informationPolitecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer
Politecnico di Milano Advanced Network Technologies Laboratory Beyond Standard 802.15.4 MAC Sublayer MAC Design Approaches o Conten&on based n Allow collisions n O2en CSMA based (SMAC, STEM, Z- MAC, GeRaF,
More informationA Wireless Communication System using Multicasting with an Acknowledgement Mark
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 07, Issue 10 (October. 2017), V2 PP 01-06 www.iosrjen.org A Wireless Communication System using Multicasting with an
More informationExperimental study of the effects of Transmission Power Control and Blacklisting in Wireless Sensor Networks
Experimental study of the effects of Transmission Power Control and Blacklisting in Wireless Sensor Networks Dongjin Son, Bhaskar Krishnamachari and John Heidemann Presented by Alexander Lash CS525M Introduction
More informationAn Ultrasonic Sensor Based Low-Power Acoustic Modem for Underwater Communication in Underwater Wireless Sensor Networks
An Ultrasonic Sensor Based Low-Power Acoustic Modem for Underwater Communication in Underwater Wireless Sensor Networks Heungwoo Nam and Sunshin An Computer Network Lab., Dept. of Electronics Engineering,
More informationOn the Effects of Node Density and Duty Cycle on Energy Efficiency in Underwater Networks
On the Effects of Node Density and Duty Cycle on Energy Efficiency in Underwater Networks Francesco Zorzi, Milica Stojanovic and Michele Zorzi Dipartimento di Ingegneria dell Informazione, Università degli
More informationSpectrum Sensing Brief Overview of the Research at WINLAB
Spectrum Sensing Brief Overview of the Research at WINLAB P. Spasojevic IAB, December 2008 What to Sense? Occupancy. Measuring spectral, temporal, and spatial occupancy observation bandwidth and observation
More informationPreamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks
Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks Abdelmalik Bachir, Martin Heusse, and Andrzej Duda Grenoble Informatics Laboratory, Grenoble, France Abstract. In preamble
More informationSyed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University
Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous
More informationBlock diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E
Performance Analysis of IEEE. Distributed Coordination Function in Presence of Hidden Stations under Non-saturated Conditions with in Radio-over-Fiber Wireless LANs Amitangshu Pal and Asis Nasipuri Electrical
More informationLower Layers PART1: IEEE and the ZOLERTIA Z1 Radio
Slide 1 Lower Layers PART1: IEEE 802.15.4 and the ZOLERTIA Z1 Radio Jacques Tiberghien Kris Steenhaut Remark: all numerical data refer to the parameters defined in IEEE802.15.4 for 32.5 Kbytes/s transmission
More informationA survey on broadcast protocols in multihop cognitive radio ad hoc network
A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels
More informationA Novel Error Minimizing Framework Better Location Estimation in Wireless Networks
A Novel Error Minimizing Framework Better Location Estimation in Wireless Networks Mooda Yakanna M.Tech Student, Mr.Syed Mazharuddin Assistant Professor, Mrs. M.Jhansi Lakshmi Associate professor & HOD,
More informationDistance-Aware Virtual Carrier Sensing for Improved Spatial Reuse in Wireless Networks
Distance-Aware Virtual Carrier Sensing for mproved Spatial Reuse in Wireless Networks Fengji Ye and Biplab Sikdar Department of ECSE, Rensselaer Polytechnic nstitute Troy, New York 8 Abstract n this paper
More informationLecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage
Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based
More informationINTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)
INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN ISSN 0976 6464(Print)
More informationBadri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004
Secure Localization Services Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 24 badri@cs.rutgers.edu Importance of localization
More informationDenial of Service Attacks in Wireless Networks: The case of Jammers
Denial of Service Attacks in Wireless Networks: The case of Jammers Konstantinos Pelechrinis and Marios Iliofotou Department of Computer Science and Engineering UC Riverside, Riverside CA 92521 {kpele,marios}@cs.ucr.edu
More informationANTI-JAMMING BROADCAST COMMUNICATION USING UNCOORDINATED FREQUENCY HOPPING
ANTI-JAMMING BROADCAST COMMUNICATION USING UNCOORDINATED FREQUENCY HOPPING P.MANJULA 1, S.SHARMILA 2 1&2 Assistant Professor, Veltech Multitech Engg College ABSTRACT This paper proposes a technique called
More informationUnderstanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø
Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification
More informationA Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks
A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu
More informationMedium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller
Wireless Networks: Medium Access Control Guevara Noubir Slides adapted from Mobile Communications by J. Schiller S200, COM3525 Wireless Networks Lecture 4, Motivation Can we apply media access methods
More information