Jamming Wireless Networks: Attack and Defense Strategies

Size: px
Start display at page:

Download "Jamming Wireless Networks: Attack and Defense Strategies"

Transcription

1 Jamming Wireless Networks: Attack and Defense Strategies Wenyuan Xu, Ke Ma, Wade Trappe, Yanyong Zhang, WINLAB, Rutgers University IAB, Dec. 6 th, 2005

2 Roadmap Introduction and Motivation Jammer Models Four models Their effectiveness Detecting Jamming attacks Basic statistic + Consistency check Defenses strategy Channel surfing Spatial retreat Conclusions 2

3 Jammers Hi Alice Mr. X Jamming style DoS Attack: Behavior that prevents other nodes from using the channel to communicate by occupying the channel that they are communicating on A jammer An entity who is purposefully trying to interfere with the physical transmission and reception of wireless communications. Is it hard to build a jammer? No! Haha Mr. X 3

4 Jammers Hardware Cell phone jammer unit: Intended for blocking all mobile phone types within designated indoor areas 'plug and play' unit Waveform Generator Tune frequency to what ever you want MAC-layer Jammer (our focus) Mica2 Motes (UC Berkeley) 8-bit CPU at 4MHz, 128KB flash, 4KB RAM 916.7MHz radio OS: TinyOS Disable the CSMA Keep sending out the preamble 4

5 Jammers Hardware Cell phone jammer unit: Intended for blocking all mobile phone types within designated indoor areas 'plug and play' unit Waveform Generator Tune frequency to what ever you want MAC-layer Jammer (our focus) Mica2 Motes (UC Berkeley) 8-bit CPU at 4MHz, 128KB flash, 4KB RAM 916.7MHz radio OS: TinyOS Disable the CSMA Keep sending out the preamble 5

6 Jammers Hardware Cell phone jammer unit: Intended for blocking all mobile phone types within designated indoor areas 'plug and play' unit Waveform Generator Tune frequency to what ever you want MAC-layer Jammer laptop Mica2 Motes (UC Berkeley) 8-bit CPU at 4MHz, 128KB flash, 4KB RAM 916.7MHz radio OS: TinyOS Disable the CSMA Keep sending out the preamble 6

7 The Jammer Models and Their Effectiveness

8 Jammer Attack Models &F*(SDJFFD(*MC*(^%&^*&(%*)(*)_*^&*FS. Constant jammer: Continuously emits a radio signal Preamble CRC Payload Payload Payload Payload Payload Deceptive jammer: Constantly injects regular packets to the channel without any gap between consecutive packet transmissions A normal communicator will be deceived into the receive state 8

9 Jammer Attack Models &F*(SDJF ^F&*D( D*KC*I^ Random jammer: Alternates between sleeping and jamming Sleeping period: turn off the radio Jamming period: either a constant jammer or deceptive jammer Underling normal traffic Payload &F*(SDJ Payload ^%^*& Payload CD*(&FG Reactive jammer: Stays quiet when the channel is idle, starts transmitting a radio signal as soon as it senses activity on the channel. Targets the reception of a message 9

10 Detecting Jamming Attacks: Basic Statistics plus Consistency Checks

11 Basic Statistics P.1 Idea: Many measurement will be affected by the presence of a jammer Network devices can gather measurements during a time period prior to jamming and build a statistical model describing basic measurement in the network Measurement Signal strength Moving average Spectral discrimination Carrier sensing time Packet delivery ratio Experiment platform: Mica2 Motes Use RSSI ADC to measure the signal strength RSSI (dbm) CBR MaxTraffic Constant Jammer Deceptive Jammer Reactive Jammer Random Jammer sample sequence number 11

12 Basic Statistics P.2 Can basic statistics differentiate between jamming scenario from a normal scenario including congestion? Average Signal strength Spectral Discrimination Carrier sensing time Packet delivery ratio Constant Jammer Deceptive Jammer Random Jammer Reactive Jammer Differentiate jamming scenario from all network dynamics, e.g. congestion, hardware failure PDR is a relative good statistic, but cannot do hardware failure Consistency checks --- using Signal strength Normal scenarios: High signal strength a high PDR Low signal strength a low PDR Low PDR: Hardware failure or poor link quality low signal strength Jamming attack high signal strength 12

13 Jamming Detection with Consistency Checks Measure PDR(N) {N Є Neighbors} PDR(N) < PDRThresh? No Build a (PDR,SS) look-up table empirically Measure (PDR, SS) during a guaranteed time of non-interfered network. Divide the data into PDR bins, calculate the mean and variance for the data within each bin. Get the upper bound for the maximum SS that world have produced a particular PDR value during a normal case. Partition the (PDR, SS) plane into a jammedregion and a non-jammed region. Not Jammed PDR VS. SS Yes PDR(N) consistent with signal strength? Yes Jammed Region No SS(dBm) Jammed! PDR % 13

14 Defenses against Jamming Attacks: Channel Surfing and Spatial Retreat

15 Handling Jamming: Strategies What can you do when your channel is occupied? In wired network you can cut the link that causes the problem, but in wireless Make the building as resistant as possible to incoming radio signals? Find the jamming source and shoot it down? Battery drain defenses/attacks are not realistic! Protecting networks is a constant battle between the security expert and the clever adversary. Therefore, we take motivation from The Art of War by Sun Tze: He who cannot defeat his enemy should retreat. Retreat Strategies: Channel Surfing Spatial retreat 15

16 Channel Surfing Idea: If we are blocked at a particular channel, we can resume our communication by switching to a safe channel Inspired by frequency hopping techniques, but operates at the link layer in an on-demand fashion. Challenge Distributed computing Asynchrony, latency and scalability Jammer Jammer Node working in channel 1 Node working in channel 2 channel 1 channel 2 16

17 Channel Surfing Coordinated Channel Switching The entire network changes its channel to a new channel Spectral Multiplexing Jammed node switch channel Nodes on the boundary of a jammed region serve as relay nodes between different spectral zones Jammer Jammer Coordinated channel surfing Spectral Multiplexing Node working in channel 1 Node working in channel 2 Node working in both channel 1 & 2 channel 1 channel 2 17

18 Channel Surfing Coordinated Channel Switching The entire network changes its channel to a new channel Spectral Multiplexing Jammed node switch channel Nodes on the boundary of a jammed region serve as relay nodes between different spectral zones Jammer Jammer Coordinated channel surfing Spectral Multiplexing Node working in channel 1 Node working in channel 2 Node working in both channel 1 & 2 channel 1 channel 2 18

19 Spatial Retreat Targeted Networks Nodes in the network should have Mobility GPS or similar localization Idea: Nodes that are located within the jammed area move to safe regions. B A C X I E D H G F Escaping: Choose a random direction to evacuate from jammed area If no nodes are within its radio range, it moves along the boundary of the jammed area until it reconnects to the rest of the network. 19

20 Spatial Retreat Issues: A mobile adversary can move through the network The network can be partitioned After Escape Phase we need Reconstruction phase to repair the network Reconstruction phase Virtual force Model Forces only exist between neighboring sensors Forces are either repulsive or attractive Forces represent a need for sensors to move in order to improve system behavior virtual force is calculated based on its distance to all its neighboring sensors Direct its movement according to its force When all sensors stop moving, the spatial coverage of the whole network is maximized Borrowed from Ke Ma 20

21 Case Study : Spatial Retreats Borrowed from Ke Ma 21

22 Conclusion Due to the shared nature of the wireless medium, it is an easy feat for adversaries to perform a jamming-style denial of service against wireless networks We proposed to use consistency check based on PDR to detect jammers We have presented two different strategies to defend against the jamming style of DoS attacks Channel-surfing: changing the transmission frequency to a range where there is no interference from the adversary Spatial retreat: moving to a new location where there is no interference 22

Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service

Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang WINLAB, Rutgers University IAB 2004 Roadmap Motivation and Introduction

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #8 Interference and Jamming Announcements Homework #1 is due today Questions? Not everyone has signed up for a Survey These are required,

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication

More information

Wireless Sensor Networks

Wireless Sensor Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia June 19, 2007 Wireless

More information

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia Wireless Sensor Networks

More information

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.955

More information

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)

More information

TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes

TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes TRIESTE: A Trusted Radio Infrastructure for Enforcing SpecTrum Etiquettes Wade Trappe Rutgers, The State University of New Jersey www.winlab.rutgers.edu 1 Talk Overview Motivation TRIESTE overview Spectrum

More information

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,

More information

Defending Wireless Sensor Networks from Radio Interference through Channel Adaptation

Defending Wireless Sensor Networks from Radio Interference through Channel Adaptation 18 Defending Wireless Sensor Networks from Radio Interference through Channel Adaptation WENYUAN XU University of South Carolina and WADE TRAPPE and YANYONG ZHANG WINLAB, Rutgers University Radio interference,

More information

Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004

Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004 Secure Localization Services Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 24 badri@cs.rutgers.edu Importance of localization

More information

A Combined Approach for Distinguishing Different Types of Jamming Attacks Against Wireless Networks

A Combined Approach for Distinguishing Different Types of Jamming Attacks Against Wireless Networks A Combined Approach for Distinguishing Different Types of Jamming Attacks Against Wireless Networks Le Wang, Alexander M. Wyglinski Wireless Innovation Laboratory Department of Electrical and Computer

More information

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling

Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Ultra-Low Duty Cycle MAC with Scheduled Channel Polling Wei Ye and John Heidemann CS577 Brett Levasseur 12/3/2013 Outline Introduction Scheduled Channel Polling (SCP-MAC) Energy Performance Analysis Implementation

More information

UNDERSTANDING AND MITIGATING

UNDERSTANDING AND MITIGATING UNDERSTANDING AND MITIGATING THE IMPACT OF RF INTERFERENCE ON 802.11 NETWORKS RAMAKRISHNA GUMMADI UCS DAVID WETHERALL INTEL RESEARCH BEN GREENSTEIN UNIVERSITY OF WASHINGTON SRINIVASAN SESHAN CMU 1 Presented

More information

Sensor Network Platforms and Tools

Sensor Network Platforms and Tools Sensor Network Platforms and Tools 1 AN OVERVIEW OF SENSOR NODES AND THEIR COMPONENTS References 2 Sensor Node Architecture 3 1 Main components of a sensor node 4 A controller Communication device(s) Sensor(s)/actuator(s)

More information

Feasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks

Feasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks Feasibility and Benefits of Passive RFID Wake-up Radios for Wireless Sensor Networks He Ba, Ilker Demirkol, and Wendi Heinzelman Department of Electrical and Computer Engineering University of Rochester

More information

Effect of Antenna Placement and Diversity on Vehicular Network Communications

Effect of Antenna Placement and Diversity on Vehicular Network Communications Effect of Antenna Placement and Diversity on Vehicular Network Communications IAB, 3 rd Dec 2007 Sanjit Kaul {sanjit@winlab.rutgers.edu} Kishore Ramachandran {kishore@winlab.rutgers.edu} Pravin Shankar

More information

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks

AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks AS-MAC: An Asynchronous Scheduled MAC Protocol for Wireless Sensor Networks By Beakcheol Jang, Jun Bum Lim, Mihail Sichitiu, NC State University 1 Presentation by Andrew Keating for CS577 Fall 2009 Outline

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #4 Physical Layer Threats; Jamming 2016 Patrick Tague 1 Class #4 PHY layer basics and threats Jamming 2016 Patrick Tague 2 PHY 2016 Patrick Tague

More information

Jamming Attacks with its Various Techniques and AODV in Wireless Networks

Jamming Attacks with its Various Techniques and AODV in Wireless Networks IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 4 Ver. II (Jul. Aug. 2016), PP 48-52 www.iosrjournals.org Jamming Attacks with its

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

DEALING WITH JAMMING IN WIRELESS SENSOR NETWORK

DEALING WITH JAMMING IN WIRELESS SENSOR NETWORK DEALING WITH JAMMING IN WIRELESS SENSOR NETWORK Md. Shanawas Babu ID:-09221141 Md. Fahmidur Hossen ID:-09221103 Department of Computer Science and Engineering June 2005 BRAC University, Dhaka, Bangladesh

More information

Funneling-MAC: A Localized, Sink-Oriented MAC For Boosting Fidelity in Sensor Networks

Funneling-MAC: A Localized, Sink-Oriented MAC For Boosting Fidelity in Sensor Networks Funneling-MAC: A Localized, Sink-Oriented MAC For Boosting Fidelity in Sensor Networks Gahng-Seop Ahn, Emiliano Miluzzo, Andrew T. Campbell Se Gi Hong, Francesca Cuomo EE Dept., Columbia University CS

More information

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

On Practical Selective Jamming of Bluetooth Low Energy Advertising

On Practical Selective Jamming of Bluetooth Low Energy Advertising On Practical Selective Jamming of Bluetooth Low Energy Advertising S. Brauer, A. Zubow, S. Zehl, M. Roshandel, S. M. Sohi Technical University Berlin & Deutsche Telekom Labs Germany Outline Motivation,

More information

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes IN4181 Lecture 2 Ad-hoc and Sensor Networks Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes Outline: discuss impact of wireless Ad-hoc networks link layer: medium access control network layer:

More information

PJ6400: Mobile Collector in Defense against Jamming Attack Written by: Lu Cui Supervised by: Natalija Vlajic, Andrew Eckford

PJ6400: Mobile Collector in Defense against Jamming Attack Written by: Lu Cui Supervised by: Natalija Vlajic, Andrew Eckford PJ6400: Mobile Collector in Defense against Jamming Attack Written by: Lu Cui Supervised by: Natalija Vlajic, Andrew Eckford Abstract: A jamming attack on a wireless network is an attack in which the adversary

More information

Automotive Radar Sensors and Congested Radio Spectrum: An Urban Electronic Battlefield?

Automotive Radar Sensors and Congested Radio Spectrum: An Urban Electronic Battlefield? Automotive Radar Sensors and Congested Radio Spectrum: An Urban Electronic Battlefield? By Sefa Tanis Share on As automotive radars become more widespread, the heavily occupied RF spectrum will resemble

More information

White Space Security: Securing our Spectral Resources. (Aka: Its going to be hard to understand what s going on in order to secure spectrum )

White Space Security: Securing our Spectral Resources. (Aka: Its going to be hard to understand what s going on in order to secure spectrum ) White Space Security: Securing our Spectral Resources (Aka: Its going to be hard to understand what s going on in order to secure spectrum ) Wade Trappe Setting the Stage Currently, 90% of licensed spectrum

More information

Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods

Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods S.B.Gavali 1, A. K. Bongale 2 and A.B.Gavali 3 1 Department of Computer Engineering, Dr.D.Y.Patil College of Engineering,

More information

Spectrum Sensing Brief Overview of the Research at WINLAB

Spectrum Sensing Brief Overview of the Research at WINLAB Spectrum Sensing Brief Overview of the Research at WINLAB P. Spasojevic IAB, December 2008 What to Sense? Occupancy. Measuring spectral, temporal, and spatial occupancy observation bandwidth and observation

More information

Field Testing of Wireless Interactive Sensor Nodes

Field Testing of Wireless Interactive Sensor Nodes Field Testing of Wireless Interactive Sensor Nodes Judith Mitrani, Jan Goethals, Steven Glaser University of California, Berkeley Introduction/Purpose This report describes the University of California

More information

The Pennsylvania State University The Graduate School COMPROMISE-RESILIENT ANTI-JAMMING COMMUNICATION IN WIRELESS SENSOR NETWORKS

The Pennsylvania State University The Graduate School COMPROMISE-RESILIENT ANTI-JAMMING COMMUNICATION IN WIRELESS SENSOR NETWORKS The Pennsylvania State University The Graduate School COMPROMISE-RESILIENT ANTI-JAMMING COMMUNICATION IN WIRELESS SENSOR NETWORKS A Thesis in Computer Science and Engineering by Xuan Jiang c 2011 Xuan

More information

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks M. KIRAN KUMAR 1, M. KANCHANA 2, I. SAPTHAMI 3, B. KRISHNA MURTHY 4 1, 2, M. Tech Student, 3 Asst. Prof 1, 4, Siddharth Institute

More information

Real-World Range Testing By Christopher Hofmeister August, 2011

Real-World Range Testing By Christopher Hofmeister August, 2011 Real-World Range Testing By Christopher Hofmeister August, 2011 Introduction Scope This paper outlines the procedure for a successful RF range test that provides quantitative data on how the RF link performs

More information

The Impact of Channel Bonding on n Network Management

The Impact of Channel Bonding on n Network Management The Impact of Channel Bonding on 802.11n Network Management --- Lara Deek --- Eduard Garcia-Villegas Elizabeth Belding Sung-Ju Lee Kevin Almeroth UC Santa Barbara, UPC-Barcelona TECH, Hewlett-Packard Labs

More information

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA and Improvement with PCF in TORA using OPNET tool Anupam Sharma, Deepinderjeet Kaur Dhaliwal Desh Bhagat University Mandi Gobindgarh Punjab

More information

On Denial of Service Attacks for Wireless Sensor Networks

On Denial of Service Attacks for Wireless Sensor Networks On Denial of Service Attacks for Wireless Sensor Networks Nischay Bahl of Technology, Jalandhar, India Ajay K. Sharma of Technology, Jalandhar, India Harsh K. Verma of Technology, Jalandhar India ABSTRACT

More information

The Armstrong Project Technical Report

The Armstrong Project Technical Report The Armstrong Project Technical Report : A Localized, Sink-Oriented MAC For Boosting Fidelity in Sensor Networks Gahng-Seop Ahn, Emiliano Miluzzo, Andrew T. Campbell, Se Gi Hong, and Francesca Cuomo CU/EE/TAP-TR-26-8-3

More information

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous

More information

FTSP Power Characterization

FTSP Power Characterization 1. Introduction FTSP Power Characterization Chris Trezzo Tyler Netherland Over the last few decades, advancements in technology have allowed for small lowpowered devices that can accomplish a multitude

More information

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR 5 th Scandinavian Workshop on Wireless Ad-hoc Networks May 3-4, 2005 Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR Mikael Fredin - Ericsson Microwave Systems, Sweden

More information

ZigBee-based Intra-car Wireless Sensor Network

ZigBee-based Intra-car Wireless Sensor Network This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the ICC 27 proceedings. ZigBee-based Intra-car Wireless Sensor Network Hsin-Mu

More information

Mitigating Inside Jammers in Manet Using Localized Detection Scheme

Mitigating Inside Jammers in Manet Using Localized Detection Scheme International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 7ǁ July 2013 ǁ PP.13-19 Mitigating Inside Jammers in Manet Using Localized Detection

More information

Exercise Data Networks

Exercise Data Networks (due till January 19, 2009) Exercise 9.1: IEEE 802.11 (WLAN) a) In which mode of operation is this network in? b) Why is the start of the back-off timers delayed until the DIFS contention phase? c) How

More information

Intelligent Adaptation And Cognitive Networking

Intelligent Adaptation And Cognitive Networking Intelligent Adaptation And Cognitive Networking Kevin Langley MAE 298 5/14/2009 Media Wired o Can react to local conditions near speed of light o Generally reactive systems rather than predictive work

More information

Error Minimizing Jammer Localization Through Smart Estimation of Ambient Noise

Error Minimizing Jammer Localization Through Smart Estimation of Ambient Noise Error Minimizing Jammer Localization Through Smart Estimation of Ambient Noise Zhenhua liu, Hongbo Liu, Wenyuan Xu and Yingying Chen Dept. of Computer Science and Engineering, University of South Carolina,

More information

Using Channel Hopping to Increase Resilience to Jamming Attacks

Using Channel Hopping to Increase Resilience to Jamming Attacks Using Channel Hopping to Increase 82.11 Resilience to Jamming Attacks Vishnu Navda, Aniruddha Bohra, Samrat Ganguly NEC Laboratories America {vnavda,bohra,samrat}@nec-labs.com Dan Rubenstein Columbia University

More information

Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points

Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points Reliable Videos Broadcast with Network Coding and Coordinated Multiple Access Points Pouya Ostovari and Jie Wu Computer & Information Sciences Temple University Center for Networked Computing http://www.cnc.temple.edu

More information

All Beamforming Solutions Are Not Equal

All Beamforming Solutions Are Not Equal White Paper All Beamforming Solutions Are Not Equal Executive Summary This white paper compares and contrasts the two major implementations of beamforming found in the market today: Switched array beamforming

More information

Data Dissemination in Wireless Sensor Networks

Data Dissemination in Wireless Sensor Networks Data Dissemination in Wireless Sensor Networks Philip Levis UC Berkeley Intel Research Berkeley Neil Patel UC Berkeley David Culler UC Berkeley Scott Shenker UC Berkeley ICSI Sensor Networks Sensor networks

More information

Wi-Fi. Wireless Fidelity. Spread Spectrum CSMA. Ad-hoc Networks. Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering

Wi-Fi. Wireless Fidelity. Spread Spectrum CSMA. Ad-hoc Networks. Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering Wi-Fi Wireless Fidelity Spread Spectrum CSMA Ad-hoc Networks Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering Outline for Today We learned how to setup a WiFi network. This

More information

DDRS algorithm over DoS Attack in Wireless Communication Due to Jammers Prof. Bhaumik Machhi 1

DDRS algorithm over DoS Attack in Wireless Communication Due to Jammers Prof. Bhaumik Machhi 1 Impact Factor (SJIF): 3.632 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 (Special Issue for ITECE 2016) DDRS algorithm over DoS Attack

More information

Application Note AN041

Application Note AN041 CC24 Coexistence By G. E. Jonsrud 1 KEYWORDS CC24 Coexistence ZigBee Bluetooth IEEE 82.15.4 IEEE 82.11b WLAN 2 INTRODUCTION This application note describes the coexistence performance of the CC24 2.4 GHz

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 14: Full-Duplex Communications Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Outline What s full-duplex Self-Interference Cancellation Full-duplex and Half-duplex

More information

Internet of Things Prof. M. Cesana. Exam June 26, Family Name Given Name Student ID 3030 Course of studies 3030 Total Available time: 2 hours

Internet of Things Prof. M. Cesana. Exam June 26, Family Name Given Name Student ID 3030 Course of studies 3030 Total Available time: 2 hours Internet of Things Prof. M. Cesana Exam June 26, 2011 Family Name Given Name John Doe Student ID 3030 Course of studies 3030 Total Available time: 2 hours E1 E2 E3 Questions Questions OS 1 Exercise (8

More information

Keeping Your Eyes Peeled: Sensing-Driven Feedback- Computing for Network Security

Keeping Your Eyes Peeled: Sensing-Driven Feedback- Computing for Network Security Keeping Your Eyes Peeled: Sensing-Driven Feedback- Computing for Network Security Bruce DeBruhl PhD Candidate, ECE Wireless Network & System Security Group Carnegie Mellon University November 14, 2014

More information

Energy-Efficient Data Management for Sensor Networks

Energy-Efficient Data Management for Sensor Networks Energy-Efficient Data Management for Sensor Networks Al Demers, Cornell University ademers@cs.cornell.edu Johannes Gehrke, Cornell University Rajmohan Rajaraman, Northeastern University Niki Trigoni, Cornell

More information

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 AN ATTEMPT TO FIND A SOLUTION FOR DESTRUCTING JAMMING PROBLEMS USING GAME THERORITIC ANALYSIS Abstract Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 1 P. G Scholar, E-mail: ghowsegk2326@gmail.com 2 Assistant

More information

Location Estimation in Ad-Hoc Networks with Directional Antennas

Location Estimation in Ad-Hoc Networks with Directional Antennas Location Estimation in Ad-Hoc Networks with Directional Antennas Nipoon Malhotra, Mark Krasniewski, Chin-Lung Yang, Saurabh Bagchi, William Chappell School of Electrical and Computer Engineering Purdue

More information

Agenda. A short overview of the CITI lab. Wireless Sensor Networks : Key applications & constraints. Energy consumption and network lifetime

Agenda. A short overview of the CITI lab. Wireless Sensor Networks : Key applications & constraints. Energy consumption and network lifetime CITI Wireless Sensor Networks in a Nutshell Séminaire Internet du Futur, ASPROM Paris, 24 octobre 2012 Prof. Fabrice Valois, Université de Lyon, INSA-Lyon, INRIA fabrice.valois@insa-lyon.fr 1 Agenda A

More information

Literature Survey on Jamming Attack in Wireless Adhoc Network

Literature Survey on Jamming Attack in Wireless Adhoc Network Literature Survey on Jamming Attack in Wireless Adhoc Network Pinal Rupani Computer Engineering Department V.V.P. Engineering College, Rajkot Gujarat, India Prof. Naren Tada Computer Engineering Department

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU

More information

Computer Networks II Advanced Features (T )

Computer Networks II Advanced Features (T ) Computer Networks II Advanced Features (T-110.5111) Wireless Sensor Networks, PhD Postdoctoral Researcher DCS Research Group For classroom use only, no unauthorized distribution Wireless sensor networks:

More information

Simulation Blocks for TOSSIM-T2

Simulation Blocks for TOSSIM-T2 Simulation Blocks for TOSSIM-T2 Prabhakar T V, Venkatesh S, Sujay M S, Joy Kuri, Praveen Kumar Centre for Electronics Design and Technology, Indian Institute of Science, Bangalore, India (tvprabs, svenkat,

More information

Detection and Prevention of Physical Jamming Attacks in Vehicular Environment

Detection and Prevention of Physical Jamming Attacks in Vehicular Environment Detection and Prevention of Physical Jamming Attacks in Vehicular Environment M-Tech Student 1 Mahendri 1, Neha Sawal 2 Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal,

More information

Book Title: XXXXXXXXXXXXXXXXXXXXXXXXXX. Editors

Book Title: XXXXXXXXXXXXXXXXXXXXXXXXXX. Editors Book Title: XXXXXXXXXXXXXXXXXXXXXXXXXX Editors March 24, 2008 ii Contents 1 Jamming in Wireless Sensor Networks 1 1.1 Introduction.................................... 2 1.2 Communication in WSNs.............................

More information

ZigBee Propagation Testing

ZigBee Propagation Testing ZigBee Propagation Testing EDF Energy Ember December 3 rd 2010 Contents 1. Introduction... 3 1.1 Purpose... 3 2. Test Plan... 4 2.1 Location... 4 2.2 Test Point Selection... 4 2.3 Equipment... 5 3 Results...

More information

Wireless Broadband Solutions for Autonomous Ground Vehicles

Wireless Broadband Solutions for Autonomous Ground Vehicles Wireless Broadband Solutions for Autonomous Ground Vehicles State-of-the-art wireless MIMO for Command and Control + long range video streaming 2019 Doodle Labs. All rights reserved. 1 Wireless Communication

More information

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra

olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra olsr.org 'Optimized Link State Routing' and beyond December 28th, 2005 Elektra www.scii.nl/~elektra Introduction Olsr.org is aiming to an efficient opensource routing solution for wireless networks Work

More information

Secret Key Extraction in MIMO like Sensor Networks Using Wireless Signal Strength

Secret Key Extraction in MIMO like Sensor Networks Using Wireless Signal Strength Secret Key Extraction in MIMO like Sensor Networks Using Wireless Signal Strength Sriram Nandha Premnath Academic Advisors: Sneha K. Kasera, Neal Patwari nandha@cs.utah.edu, kasera@cs.utah.edu, npatwari@ece.utah.edu

More information

Mitigation of Periodic Jamming in a Spread Spectrum System by Adaptive Filter Selection

Mitigation of Periodic Jamming in a Spread Spectrum System by Adaptive Filter Selection Mitigation of Periodic Jamming in a Spread Spectrum System by Adaptive Filter Selection Bruce DeBruhl and Patrick Tague Carnegie Mellon University { debruhl, tague} @cmu.edu Keywords: Abstract: Adaptive

More information

Zippy: On-Demand Network Flooding

Zippy: On-Demand Network Flooding Zippy: On-Demand etwork Flooding Felix utton, Bernhard Buchli, Jan Beutel, and Lothar Thiele enys 2015, eoul, outh Korea, 1 st 4 th ovember 2015 enys 2015 Problem tatement Energy-efficient wireless dissemination

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer Politecnico di Milano Advanced Network Technologies Laboratory Beyond Standard 802.15.4 MAC Sublayer MAC Design Approaches o Conten&on based n Allow collisions n O2en CSMA based (SMAC, STEM, Z- MAC, GeRaF,

More information

Multiple Access Schemes

Multiple Access Schemes Multiple Access Schemes Dr Yousef Dama Faculty of Engineering and Information Technology An-Najah National University 2016-2017 Why Multiple access schemes Multiple access schemes are used to allow many

More information

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor Avoiding Interference in the 2.4-GHz ISM Band Designers can create frequency-agile 2.4 GHz designs using procedures provided by standards bodies or by building their own protocol. By Ryan Winfield Woodings

More information

WOLF - Wireless robust Link for urban Forces operations

WOLF - Wireless robust Link for urban Forces operations Executive summary - rev B - 01/05/2011 WOLF - Wireless robust Link for urban Forces operations The WOLF project, funded under the 2nd call for proposals of Joint Investment Program on Force Protection

More information

Study of RSS-based Localisation Methods in Wireless Sensor Networks

Study of RSS-based Localisation Methods in Wireless Sensor Networks Study of RSS-based Localisation Methods in Wireless Sensor Networks De Cauwer, Peter; Van Overtveldt, Tim; Doggen, Jeroen; Van der Schueren, Filip; Weyn, Maarten; Bracke, Jerry Jeroen Doggen jeroen.doggen@artesis.be

More information

Planning of LTE Radio Networks in WinProp

Planning of LTE Radio Networks in WinProp Planning of LTE Radio Networks in WinProp AWE Communications GmbH Otto-Lilienthal-Str. 36 D-71034 Böblingen mail@awe-communications.com Issue Date Changes V1.0 Nov. 2010 First version of document V2.0

More information

WIRELESS NETWORK USER MANUAL MHz RFT-868-REL Remotely Controlled Relay Switch

WIRELESS NETWORK USER MANUAL MHz RFT-868-REL Remotely Controlled Relay Switch WIRELESS NETWORK USER MANUAL 868.3 MHz Remotely Controlled Relay Switch Device Specifications Max Switching Voltage: 250 VAC Max Switching Current: 10 A Max Switching Power: 2500 VA Power Draw in standby

More information

SCPL: Indoor Device-Free Multi-Subject Counting and Localization Using Radio Signal Strength

SCPL: Indoor Device-Free Multi-Subject Counting and Localization Using Radio Signal Strength SCPL: Indoor Device-Free Multi-Subject Counting and Localization Using Radio Signal Strength Rutgers University Chenren Xu Joint work with Bernhard Firner, Robert S. Moore, Yanyong Zhang Wade Trappe, Richard

More information

Wormhole-Based Anti-Jamming Techniques in Sensor. Networks

Wormhole-Based Anti-Jamming Techniques in Sensor. Networks Wormhole-Based Anti-Jamming Techniques in Sensor Networks Mario Čagalj Srdjan Čapkun Jean-Pierre Hubaux Laboratory for Computer Communications and Applications (LCA) Faculty of Informatics and Communication

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University

More information

VC7300-Series Product Brief

VC7300-Series Product Brief VC7300-Series Product Brief Version: 1.0 Release Date: Jan 16, 2019 Specifications are subject to change without notice. 2018 Vertexcom Technologies, Inc. This document contains information that is proprietary

More information

Free space loss: transmitting antenna: signal power P snd receiving antenna: signal power P rcv distance: d frequency: f.

Free space loss: transmitting antenna: signal power P snd receiving antenna: signal power P rcv distance: d frequency: f. Signal Propagation and Power Free space loss: transmitting antenna: signal power P snd receiving antenna: signal power P rcv distance: d frequency: f P rcv P snd 1 d 2 f 2 quadratic decrease in distance

More information

TRANSMIT ONLY FOR DENSE WIRELESS NETWORKS

TRANSMIT ONLY FOR DENSE WIRELESS NETWORKS TRANSMIT ONLY FOR DENSE WIRELESS NETWORKS by BERNHARD FIRNER A dissertation submitted to the Graduate School New Brunswick Rutgers, The State University of New Jersey in partial fulfillment of the requirements

More information

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer

Optimal Clock Synchronization in Networks. Christoph Lenzen Philipp Sommer Roger Wattenhofer Optimal Clock Synchronization in Networks Christoph Lenzen Philipp Sommer Roger Wattenhofer Time in Sensor Networks Synchronized clocks are essential for many applications: Sensing TDMA Localization Duty-

More information

FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL

FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL U.P.B. Sci. Bull., Series C, Vol. 79, Iss. 4, 2017 ISSN 2286-3540 FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL Xu ZHI 1, Ding HONGWEI 2, Liu LONGJUN 3, Bao LIYONG 4,

More information

UWB for Sensor Networks:

UWB for Sensor Networks: IEEE-UBC Symposium on future wireless systems March 10 th 2006, Vancouver UWB for Sensor Networks: The 15.4a standard Andreas F. Molisch Mitsubishi Electric Research Labs, and also at Department of Electroscience,

More information

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification

More information

A Novel Error Minimizing Framework Better Location Estimation in Wireless Networks

A Novel Error Minimizing Framework Better Location Estimation in Wireless Networks A Novel Error Minimizing Framework Better Location Estimation in Wireless Networks Mooda Yakanna M.Tech Student, Mr.Syed Mazharuddin Assistant Professor, Mrs. M.Jhansi Lakshmi Associate professor & HOD,

More information

WisperNet: Anti-Jamming for Wireless Sensor Networks

WisperNet: Anti-Jamming for Wireless Sensor Networks University of Pennsylvania ScholarlyCommons Real-Time and Embedded Systems Lab (mlab) School of Engineering and Applied Science --28 WisperNet: Anti-Jamming for Wireless Sensor Networks Miroslav Pajic

More information

Long Term Evolution (LTE) and 5th Generation Mobile Networks (5G) CS-539 Mobile Networks and Computing

Long Term Evolution (LTE) and 5th Generation Mobile Networks (5G) CS-539 Mobile Networks and Computing Long Term Evolution (LTE) and 5th Generation Mobile Networks (5G) Long Term Evolution (LTE) What is LTE? LTE is the next generation of Mobile broadband technology Data Rates up to 100Mbps Next level of

More information

AIR FORCE INSTITUTE OF TECHNOLOGY

AIR FORCE INSTITUTE OF TECHNOLOGY The Effects of Cognitive Jamming on Wireless Sensor Networks used for Geolocation THESIS Michael A. Huffman, Captain, USAF AFIT/GE/ENG/12-21 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE

More information

IFH SS CDMA Implantation. 6.0 Introduction

IFH SS CDMA Implantation. 6.0 Introduction 6.0 Introduction Wireless personal communication systems enable geographically dispersed users to exchange information using a portable terminal, such as a handheld transceiver. Often, the system engineer

More information

MIMO-Assisted Channel-Based Authentication in Wireless Networks

MIMO-Assisted Channel-Based Authentication in Wireless Networks 1 -Assisted Channel-Based Authentication in Wireless Networks Liang Xiao, Larry Greenstein, Narayan Mandayam, Wade Trappe Wireless Information Network Laboratory (WINLAB), Rutgers University 671 Rt. 1

More information

Impact of Radio Irregularity on Wireless Sensor Networks

Impact of Radio Irregularity on Wireless Sensor Networks Impact of Radio Irregularity on Wireless Sensor Networks Gang Zhou, Tian He, Sudha Krishnamurthy, John A. Stankovic Department of Computer Science University of Virginia, Charlottesville, VA 2293 {gz5d,

More information

Denial of Service Attacks in Wireless Networks: The case of Jammers

Denial of Service Attacks in Wireless Networks: The case of Jammers Denial of Service Attacks in Wireless Networks: The case of Jammers Konstantinos Pelechrinis and Marios Iliofotou Department of Computer Science and Engineering UC Riverside, Riverside CA 92521 {kpele,marios}@cs.ucr.edu

More information