A Combined Approach for Distinguishing Different Types of Jamming Attacks Against Wireless Networks

Size: px
Start display at page:

Download "A Combined Approach for Distinguishing Different Types of Jamming Attacks Against Wireless Networks"

Transcription

1 A Combined Approach for Distinguishing Different Types of Jamming Attacks Against Wireless Networks Le Wang, Alexander M. Wyglinski Wireless Innovation Laboratory Department of Electrical and Computer Engineering Worcester Polytechnic Institute, Worcester, MA , USA { lewang, alexw}@wpi.edu Abstract In this paper, we devised a Combined approach to distinguish different types of jamming attacks against wireless networks.based on the shared characteristics of the wireless medium, a wireless network can be easily affected by jamming attacks, which is one of the most effective forms of denial-ofservice (DoS) attacks against this type of networking architecture. Attacks can be implemented by either corrupting the operations of the medium access control (MAC) protocols or transmitting large amounts of interfering wireless signals without obeying the MAC protocols. Most jamming detection approaches cannot provide an effective way for differentiating between the various categories of jamming attacks. To enable the network to perform defense strategies more effectively, distinguishing the type of different jamming attacks is necessary. In this paper, we improve existing jamming detection approaches by using a novel statistical model and evaluate it both theoretically and experimentally. We begin by combining two existing jamming detection methods together to sort the jamming types roughly. Then, based on the statistical data of Packets Send Ratio (PSR) and Packets Delivery Ratio (PDR) in different jamming situations, we built a model to further subdivide the jamming attacks. Finally, we evaluate our proposed strategy using the ns-2 simulation platform. From the simulation results, we can observe the combined jamming detection technology can achieve a higher accuracy when distinguishing the types of jamming attacks. Index Terms DoS, PSR, PDR Wireless Network,Jamming Attacks. I. INTRODUCTION Wireless networks have already grown considerably and will certainly go on doing so, consequently the security and secrecy has become a critical issue especially in the military. To prevent people from communicating with each other, jamming the communication channel is one of the most efficient way and easy to implement. Wireless networks, however adopting the common are as the channel, are more susceptible to be disruptive than those who communicate based on a wire channel such as TP (twist pairs), coaxial cable and fiber. Usually, denial of service aims at filling user-domain and kernel-demain buffers. [6].Because of the shared characteristics, an adversary called Jammer can easily interfere the wireless communication channel using RF technologies either by transmitting a great deal of unmeaning signal disregarding MAC protocols or using valid signal to treat MAC protocols. A variety of jamming attacks can be performed in order to interfere the wireless communication channel.the most efficient attacks can be reduce into four type [1]: Constant Jammer: Continually send random and meaningless signal to the channel disregarding the MAC protocols. Deceptive Jammer: Continually injects valid packets which means a valid packet header with a useless payload or even no payload to the channel with no gap between packets. Random Jammer: Alternate between jamming and sleeping mode. In brief, the jammer perform constant jammer or deceptive jammer for a random period then shut down the jammer for another random period of time. The benefit of this jammer is saving energy which is especially important in a war. Reactive Jammer: Stay quiet till there is activity on the channel then devastate the reception. Its target aims at the receiver. Reactive Jammer spent more energy on sensing the channel then corrupted transmitting signal using only a minimum amount of power which brings more imperceptibility. To defend from jammers, the first step is to detect the existence of jammer because many other factors can also result in the similar appearance like jammer performed such as low SNR (Signal Noise Ratio), battery running out of power or receiver moving out of the range. A lot of detection methods have been proposed such as Signal Strength detection, Carrier sensing time detection and PDR (Packets Delivery Ratio) detection, however each of which has their own weak point. The current state of art is Signal Strength Consistency Checks which can differentiate jamming from normal signals. However, the only problem of Strength Consistency Checks is it can not differentiate between the various categories of jamming attacks. To enable the network to perform defense strategies more effectively such as saving power or quickly enough reaction, distinguishing the type of different jamming attacks is necessary.

2 Fig. 1. Network Layers Fig. 2. Hidden station problem In this paper we present a combined approach by using statistical model between PSR (Packets Sending Ratio) and PDR (Packet Delivery Ratio) to compensate this drawback. To explain the procedure more explicitly, we divide the procedure into two steps. We begin by comparing the correlation between Signal Strength (SS) and PDR to determine jamming attacks exist. Then, based on the statistical data of PSR and PDR in different jamming situations, we further subdivide the jamming attacks. The rest of the paper is organized as follows: Section II presents the MAC sublayer protocol of wireless networks and the concept of PDR and PSR. In section III, we introduce the correlation between PSR and PDR used in our proposed method to differentiate Jamming attack types. The simulation models and results are given in Section IV. Finally, we summarize the main contribution of our work and its perspectives in section V. II. BACKGROUND To reduce the design complexity, the networks are usually differentiated by layers. Each layer is in charge of different functions.see Fig[1]. As the noise exists in the common channel, messages cannot be sent from one node to another directly. Once some part of the message was damaged by disturbing, a duplicate message has to be retransmitted, which cost a long delay and huge bandwidth will waste. Under the circumstances, Data Link Layer was designed to solve the problem by further breaking up the segments received from network layer into data frames (usually hundreds of bytes) and transmit the frames sequentially through the channel. The shared nature of channel demands a necessary mechanism to control access to the channel. A sublayer of data link layer, the Medium Access Control (MAC) Sublayer, determines which frame goes next on a multi-access channel. One of the basic protocols is Carrier Sense Multiple Access (CSMA) protocol. When a node has frame to send,it has to sense the channel to see if the channel is idle first. If the channel is busy, the node will stay quiet and keep sensing the channel periodically. Once the node detects an idle channel, it will transmit frames with a probability of P (p belongs to (0-1)). This is one of the weaknesses of MAC Sublayer protocol which can be used by jammer to conduct deceptive jamming attack. If a jammer keep transmitting a valid frame, according to the protocol, the nodes at each end of the channel will stay quiet without sending any frames. If a collision occurs, either by two nodes transmitting frames simultaneously or corrupting frames by jammers, the nodes will abruptly stop transmitting as long as the collision is detected so as to saving time and bandwidth. This this the famous CSMA/CD protocol which can be widely used on Ethernet LAN but not suitable for wireless networks. [5] In wireless networks, what really matters is the situation of receiver instead of condition of the transmitter compared to wired networks. Before starting a transmission, a node has to decide if whether the receiver is idle or not. In wired networks, transmission can only be taken place simultaneously in channel such as twisted pair or coaxial, which is how CSMA/CD works properly. In wireless networks based on radio waves, however, multiple transmissions may occur at the same time. Hidden station problem Consider Fig[2],where node A B C are illustrated. The circle means the range of each node.in Fig[2],node B is in the range of C while C is out of the range of A.If A is communicating with B while C is trying to contact B at the same time, C will sense the channel between B and C is idle.c will send frames to B without knowing B is busy with A.In this situation,frames sent from C will corrupt the frames between A and B. Exposed station problem Consider Fig[3],where node A B C D are illustrated. B is communicating with A while C can only know that B is sending frames.due to the carrier sensing protocol,c will stay quiet to prevent from interfering with the transmission by B.Consequently,the communication between C and D,which will not interfere the communication between A and B actually,has to be canceled.one may conduct the MAC sublayer to increase network resources even if not a jamming attack. [4]

3 Fig. 5. Basic Jamming Attack Model Fig. 4. Fig. 3. Exposed station problem RTS/CTS standard of CSMA/CA As CSMA/CD cannot perform satisfied, a new approach called CSMA/CA was implemented.see Fig[4]. Before a communication channel was established,node A sends a frame named Request to Send(RTS) to Node B which informs B that A has messages to transmit.b will reply a Clear to Send(CTS) frame back to A which informs that B is clear and ready to receive message.then communication established. [3] A. Current Issues However, CSMA/CA mechanism will not be able to prevent the jammers from carrying out jamming attacks by corrupting RTS/CTS frames or just sending meaningless frames to make collisions.the weaknesses of MAC sublayer in has been revisited by the Australian CERT. [2] III. PROPOSED IMPLEMENTATION In order to understand Jamming attacks better, a basic jamming attack model was set up.see Fig [4]. A is a legitimate transmitting node in the channel while B as the receiver.both of them are within the range of the Jammer which can transmit either regular data keep Node A and B in receiving mode or undesired radio signal corrupting the normal frames between A and B.The former didn t break the CSMA/CA rules because the jammer,named Deceptive Jammer, keeps sending legitimate frames so that A and B will never sense the channel as idle.the latter ignores MAC sublayer protocol by sending junk messages into channel to corrupt normal messages. The MAC sublayer usually set up a fixed threshold. If the received signal is lower than the threshold,mac sublayer protocol will consider this channel as idle.only detecting a signal which is higher than the threshold,can the nodes receive and interpret the signal. To evaluate the efficiency of each, two metrics were proposed. Packets Send Ratio:Packets Send Ratio(PSR)is the ratio of frames(or packets in network layer) that are actually sent into the channel from a normal node compared to frames that are intended to be sent into the channel.for instance, A intends to send y frames to B but only x of y were send out.the PSR will be x y.one of the usual measure methods is tracking the number of frames a node intends to send out and the number of frames it actually sends out then compute the ratio. Packets Delivery Ratio:Packets Delivery Ratio(PDR)is the ratio of the number of frames which the destination(node B in Fig 4)receives successfully compared to the number of frames that have been sent out from source(node A in Fig4). the last instance,y frames were actually sent into the channel, if B finally receives z of them successfully,the PDR would be z y. According to Data link layer protocol,a has to wait to receive the ACK(acknowledgement)frame coming from Node B before it can send next frame. If A cannot receive this ACK frame within some period, a timeout will be counted and A has to resend the same frame till receiving the correct ACK frame. So as long as the ACK frames cannot be received successfully by A, the corresponding message frames cannot be considered sending out correctly.consequently, the PDR can be measured by computing the ratio of the numbers of ACK frames A received from B to the number of frames that A successfully sent out(y).this method can be implemented at transmitter.

4 Fig. 7. Algorithm: PDR SS Detect Jam Fig. 6. Combined Approach for Distinguishing Different Types of Jamming Attacks Another measurement is to compute the ratio of the number of frames received by receiver correctly compared to the numbers of frames that were sent into the channel which can be implemented at the receiver. We carried out four types jamming attacks based on NS platform and the results are as follows: Diagram[1] [1]. TABLE I PSR/PDR IN FOUR JAMMER MODEL PSR (%) PDR (%) Parameter 1 Constant Jammer Ra=38.6cm 2 Deceptive Jammer Ra=38.6cm 3 Random Jammer Ra=38.6cm 4 Reactive Jammer Ra=38.6cm From the data,we can find that nearly all types of jamming attacks will result in a sharp drop of PDR while not all jamming attacks can affect PSR. So detecting and differentiating Jamming attack types is very important. In this chapter we will proposed a combined approach to detect and differentiate jamming attacks in two types. See Fig[6]. Many jamming detection methods have been proposed [8], [10].One of the most efficient one is Signal Strength Consistency Checks(Step 1 in Fig[6]) [1]. The basic idea of this measurement is even in a congestion channel,the PDR measured from receiver is still around 78% meanwhile all kinds of jamming attacks can result a drop of PDR under 10%. However, the problem is many other factors can also result in a low PDR such that Node A ran out of battery or moved out of the range of Node B.In such case, setting up a consistency turns out to be necessary.during the experiments,the dynamic factors such as battery failure and move out of the range will also result in a low Signal Strength.Under this fact, if a drop of PDR as well as a high level signal strength can be measured at the same time, we can see that the channel has been jammed. Check Step 1 in Fig[6]. We first set up threshold 1 for PDR and threshold 2 for signal strength based on the statistics of normal situation.if PDR is no less than thresholds,the channel has not been jammed.on the other hand,compare the current signal strength with threshold 2.If the current signal strength is less than threshold 2,the channel is intact and we need to check other factors such as batteries. Otherwise,we can draw the conclusion that the channel has been jammed.all the procedures can be finished at Node B(i.e. the receiver). After Jamming attack was detected, Node B will send a reminder frame to Node A in another frequency which should has been set up in advance reminding A that the channel has been jammed.this technology is always used in Jammer Defending such as Channel Surfing to avoid Jammer attacks.when A receives this special frame from B, it will further differentiate the type of jammer attacks.check step 2 in Fig[6]. According to the statistics in table1, we set up threshold3 and threshold4. First we compute PSR at Node A and compare it with threshold3. Depending on the result we divided the jamming attacks into two groups,constant Jammer/Deceptive Jammer and Random Jammer/reactive Jammer.For the first group, because of the nature of deceptive attack, Node A will be kept in receiving mode and PSR will be (0%).For the second group, as reactive attack aims at the receiver, the PSR will be nearly (100%). By comparing the value of PSR with threshold, Node A can differentiate the jammer attacks easily. IV. EXPERIMENTATION AND VALIDATION Based on the description above,we propose the detection protocol as follows. To explain it explicitly,the whole process was divided into two parts PDR detection part and PSR differentiation part.recently, some measures have been proposed to protect local services from being exploited by adversaries. [7] For PDR detection, the algorithm is in Fig[7].

5 Fig. 8. Algorithm: PSR Detect Jamtype In the PDRSS Detect Jam algorithm, If a high PDR can be detected, this node is not jammed. However, if the detected PDR is low, another variable,signal strength (SS) has to been measured by function Sample Signal Strength(). This function can be only implemented after the PDR is lower than a threshold which has been set up originally. The function SS ConsistencyCheck() is performed to see if the low PDR is consistent with the signal strength. If a large SS and a low PDR were detected at the same time, this function returns False, else returns True. The result can be found in Fig[8]. During the process, a table (PDR;SS) of packet delivery ratio and signal strength has to be established in advance in a non-jammed scenario. The output is the relationship between PDR and SS from which an upper bound for the maximum signal strength can be calculated. Based on this bound, the (PDR;SS) plane was show as [9] Fig [9] shows the results for different jammers. The upperleft region is the jammed-region.from Fig[8], we can see the jamming situation has been detected successfully. For PSR detection, the algorithm is in Fig[8]. The result can be found in Fig[10]. In the PSR detect Jamtype algorithm,two variables, MaxP- SR and MinPDR,has to be measured simultaneously at sender node. If MaxPSR is less than PSRThresh2 which has been set up in advance, the result can be divided into two groups. By comparing different PDR values with different thresholds, four kinds of jamming attacks can be distinguished explicitly. In Fig[10],different colors represent different jamming attacks.from Fig[10],we can see that the jamming attack types have be differentiated successfully. V. CONCLUSION Wireless networks has been developed into many forms such as ad hoc networks and wireless sensor networks. The shared nature of air channel enable enemy to carry out jamming attacks easily.in these paper, we first focus on the principle of MAC sublayer protocols and explain the process Fig. 9. Fig. 10. The (PDR,SS) measurement The (PDR,PSR) measurement of different jamming attacks.we then introduction one of the most common methods,signal Strength Consistency Checks,by comparing PDR and signal strength to detect the existence of jamming attacks. Finally, to differentiate the jamming attacks types, we showed a new method by comparing PDR and PSR at the sending node.if sending note distinguish the type of jamming attacks successfully, it will send a special signal to receiving node in a special frequency. After know the exact type of jamming attacks, the nodes can implement a more efficient method to defend jammers. [12]

6 A. Future Work When Jamming attacks detection is completed, the information on the jamming types may be used as two parts: jamming defence and jammer localization. Jamming defence was designed to decrease the influence of jamming attacks and keep the communication connected in an jamming area. One of the most popular strategies is Channel Surfing implemented by changing the communication frequency to a range avoiding the interference from the adversary.another methods is Spatial Retreats which can be achieve by moving wireless users to a new area where no interference exists. [11] While the Jamming defence was carrying out, another mechanism named jammer localization may be also implemented at the same time. Jammer localization was designed to lock the position of the jammer. One of the most popular methods is Virtual Force Iterative Localization (VFIL) realized by utilizing the network topology. REFERENCES [1] W. Xu, W. Trappe, Y. Zhang, and T. Wood, The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks,Proc. MobiHoc05, p. 46C57, May 25C27, Urbana-Champaign, IL [2] AusCERT. AA denial of service vulnerability in IEEE wireless devices. [3] R. Bruno, M. Conti, and E. Gregori, IEEE Optimal Performances: RTS/CTS Mechanism vs. Basic Access, PIMRC, 2002 [4] J. Bellardo and S. Savage denial-of-service attacks: Real vulnerabilities and practical solutions. In Proceedings of the USENIX Security Symposium, pages 15-28, 2003 [5] Y. Hu, A. Perrig, and D. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In 8th ACM International Conference on Mobile Computing and Networking, pages 12-23, September 2002 [6] Q. Huang, H. Kobayashi, and B. Liu. Modeling of distributed denial of service attacks in wireless networks. In IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, volume 1, pages 41-44, 2003 [7] Z. Li, W. Trappe, Y. Zhang, and B. Nath. Securing wireless localization: Living with bad guys. In DIMACS Workshop on Mobile and Wireless Security, 2004 [8] G. Noubir and G. Lin. Low-power DoS attacks in data wireless lans and countermeasures. SIGMOBILE Mob. Comput.Commun. Rev., 7(3):29-30, 2003 [9] A. Wood and J. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54-62, October 2002 [10] A. Wood, J. Stankovic, and S. Son. JAM: A jammed-area mapping service for sensor networks. In 24th IEEE Real-Time Systems Symposium, pages , 2003 [11] W. Xu, T. Wood, W. Trappe, and Y. Zhang. Channel surfing and spatial retreats: defenses against wireless denial of service. In Proceedings of the 2004 ACM workshop on Wireless security, pages 80 89, 2004 [12] H. Liu, W. Xu, Y. Chen and Z. Liu. Localizing Jammers in Wireless Networks. In Pervasive Computing and Communications, PerCom 2009, pages 1,2009

Jamming Wireless Networks: Attack and Defense Strategies

Jamming Wireless Networks: Attack and Defense Strategies Jamming Wireless Networks: Attack and Defense Strategies Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang, WINLAB, Rutgers University IAB, Dec. 6 th, 2005 Roadmap Introduction and Motivation Jammer Models

More information

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,

More information

Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service

Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang WINLAB, Rutgers University IAB 2004 Roadmap Motivation and Introduction

More information

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.955

More information

Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods

Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods S.B.Gavali 1, A. K. Bongale 2 and A.B.Gavali 3 1 Department of Computer Engineering, Dr.D.Y.Patil College of Engineering,

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #8 Interference and Jamming Announcements Homework #1 is due today Questions? Not everyone has signed up for a Survey These are required,

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties

More information

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like

More information

Improving Reliability of Jamming Attack Detection in Ad hoc Networks

Improving Reliability of Jamming Attack Detection in Ad hoc Networks Improving Reliability of Jamming Attack Detection in Ad hoc Networks Geethapriya Thamilarasu 1, Sumita Mishra 2 and Ramalingam Sridhar 3 1 State University of New York, Institute of Technology, Utica,

More information

Wireless Sensor Networks

Wireless Sensor Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia June 19, 2007 Wireless

More information

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia Wireless Sensor Networks

More information

Anti-Jamming: A Study

Anti-Jamming: A Study Anti-Jamming: A Study Karthikeyan Mahadevan, Sojeong Hong, John Dullum December 14, 25 Abstract Addressing jamming in wireless networks is important as the number of wireless networks is on the increase.

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

Detection and Prevention of Physical Jamming Attacks in Vehicular Environment

Detection and Prevention of Physical Jamming Attacks in Vehicular Environment Detection and Prevention of Physical Jamming Attacks in Vehicular Environment M-Tech Student 1 Mahendri 1, Neha Sawal 2 Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal,

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

Performance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming Attacks in WLAN

Performance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming Attacks in WLAN IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 02 July 2016 ISSN (online): 2349-6010 Performance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU

More information

Randomized Channel Hopping Scheme for Anti-Jamming Communication

Randomized Channel Hopping Scheme for Anti-Jamming Communication Randomized Channel Hopping Scheme for Anti-Jamming Communication Eun-Kyu Lee, Soon Y. Oh, and Mario Gerla Computer Science Department University of California at Los Angeles, Los Angeles, CA, USA {eklee,

More information

Cryptography Based Method for Preventing Jamming Attacks in Wireless Network Ms. Bhoomi Patel 1

Cryptography Based Method for Preventing Jamming Attacks in Wireless Network Ms. Bhoomi Patel 1 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 12, 2015 ISSN (online): 2321-0613 Cryptography Based Method for Preventing Jamming Attacks in Wireless Network Ms. Bhoomi

More information

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks M. KIRAN KUMAR 1, M. KANCHANA 2, I. SAPTHAMI 3, B. KRISHNA MURTHY 4 1, 2, M. Tech Student, 3 Asst. Prof 1, 4, Siddharth Institute

More information

Isolation Mechanism for Jamming Attack in MANET

Isolation Mechanism for Jamming Attack in MANET Isolation Mechanism for Jamming Attack in MANET Aditi 1, Joy Karan Singh 2 1 M.tech Student, Dept. of CSE,CT Institute of Technology & Research, Jalandhar,India 2 Assistant Professor, Dept. of ECE,CT Institute

More information

UNDERSTANDING AND MITIGATING

UNDERSTANDING AND MITIGATING UNDERSTANDING AND MITIGATING THE IMPACT OF RF INTERFERENCE ON 802.11 NETWORKS RAMAKRISHNA GUMMADI UCS DAVID WETHERALL INTEL RESEARCH BEN GREENSTEIN UNIVERSITY OF WASHINGTON SRINIVASAN SESHAN CMU 1 Presented

More information

Mitigating Inside Jammers in Manet Using Localized Detection Scheme

Mitigating Inside Jammers in Manet Using Localized Detection Scheme International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 7ǁ July 2013 ǁ PP.13-19 Mitigating Inside Jammers in Manet Using Localized Detection

More information

Mobile Communications

Mobile Communications COMP61242 Mobile Communications Lecture 7 Multiple access & medium access control (MAC) Barry Cheetham 16/03/2018 Lecture 7 1 Multiple access Communication links by wire or radio generally provide access

More information

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University

More information

Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks

Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks Reliable and Energy-Efficient Data Delivery in Sparse WSNs with Multiple Mobile Sinks Giuseppe Anastasi Pervasive Computing & Networking Lab () Dept. of Information Engineering, University of Pisa E-mail:

More information

On Denial of Service Attacks for Wireless Sensor Networks

On Denial of Service Attacks for Wireless Sensor Networks On Denial of Service Attacks for Wireless Sensor Networks Nischay Bahl of Technology, Jalandhar, India Ajay K. Sharma of Technology, Jalandhar, India Harsh K. Verma of Technology, Jalandhar India ABSTRACT

More information

Using Channel Hopping to Increase Resilience to Jamming Attacks

Using Channel Hopping to Increase Resilience to Jamming Attacks Using Channel Hopping to Increase 82.11 Resilience to Jamming Attacks Vishnu Navda, Aniruddha Bohra, Samrat Ganguly NEC Laboratories America {vnavda,bohra,samrat}@nec-labs.com Dan Rubenstein Columbia University

More information

DOPPLER SHIFT. Thus, the frequency of the received signal is

DOPPLER SHIFT. Thus, the frequency of the received signal is DOPPLER SHIFT Radio Propagation Doppler Effect: When a wave source and a receiver are moving towards each other, the frequency of the received signal will not be the same as the source. When they are moving

More information

On Practical Selective Jamming of Bluetooth Low Energy Advertising

On Practical Selective Jamming of Bluetooth Low Energy Advertising On Practical Selective Jamming of Bluetooth Low Energy Advertising S. Brauer, A. Zubow, S. Zehl, M. Roshandel, S. M. Sohi Technical University Berlin & Deutsche Telekom Labs Germany Outline Motivation,

More information

Efficient Anti-Jamming Technique Based on Detecting a Hopping Sequence of a Smart Jammer

Efficient Anti-Jamming Technique Based on Detecting a Hopping Sequence of a Smart Jammer IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 12, Issue 3 Ver. II (May June 2017), PP 118-123 www.iosrjournals.org Efficient Anti-Jamming

More information

A novel jammer detection framework for cluster-based wireless sensor networks

A novel jammer detection framework for cluster-based wireless sensor networks Perumal et al. EURASIP Journal on Wireless Communications and Networking (2016) 2016:35 DOI 10.1186/s13638-016-0528-1 RESEARCH Open Access A novel jammer detection framework for cluster-based wireless

More information

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye and John Heidemann CS577 Brett Levasseur 12/3/2013 Outline Introduction Scheduled Channel Polling (SCP-MAC) Energy Performance Analysis Implementation

More information

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic

More information

Control Channel Jamming: Resilience and Identification of Traitors

Control Channel Jamming: Resilience and Identification of Traitors Control Channel Jamming: Resilience and Identification of Traitors Agnes Chan, Xin Liu, Guevara Noubir, Bishal Thapa College of Computer and Information Scinece Northeastern University, Boston, MA 02115

More information

Trust Based Suspicious Route Categorization for Wireless Networks and its Applications to Physical Layer Attack S. RAJA RATNA 1, DR. R.

Trust Based Suspicious Route Categorization for Wireless Networks and its Applications to Physical Layer Attack S. RAJA RATNA 1, DR. R. Trust Based Suspicious Route Categorization for Wireless Networks and its Applications to Physical Layer Attack S. RAJA RATNA 1, DR. R. RAVI 2 1 Research Scholar, Department of Computer Science and Engineering,

More information

An Effective Defensive Node against Jamming Attacks in Sensor Networks

An Effective Defensive Node against Jamming Attacks in Sensor Networks International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 6ǁ June. 2013 ǁ PP.41-46 An Effective Defensive Node against Jamming Attacks in Sensor

More information

Jamming Attacks with its Various Techniques and AODV in Wireless Networks

Jamming Attacks with its Various Techniques and AODV in Wireless Networks IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 4 Ver. II (Jul. Aug. 2016), PP 48-52 www.iosrjournals.org Jamming Attacks with its

More information

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS Xiaohua Li and Wednel Cadeau Department of Electrical and Computer Engineering State University of New York at Binghamton Binghamton, NY 392 {xli, wcadeau}@binghamton.edu

More information

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR 5 th Scandinavian Workshop on Wireless Ad-hoc Networks May 3-4, 2005 Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR Mikael Fredin - Ericsson Microwave Systems, Sweden

More information

USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure

USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure An Liu, Peng Ning, Huaiyu Dai, Yao Liu North Carolina State University, Raleigh, NC 27695 {aliu3,

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 2 Medium Access Control (MAC) Schemes Course Instructor: Dr. Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents Why Multiple Access Random Access Aloha Slotted

More information

Interleaving And Channel Encoding Of Data Packets In Wireless Communications

Interleaving And Channel Encoding Of Data Packets In Wireless Communications Interleaving And Channel Encoding Of Data Packets In Wireless Communications B. Aparna M. Tech., Computer Science & Engineering Department DR.K.V.Subbareddy College Of Engineering For Women, DUPADU, Kurnool-518218

More information

A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Networks Using Trigger Identification Service

A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Networks Using Trigger Identification Service International Journal of Security, Privacy and Trust Management (IJSPTM) vol 2, No 2, April 2013 A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Networks Using Trigger Identification

More information

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Wireless Intro : Computer Networking. Wireless Challenges. Overview

Wireless Intro : Computer Networking. Wireless Challenges. Overview Wireless Intro 15-744: Computer Networking L-17 Wireless Overview TCP on wireless links Wireless MAC Assigned reading [BM09] In Defense of Wireless Carrier Sense [BAB+05] Roofnet (2 sections) Optional

More information

Error Minimizing Jammer Localization Through Smart Estimation of Ambient Noise

Error Minimizing Jammer Localization Through Smart Estimation of Ambient Noise Error Minimizing Jammer Localization Through Smart Estimation of Ambient Noise Zhenhua liu, Hongbo Liu, Wenyuan Xu and Yingying Chen Dept. of Computer Science and Engineering, University of South Carolina,

More information

JADE: Jamming-Averse Routing on Cognitive Radio Mesh Networks

JADE: Jamming-Averse Routing on Cognitive Radio Mesh Networks JADE: Jamming-Averse Routing on Cognitive Radio Mesh Networks (Invited Paper) Yu Seung Kim, Bruce DeBruhl, and Patrick Tague Carnegie Mellon University Email: {yuseungk, bdebruhl, tague}@cmu.edu Abstract

More information

CS434/534: Topics in Networked (Networking) Systems

CS434/534: Topics in Networked (Networking) Systems CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/

More information

Underwater Communication in 2.4 Ghz ISM Frequency Band for Submarines

Underwater Communication in 2.4 Ghz ISM Frequency Band for Submarines Underwater Communication in 2.4 Ghz ISM Frequency Band for Submarines S.Arulmozhi 1, M.Ashokkumar 2 PG Scholar, Department of ECE, Adhiyamaan College of Engineering, Hosur, Tamilnadu, India 1 Asst. Professor,

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #4 Physical Layer Threats; Jamming 2016 Patrick Tague 1 Class #4 PHY layer basics and threats Jamming 2016 Patrick Tague 2 PHY 2016 Patrick Tague

More information

ISSN Vol.06,Issue.09, October-2014, Pages:

ISSN Vol.06,Issue.09, October-2014, Pages: ISSN 2348 2370 Vol.06,Issue.09, October-2014, Pages:882-886 www.ijatir.org Wireless Network Packet Classification Selective Jamming Attacks VARTIKA GUPTA 1, M.VINAYA BABU 2 1 PG Scholar, Vishnu Sree Institute

More information

Medium Access Methods. Lecture 9

Medium Access Methods. Lecture 9 Medium Access Methods Lecture 9 Medium Access Control Medium Access Control (MAC) is the method that defines a procedure a station should follow when it needs to send a frame or frames. The use of regulated

More information

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA and Improvement with PCF in TORA using OPNET tool Anupam Sharma, Deepinderjeet Kaur Dhaliwal Desh Bhagat University Mandi Gobindgarh Punjab

More information

IJSER 1. INTRODUCTION 2. ANALYSIS

IJSER 1. INTRODUCTION 2. ANALYSIS International Journal of Scientific & Engineering Research, Volume 6, Issue 10, October-2015 1011 Packet-Hiding Methods for Preventing Selective Jamming Attacks Guttula Pavani Abstract The open nature

More information

Chapter 1 Basic concepts of wireless data networks (cont d.)

Chapter 1 Basic concepts of wireless data networks (cont d.) Chapter 1 Basic concepts of wireless data networks (cont d.) Part 4: Wireless network operations Oct 6 2004 1 Mobility management Consists of location management and handoff management Location management

More information

ADAPTIVE FORWARDING RATE CONTROL FOR NETWORK CODING IN TACTICAL MANETS

ADAPTIVE FORWARDING RATE CONTROL FOR NETWORK CODING IN TACTICAL MANETS The Military Communications Conference - Unclassified Program - Networking Protocols and Performance Track ADAPTIVE FORWARDING RATE CONTROL FOR NETWORK CODING IN TACTICAL MANETS Soon Y. Oh UtopiaCompression

More information

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009.

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009. Department of Computer Science and Engineering CSE 3213: Computer Networks I (Fall 2009) Instructor: N. Vlajic Date: Dec 11, 2009 Final Examination Instructions: Examination time: 180 min. Print your name

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense

More information

FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL

FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL U.P.B. Sci. Bull., Series C, Vol. 79, Iss. 4, 2017 ISSN 2286-3540 FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL Xu ZHI 1, Ding HONGWEI 2, Liu LONGJUN 3, Bao LIYONG 4,

More information

1 Interference Cancellation

1 Interference Cancellation Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.829 Fall 2017 Problem Set 1 September 19, 2017 This problem set has 7 questions, each with several parts.

More information

Living with Interference in Unmanaged Wireless. Environments. Intel Research & University of Washington

Living with Interference in Unmanaged Wireless. Environments. Intel Research & University of Washington Living with Interference in Unmanaged Wireless Environments David Wetherall, Daniel Halperin and Tom Anderson Intel Research & University of Washington This talk 1. The problem: inefficient spectrum scheduling

More information

Cognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks

Cognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks Cognitive Wireless Network 15-744: Computer Networking L-19 Cognitive Wireless Networks Optimize wireless networks based context information Assigned reading White spaces Online Estimation of Interference

More information

Literature Survey on Jamming Attack in Wireless Adhoc Network

Literature Survey on Jamming Attack in Wireless Adhoc Network Literature Survey on Jamming Attack in Wireless Adhoc Network Pinal Rupani Computer Engineering Department V.V.P. Engineering College, Rajkot Gujarat, India Prof. Naren Tada Computer Engineering Department

More information

All Your Jammers Belong To Us - Localization of Wireless Sensors Under Jamming Attack

All Your Jammers Belong To Us - Localization of Wireless Sensors Under Jamming Attack All Your ammers Belong To Us - Localization of Wireless Sensors Under amming Attack Yu Seung Kim, Frank Mokaya, Eric Chen, and Patrick Tague Electrical and Computer Engineering Carnegie Mellon University

More information

DDRS algorithm over DoS Attack in Wireless Communication Due to Jammers Prof. Bhaumik Machhi 1

DDRS algorithm over DoS Attack in Wireless Communication Due to Jammers Prof. Bhaumik Machhi 1 Impact Factor (SJIF): 3.632 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 (Special Issue for ITECE 2016) DDRS algorithm over DoS Attack

More information

Computer Networks. Week 03 Founda(on Communica(on Concepts. College of Information Science and Engineering Ritsumeikan University

Computer Networks. Week 03 Founda(on Communica(on Concepts. College of Information Science and Engineering Ritsumeikan University Computer Networks Week 03 Founda(on Communica(on Concepts College of Information Science and Engineering Ritsumeikan University Agenda l Basic topics of electromagnetic signals: frequency, amplitude, degradation

More information

/13/$ IEEE

/13/$ IEEE A Game-Theoretical Anti-Jamming Scheme for Cognitive Radio Networks Changlong Chen and Min Song, University of Toledo ChunSheng Xin, Old Dominion University Jonathan Backens, Old Dominion University Abstract

More information

FTSP Power Characterization

FTSP Power Characterization 1. Introduction FTSP Power Characterization Chris Trezzo Tyler Netherland Over the last few decades, advancements in technology have allowed for small lowpowered devices that can accomplish a multitude

More information

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 AN ATTEMPT TO FIND A SOLUTION FOR DESTRUCTING JAMMING PROBLEMS USING GAME THERORITIC ANALYSIS Abstract Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 1 P. G Scholar, E-mail: ghowsegk2326@gmail.com 2 Assistant

More information

Partial overlapping channels are not damaging

Partial overlapping channels are not damaging Journal of Networking and Telecomunications (2018) Original Research Article Partial overlapping channels are not damaging Jing Fu,Dongsheng Chen,Jiafeng Gong Electronic Information Engineering College,

More information

Minimization of Jamming Attack in Wireless Broadcast Networks Using Neighboring Node Technique

Minimization of Jamming Attack in Wireless Broadcast Networks Using Neighboring Node Technique International Journal of Scientific and Research Publications, Volume 2, Issue 5, May 2012 1 Minimization of Jamming Attack in Wireless Broadcast Networks Using Neighboring Node Technique R.Priyadarshini,

More information

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer

More information

Determining the position of a jammer using a virtual-force iterative approach

Determining the position of a jammer using a virtual-force iterative approach Wireless Netw (2) 7:53 547 DOI.7/s276--295-6 Determining the position of a jammer using a virtual-force iterative approach Hongbo Liu Zhenhua Liu Yingying Chen Wenyuan Xu Published online: 23 October 2

More information

6.1 Multiple Access Communications

6.1 Multiple Access Communications Chap 6 Medium Access Control Protocols and Local Area Networks Broadcast Networks: a single transmission medium is shared by many users. ( Multiple access networks) User transmissions interfering or colliding

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer Politecnico di Milano Advanced Network Technologies Laboratory Beyond Standard 802.15.4 MAC Sublayer MAC Design Approaches o Conten&on based n Allow collisions n O2en CSMA based (SMAC, STEM, Z- MAC, GeRaF,

More information

A Wireless Communication System using Multicasting with an Acknowledgement Mark

A Wireless Communication System using Multicasting with an Acknowledgement Mark IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 07, Issue 10 (October. 2017), V2 PP 01-06 www.iosrjen.org A Wireless Communication System using Multicasting with an

More information

Experimental study of the effects of Transmission Power Control and Blacklisting in Wireless Sensor Networks

Experimental study of the effects of Transmission Power Control and Blacklisting in Wireless Sensor Networks Experimental study of the effects of Transmission Power Control and Blacklisting in Wireless Sensor Networks Dongjin Son, Bhaskar Krishnamachari and John Heidemann Presented by Alexander Lash CS525M Introduction

More information

An Ultrasonic Sensor Based Low-Power Acoustic Modem for Underwater Communication in Underwater Wireless Sensor Networks

An Ultrasonic Sensor Based Low-Power Acoustic Modem for Underwater Communication in Underwater Wireless Sensor Networks An Ultrasonic Sensor Based Low-Power Acoustic Modem for Underwater Communication in Underwater Wireless Sensor Networks Heungwoo Nam and Sunshin An Computer Network Lab., Dept. of Electronics Engineering,

More information

On the Effects of Node Density and Duty Cycle on Energy Efficiency in Underwater Networks

On the Effects of Node Density and Duty Cycle on Energy Efficiency in Underwater Networks On the Effects of Node Density and Duty Cycle on Energy Efficiency in Underwater Networks Francesco Zorzi, Milica Stojanovic and Michele Zorzi Dipartimento di Ingegneria dell Informazione, Università degli

More information

Spectrum Sensing Brief Overview of the Research at WINLAB

Spectrum Sensing Brief Overview of the Research at WINLAB Spectrum Sensing Brief Overview of the Research at WINLAB P. Spasojevic IAB, December 2008 What to Sense? Occupancy. Measuring spectral, temporal, and spatial occupancy observation bandwidth and observation

More information

Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks

Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks Preamble MAC Protocols with Non-persistent Receivers in Wireless Sensor Networks Abdelmalik Bachir, Martin Heusse, and Andrzej Duda Grenoble Informatics Laboratory, Grenoble, France Abstract. In preamble

More information

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous

More information

Block diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E

Block diagram of a radio-over-fiber network. Central Unit RAU. Server. Downlink. Uplink E/O O/E E/O O/E Performance Analysis of IEEE. Distributed Coordination Function in Presence of Hidden Stations under Non-saturated Conditions with in Radio-over-Fiber Wireless LANs Amitangshu Pal and Asis Nasipuri Electrical

More information

Lower Layers PART1: IEEE and the ZOLERTIA Z1 Radio

Lower Layers PART1: IEEE and the ZOLERTIA Z1 Radio Slide 1 Lower Layers PART1: IEEE 802.15.4 and the ZOLERTIA Z1 Radio Jacques Tiberghien Kris Steenhaut Remark: all numerical data refer to the parameters defined in IEEE802.15.4 for 32.5 Kbytes/s transmission

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

A Novel Error Minimizing Framework Better Location Estimation in Wireless Networks

A Novel Error Minimizing Framework Better Location Estimation in Wireless Networks A Novel Error Minimizing Framework Better Location Estimation in Wireless Networks Mooda Yakanna M.Tech Student, Mr.Syed Mazharuddin Assistant Professor, Mrs. M.Jhansi Lakshmi Associate professor & HOD,

More information

Distance-Aware Virtual Carrier Sensing for Improved Spatial Reuse in Wireless Networks

Distance-Aware Virtual Carrier Sensing for Improved Spatial Reuse in Wireless Networks Distance-Aware Virtual Carrier Sensing for mproved Spatial Reuse in Wireless Networks Fengji Ye and Biplab Sikdar Department of ECSE, Rensselaer Polytechnic nstitute Troy, New York 8 Abstract n this paper

More information

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based

More information

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN ISSN 0976 6464(Print)

More information

Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004

Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004 Secure Localization Services Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 24 badri@cs.rutgers.edu Importance of localization

More information

Denial of Service Attacks in Wireless Networks: The case of Jammers

Denial of Service Attacks in Wireless Networks: The case of Jammers Denial of Service Attacks in Wireless Networks: The case of Jammers Konstantinos Pelechrinis and Marios Iliofotou Department of Computer Science and Engineering UC Riverside, Riverside CA 92521 {kpele,marios}@cs.ucr.edu

More information

ANTI-JAMMING BROADCAST COMMUNICATION USING UNCOORDINATED FREQUENCY HOPPING

ANTI-JAMMING BROADCAST COMMUNICATION USING UNCOORDINATED FREQUENCY HOPPING ANTI-JAMMING BROADCAST COMMUNICATION USING UNCOORDINATED FREQUENCY HOPPING P.MANJULA 1, S.SHARMILA 2 1&2 Assistant Professor, Veltech Multitech Engg College ABSTRACT This paper proposes a technique called

More information

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification

More information

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu

More information

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller Wireless Networks: Medium Access Control Guevara Noubir Slides adapted from Mobile Communications by J. Schiller S200, COM3525 Wireless Networks Lecture 4, Motivation Can we apply media access methods

More information