Anti-Jamming: A Study

Size: px
Start display at page:

Download "Anti-Jamming: A Study"

Transcription

1 Anti-Jamming: A Study Karthikeyan Mahadevan, Sojeong Hong, John Dullum December 14, 25 Abstract Addressing jamming in wireless networks is important as the number of wireless networks is on the increase. In this paper, we present a new mechanism to mitigate jamming attacks. We have developed a random channel selection protocol to facilitate communications among nodes in the presence of jammers. Furthermore, we adopt pairwise key predistribution protocol based on bivariate polynomial in order to build a secure random frequency hopping schedule between two nodes. We discuss the security and connectivity characteristics for our scheme and we also present simulations. 1 Introduction With the proliferation of wireless networks, we are experiencing a paradigm shift from traditional wired networks towards mobile computing. As the ubiquity of deploying these wireless networks increase, it is vital that we understand the various security problems that it might pose. Provisioning security for these wireless networks has been a problem. Security for these wireless networks is particularly challenging since these devices are resource-constrained and use a broadcast channel for communication. Furthermore, as these wireless devices are easily available and are cheap. This opens up the wireless networks to a spectrum of attacks that were not present in the traditional wired networks. A very important attack called jamming is preventing the legitimate users from communicating. An attacker could disable his MAC-layer protocol or send a powerful signal to interfere with PHY-layer decoding of messages. It is well-known that these attacks are simple to launch and very hard to protect from. It is essential to understand intrinsic properties of the radio channel [12]. The quest of preventing an attacker to launch a DoS using the wireless medium relies on our understanding of the channel itself. Addressing jamming is difficult since we cannot directly apply the standard cryptographic paradigms. Frequency hopping spread spectrum (FHSS) is a technique which splits the communication channel into different sub channels, and allocating a hopping pattern to every user. In [3], the authors have shown how to improve the channel capacity of ad hoc wireless networks. FHSS has been considered a potential solution for preventing jamming and has been used by the military for many years. There is a vast body of literature on jamming [2]. As a result of using a single communication channel, jamming can be performed easily. Frequency hopping is an alternative which alleviates jamming if it is used correctly. There are real-world implementations that employ the same hopping pattern for all the nodes. But this is not a very secure approach, as an attacker has to compromise a single node to obtain the hopping sequence and thereby jam the network. The reason for following this approach is due to synchronization issues that might arise if we employ different hopping sequences for each node. Furthermore, we cannot assume the location of a node before deployment. A reasonable solution is to adopt one of the key management solutions [7, 5, 11] and use the shared keys between nodes as the basis of frequency hopping. Then the security offered by this approach would be restricted to the number of keys that a node possesses. This would also dictate that nodes would have to use a control channel to figure out with which neighbors it shares a key. This again opens the network for the jammer. 2 Related Work 2.1 Jamming DoS attacks on sensor networks was studied in [15]. The authors explored various attacks that could stem from various layers of the protocol stack and proposed defense mechanisms. The authors suggest employing spread spectrum techniques to avoid physical layer jamming and rerouting around the claimed jammed region. As for defenses at the MAC layer, there is not one single strategy that could be used. 1

2 Channel surfing [16] is a work that basically suggests and provides a framework to prevent jamming. The frequency hopping pattern suggested by [16] is C(n + 1) = C(n)+1 mod M. The authors also understand the consequence of using this pattern and have suggested use of a pre-shared secret between the communicating parties. Another approach suggested by [16], called spatial retreats is suited for wireless devices that are mobile: moving away from jammed areas. The success of [16], relies on predicting whether the channel is jammed or not. Strategies based on both MAC and PHY-layer are presented. In the MAC-layer approach, each device keeps track of how long it had to wait to access the channel and compares this with a preset threshold (which can be determined theoretically or by experiments). If the current access time is greater than the threshold, the node determines that it is being jammed. On the other hand for PHYlayer based detection, each node samples the noise levels many times within a specified interval and estimates whether or not it is being jammed. It is easy to observe that these approaches have a lot of false-positives due to congestion or wireless devices moving away and/or loss of power. RID [8], is a real-time adaptive protocol designed to detect interference in radio communications. The concept of this protocol is that a sender sends a high-powered signal followed by a normal-powered signal, using which the receiver estimates the interference for the sender. Broadcast anti-jamming has been analyzed [6] from a theoretical perspective. Emergent properties [9] are characteristics that arise from a group of nodes, their behavior and so on. It is essential that we understand these properties to build secure protocols. In [13], the authors have analyzed jamming based on the power expenditure for the jammer. 2.2 Bivariate Polynomial The group key predistribution based on bivariate polynomial is proposed by Blundo et al [4]. We employ the bivariate polynomial protocol in order to achieve pairwise key predistribution as same as [11]. The central authority (CA) generates a bivariate polynomial as follows. f(x,y) = t i,j= a ijx i y j over a finite field GF(q), where q is a large prime number, satisfying the requirement f(x,y) = f(x,y) and keep it secret. t is decided based on the storage capacity of the mobile wireless node. t is also considered as threshold that the secret bivariate polynomial can be kept even though if there are t compromised nodes (t-collusion resistant). Let U i is a node whose id is i and is certified by CA. Then CA give U i a secret polynomial f(i,y). This key predistribution is done prior to node distribution (or formation of ad hoc network). After an ad hoc network is formed, U i can share a key with U j by substituting y with j such as f(i,j). Also U j can compute the shared key by substituting y with i such as f(j,i). Since the bivariate polynomial satisfies f(i,j) = f(j,i), U i and U j can derive the same key. Hence without knowing the other peer s secret polynomial, they can agree upon the same key by simply sending their id in clear text. 3 Physical and MAC Layer Jamming 3.1 PHY layer Jamming When two nodes are communicating, an attacker could insert noise making the communications unintelligible. This is basically how PHY layer jamming is done. Bluetooth and microwave devices operate in the same frequency spectrum as 82.11b devices. Furthermore an attacker who knows the frequency of operation can use noise emitters to jam the communications. The sole purpose of an attacker performing this attack is to ensure that communication do not happen. 3.2 MAC Layer Jamming The standard mandates that implementations of Distributed Coordination Function (DCF) follow carrier sensing. The primary objective of CSMA protocols is to avoid nodes communicating at the same time which would cause collisions, which would result in retransmissions thereby reducing the utility of the network. The working of the protocol in a nutshell is as follows: every node wanting to communicate has to sense the channel. If the channel is idle, then the node can send a Request to Send (RTS) packet with the duration it wants to transmit. A receiver can acknowledge this request by sending a Clear to Send (CTS) packet with the appropriate duration. Once this exchange is taking place, the neighbors know that the channel is reserved for the duration specified. By explicitly reserving the channel, collisions are avoided. Inter-frame spacing is another feature of this protocol. After every transmission, there is a dead time frame wherein all the nodes wait. For more details on the inner working of this protocol please refer to [1]. An adversary can exploit this protocol by reserving the channel (of course an attacker does not have to follow the protocol), but by just sending the RTS packets, an attacker can bring down the utility of the network considerably. Furthermore the energy expended for this type of attack is 2

3 very limited compared to a noise generator. The following are the options for the jammer to avoid legitimate nodes from communicating: Send RTS packets, which would reserve the channel for the maximum duration. This ensures that legitimate nodes cannot communicate for the duration of time. The energy expended by the attacker is basically the cost of sending an RTS packet. Create collisions to ensure that RTS packets are not properly decoded at the receiver. In either case the attacker s goal is to bring down the utility of the network. We are looking at the strategies an attacker can employ to bring the network utility to minimum. 4 Channel Selection - A Randomized Approach We could imagine a situation wherein the participating nodes use a single common channel to establish the frequency hopping patterns with its neighbors. The serious issue that arises out of this approach is that an attacker can jam this common channel thereby ensuring that the legitimate nodes will not be able to communicate. This is the threat which we are trying to address by frequency hopping. Distributing a common hopping pattern to all nodes is not an option since an attacker has to compromise only one node to compromise a major portion of the network. Therefore, it is necessary that the nodes use an algorithm that does not need any stored information. For clarity, we use the the following terminology: Physical Neighbors: Nodes that fall within the communication range of a node. Logical Neighbors: Nodes that fall within the communication range of a node A and picks the same frequency as the node A. 4.1 Protocol Version 1 Let us consider a network with n nodes with an average of k physical neighbors per node. After deployment, each node boots up and tries to establish communication channels. Each node (for instance node A) picks a channel at random from the C channels available. It senses the channel and ensures that there is no communication in that channel (CSMA protocol), once that happens, it sends out a join request. If there is some other node listening in that channel, it replies back and they negotiate the hopping sequence. If there is no response to the join request for t seconds, then node A picks another channel in random and tries to connect to someone. This boot up phase happens for a fixed amount of time or till the node attains a threshold number of neighbors. The following is the algorithm that details the workings of the channel selection protocol: Algorithm 1 :Channel Selection 1: counter = 2: while counter threshold do 3: Pick a channel c at random 4: if c is not busy then 5: Send join request 6: Wait for t seconds 7: if Obtained response then 8: Negotiate hopping schedule 9: else 1: counter++ 11: end if 12: end if 13: end while 4.2 Analysis Let us see what guarantees we can obtain from Algorithm 1. First and foremost arises the question whether we can ensure connectivity among nodes. Let us analyze this from a single node s perspective: each node picks a channel at random and then senses the channel. Let the event that two nodes pick different channels be denoted as A. The probability of occurrence of event A is given by: P[A] = 1 1/C Symbol n C k Meaning Number of nodes Number of channels Average number of neighbors per node Table 1: Notation Given that each node has on an average k physical neighbors, let us denote the event that all of k neighbors of a given node pick channels different from the given node as B. The probability of occurrence of event B is given by: P[B] = (1 1/C) k 3

4 The minimum requirement for a node to be connected is that it shares a channel with at least one of its k neighbors and let us denote this event as S. The probability of this event to occur is given by: 4.3 Connectivity P[S] = 1 (1 1/C) k (1) The probability that any two nodes can communicate is a measure of connectivity. In [14], the authors have presented a case for using directional antennas to improve connectivity. We do not think that is not an option for our protocol. Based on equation 1, we can determine the probability of successful connection establishment. We varied the average number of physical neighbors for given number of channels. From Figure 1 the probability of estab- Probability of success Average number of physical neighbors Figure 1: Average number of logical neighbors established lishing a neighbor varies from.6 to.4 depending on the number of channels available given that there are 4 physical neighbors. We make two important observations here: How many logical neighbors does each node need so that the graph is completely connected? How many physical neighbors are necessary to ensure complete connectivity? In [7] the authors analyze connectivity using random graph theory. As the concepts are similar, we will also adopt random graph theory for our purposes. In other words we will use random graph theory to answer the questions we have raised. For a graph to be connected with desired probability P c, the threshold function p is defined as follows [7]: P c = lim n P r[g(n,p)is connected] = e e c (2) where p = ln(n) n + c and c is any real constant (3) n Given these equations, the authors have derived the expected degree and based on that the connectivity. Given that there are 4 physical neighbors for each node, different channels, the expected probability is approximately.4. So we would need at most 3 rounds to ensure that there is at least one logical connection. 4.4 An Example To present our scheme better we provide two numerical examples, one with the numbers used in [7] and another one. Let us consider that we have a network with 1 nodes. We want the network to be connected with probability P c =.99999, by using equation 2 the value for c is Substituting this value of c, in equation 2 p = We can find d = p (n 1), the expected node degree is found to be 18. Hence we would need to run the channel selection protocol about 54 times. We have validated this claim by simulation which can be found in Section 6. But this is the case for the network to be completely connected. It is desirable to reduce the number of runs of the channel selection protocol, so let us take the case when we would need a probability of connectivity to be P c =.98. In this case c = 4 and we found p =.19. The expected degree is 11, for which we need to run our channel selection protocol about 33 times. It can be noted that the probability of connectivity is a design parameter and it can be left to designers to choose the appropriate value for it. 4.5 Discussion Although the channel selection protocol discussed above provides better resistance to jamming, there are a couple of problems that arises out of this. If a jammer is listening on some frequency, he would be able to figure out the hopping patterns negotiated by nodes on that frequency. So a passive attacker gains useful information. Compared to traditional communications, this is better. Furthermore as the number of passive attackers increase, the number of communication links compromised also increases. 5 Secure Channel Selection In our channel selection protocol, nodes pick channels at random and establish logical neighbors. If an attacker happens to be listening in on the frequency selected by 4

5 a node when it is negotiating the hopping schedule in the channel selection protocol then the attacker has complete knowledge of the hopping sequence. Therefore it is imperative to ensure that nodes do not reveal this information thereby leaving the attacker a probability of 1/C to jam communications. 5.1 Protocol Version 2 We discussed polynomial based key predistribution in section 2. In order to provide better security, we will employ that in conjunction with our channel selection protocol. Before deployment each node is assigned a univariate polynomial f(i,y), where i is the node s id. After deployment, each node boots up, picks a channel at random and tries communicating. Once it receives the response the nodes just exchange their id s. As a result, now both the nodes have a shared key K which they use to determine the hopping pattern as follows: F i = h i (K)modC The frequency that they would use in time i is determined by hashing the shared key K i times and reducing it modulo C, which would result in one of the channels. The following is the algorithm 2 that explains the working of the protocol. Algorithm 2 :Secure Channel Selection 1: counter = 2: while counter threshold do 3: Pick a channel c at random 4: if c is not busy then 5: Send join request 6: Wait for t seconds 7: if Obtained response then 8: Exchange node id s 9: Negotiate timing issues 1: else 11: counter++ 12: end if 13: end if 14: end while 5.2 Discussion The probability of a node establishing a logical neighbor is exactly the same, but the difference here is that the hopping pattern is not revealed to anyone else. We achieve this by employing the polynomial based key distribution. When two nodes meet each other in a channel, all they have to exchange is their identifiers. At the end of getting the identifiers, the nodes can generate the shared key independently which can be used as a basis for the hopping pattern. Given this protocol what can an attacker do to deny communications for the legitimate nodes? If an attacker chooses to jam one channel, then the legitimate nodes are left with C 1 channels to communicate. Furthermore, an attacker has a probability of 1/C to guess the next channel in which communication is going to take place. It is obvious that there is going to be a negative effect on the throughput in the presence of an attacker, but legitimate nodes will still be able to communicate. One could imagine the scenario with smart jammers or distributed jammers. Again the bandwidth utilization by legitimate nodes would drop as the case may be, but as we can see from our channel selection protocols analysis, legitimate nodes will definitely be able to communicate. In order to bring down the communications to a stop, there have to be C attackers. Depending on the number of available channels this might or might not be feasible. 5.3 Tradeoffs and Incentives It is imperative for any design to offer flexibility for designers. We have kept that in mind and there are a few tradeoffs we offer. If the designers prefer to reduce the number of rounds of channel selection with required connectivity, they could choose to use a subset of the available channels for the channel selection phase and then employ the complete set of channels for communications. The other tunable parameters are the number of physical neighbors and number of logical neighbors established. One could release different combinations using the different variables. If the nodes know that certain channels are jammed, then they can remove it from the set of available channels and avoid those channels in their hopping schedules. Cluster formation is possible, but that would require more analysis to ensure we can attain security guarantees. 6 Simulation In this section, we explain simulation results; our simulator is implemented with C and OpenSSL. The objective of simulator is two fold: initial channel selection process and key establishment process. In this simulation, we generate thousand nodes and deploy it in the square network area (1 by 1) randomly by assigning two random numbers (<1) to the x-coordinate and y-coordinate of a node. A node is considered as a physical neighbor if the node resides within the other nodes reachable range. We as- 5

6 sumed that reachable range of a node is a r radius circle embracing a node, which is not valid if a directional antenna is used. If r increases (the distance the antenna s signal can reach increases), the number of physical neighbors increases. When a couple of nodes is in the communication range and select the same channel, each node computes the pairwise shared key using its secret polynomial, (which is assigned by the central authority) and neighbor s id. The following simulation analysis is based on the average results out of ten runs of the simulation. Figure 2 shows that the average number of logical neighbors with respect to the average number of physical neighbors. The four legends indicate the number of available channels. The higher the number of channels there are, the greater the security. In reality, however, there are only channels in Bluetooth [1] and IEEE 82.11b [1] that provides FHSS. For the first round channel selection, the average number of logical neighbors with 4 physical neighbor occurrence is about.5 when there are available channels. With same condition, if there are 512 available channels, the average number of logical neighbors is about.8. The result shows that the more channels there are for frequency hopping, the less number of logical neighbors a node can have. Figure 2 also shows that our theoretical analysis is correct displaying almost same graph lines as Figure 1 Average number of neighbors established Average number of physical neighbors Figure 2: Average number of logical neighbors with respect to various number of physical neighbors Section 4.3 discussed about achieving complete graph. Figure 3 shows that the average number of logical neighbors a node can connect to with channels and about 4 physical neighbors. If we want to achieve a probability of so that we can be almost certain to have a completely connected graph, each node needs to run the channel selection protocol 48 times. However, if the connectivity can be decreased to.98, only 26 runs of the channel selection are required Average number of neighbors established (11 neighbors at 26 round) Number of rounds (channel selection) (26 neighbors at 48 round) Figure 3: The required number of logical neighbors for a completely connected ad hoc wireless network with channels, 4 physical neighbors Figure 4 and Figure 5 show that the accumulated average number of logical neighbors with respect to the number of channel selections with given average 15 and 4 physical neighbors respectively. When nodes form an ad hoc network, they start to select a channel in order to find enough number of logical neighbors to share a key, which is used for frequency hopping. When there are available channels, in order to have at least one channel, a node should perform random channel selection about 5 times with 15 physical neighbors and 2 times with 4 physical neighbors. In case of 512 channels, in both cases, a node cannot get one neighbor even after 1 times of random channel selections. Average number of neighbors established Number of rounds (channel selection) Figure 4: Average number of logical neighbors according to number of channel selection with 15 physical neighbors 6

7 Average number of neighbors established Number of rounds (channel selection) Figure 5: Average number of logical neighbors according to number of channel selection with 4 physical neighbors 7 Conclusion In this paper, we have developed a protocol to ensure communications in the presence of jammers. Our protocol offers flexibility for designers to suit the different environments of deployment. The simplicity of this approach is one of its merits. With the increase in the number of wireless users, jamming is an important problem that has to be addressed. In this effort we have presented a solution to address the problem. Several research directions can be pursued. Simulating jammers and studying the performance of our protocol would be the first thing to do. We have presented a theoretical analysis for the success of a jammer, but a simulation or an implementation would strengthen our claims. Smart jamming is one more thing we would have to investigate to make our paper complete. References [1] standards. [2] R. A.Poisel. Modern communications jamming principles and techniques, 23. [3] P. Bahl, R. Chandra, and J. Dunagan. Ssch: slotted seeded channel hopping for capacity improvement in ieee ad-hoc wireless networks. In MobiCom 4: Proceedings of the 1th annual international conference on Mobile computing and networking, pages , New York, NY, USA, 24. ACM Press. [4] C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure key distribution for dynamic conferences. In CRYPTO 92: Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology, pages , London, UK, Springer- Verlag. [5] H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, May 23. [6] Y. Desmedt, R. Safavi-Naini, H. Wang, C. Charnes, and J. Pieprzyk. Broadcast anti-jamming systems. In Seventh IEEE International Conference on Networks (ICON 99), page 349, [7] L. Eschenauer and V. D. Gligor. A key-management scheme for distributed sensor networks. In CCS 2: Proceedings of the 9th ACM conference on Computer and communications security, pages 41 47, New York, NY, USA, 22. ACM Press. [8] J. A. S. T. A. Gang Zhou, Tian He. Rid: Radio interference detection in wireles sensor networks. In IEEE InfoCom 25. [9] V. D. Gligor. Emergent properties in ad-hoc networks: a security perspective. In WiSe 5: Proceedings of the 4th ACM workshop on Wireless security, pages 55 56, New York, NY, USA, 25. ACM Press. [1] B. S. I. Group. Specifications of the bluetooth system. vol. 1 v1.b Core and vol. 2 v1.b Profiles, December [11] D. Liu, P. Ning, and R. Li. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inf. Syst. Secur., 8(1):41 77, 25. [12] U. L.Rohde and J. C.Whitaker. Communications recievers: Principles and design, 2. [13] R. Negi and A. Perrig. Jamming analysis of mac protocols. Technical report, Carnegie Mellon University, 23. [14] G. Noubir. On connectivity in ad hoc network under jamming using directional antennas and mobility. International Conference on Wired /Wireless Internet Communications, 24. [15] A. D. Wood and J. A. Stankovic. Denial of service in sensor networks. Computer, 35(1):54 62, 22. 7

8 [16] W. Xu, T. Wood, W. Trappe, and Y. Zhang. Channel surfing and spatial retreats: defenses against wireless denial of service. In WiSe 4: Proceedings of the 24 ACM workshop on Wireless security, pages 8 89, New York, NY, USA, 24. ACM Press. 8

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Yandong Zheng 1, Hua Guo 1 1 State Key Laboratory of Software Development Environment, Beihang University Beiing

More information

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,

More information

Robust Key Establishment in Sensor Networks

Robust Key Establishment in Sensor Networks Robust Key Establishment in Sensor Networks Yongge Wang Abstract Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like

More information

Interleaving And Channel Encoding Of Data Packets In Wireless Communications

Interleaving And Channel Encoding Of Data Packets In Wireless Communications Interleaving And Channel Encoding Of Data Packets In Wireless Communications B. Aparna M. Tech., Computer Science & Engineering Department DR.K.V.Subbareddy College Of Engineering For Women, DUPADU, Kurnool-518218

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

Randomized Channel Hopping Scheme for Anti-Jamming Communication

Randomized Channel Hopping Scheme for Anti-Jamming Communication Randomized Channel Hopping Scheme for Anti-Jamming Communication Eun-Kyu Lee, Soon Y. Oh, and Mario Gerla Computer Science Department University of California at Los Angeles, Los Angeles, CA, USA {eklee,

More information

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS Xiaohua Li and Wednel Cadeau Department of Electrical and Computer Engineering State University of New York at Binghamton Binghamton, NY 392 {xli, wcadeau}@binghamton.edu

More information

Detection and Prevention of Physical Jamming Attacks in Vehicular Environment

Detection and Prevention of Physical Jamming Attacks in Vehicular Environment Detection and Prevention of Physical Jamming Attacks in Vehicular Environment M-Tech Student 1 Mahendri 1, Neha Sawal 2 Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal,

More information

Control Channel Jamming: Resilience and Identification of Traitors

Control Channel Jamming: Resilience and Identification of Traitors Control Channel Jamming: Resilience and Identification of Traitors Agnes Chan, Xin Liu, Guevara Noubir, Bishal Thapa College of Computer and Information Scinece Northeastern University, Boston, MA 02115

More information

Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service

Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang WINLAB, Rutgers University IAB 2004 Roadmap Motivation and Introduction

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #4 Physical Layer Threats; Jamming 2016 Patrick Tague 1 Class #4 PHY layer basics and threats Jamming 2016 Patrick Tague 2 PHY 2016 Patrick Tague

More information

Two Improvements of Random Key Predistribution for Wireless Sensor Networks

Two Improvements of Random Key Predistribution for Wireless Sensor Networks Two Improvements of Random Key Predistribution for Wireless Sensor Networks Jiří Kůr, Vashek Matyáš, Petr Švenda Faculty of Informatics Masaryk University Capture resilience improvements Collision key

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure

USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure An Liu, Peng Ning, Huaiyu Dai, Yao Liu North Carolina State University, Raleigh, NC 27695 {aliu3,

More information

Using Channel Hopping to Increase Resilience to Jamming Attacks

Using Channel Hopping to Increase Resilience to Jamming Attacks Using Channel Hopping to Increase 82.11 Resilience to Jamming Attacks Vishnu Navda, Aniruddha Bohra, Samrat Ganguly NEC Laboratories America {vnavda,bohra,samrat}@nec-labs.com Dan Rubenstein Columbia University

More information

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE.

Coding aware routing in wireless networks with bandwidth guarantees. IEEEVTS Vehicular Technology Conference Proceedings. Copyright IEEE. Title Coding aware routing in wireless networks with bandwidth guarantees Author(s) Hou, R; Lui, KS; Li, J Citation The IEEE 73rd Vehicular Technology Conference (VTC Spring 2011), Budapest, Hungary, 15-18

More information

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer

More information

Designing Secure and Reliable Wireless Sensor Networks

Designing Secure and Reliable Wireless Sensor Networks Designing Secure and Reliable Wireless Sensor Networks Osman Yağan" Assistant Research Professor, ECE" Joint work with J. Zhao, V. Gligor, and F. Yavuz Wireless Sensor Networks Ø Distributed collection

More information

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks

Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Multiple Receiver Strategies for Minimizing Packet Loss in Dense Sensor Networks Bernhard Firner Chenren Xu Yanyong Zhang Richard Howard Rutgers University, Winlab May 10, 2011 Bernhard Firner (Winlab)

More information

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic

More information

/13/$ IEEE

/13/$ IEEE A Game-Theoretical Anti-Jamming Scheme for Cognitive Radio Networks Changlong Chen and Min Song, University of Toledo ChunSheng Xin, Old Dominion University Jonathan Backens, Old Dominion University Abstract

More information

Wireless Sensor Networks

Wireless Sensor Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia June 19, 2007 Wireless

More information

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia Wireless Sensor Networks

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #4 OMNET++ Intro; Physical Layer Threats 2015 Patrick Tague 1 Class #4 OMNET++ Intro PHY layer basics and threats 2015 Patrick Tague 2 Intro to

More information

PROBABILISTIC MITIGATION OF CONTROL CHANNEL JAMMING VIA RANDOM KEY DISTRIBUTION

PROBABILISTIC MITIGATION OF CONTROL CHANNEL JAMMING VIA RANDOM KEY DISTRIBUTION PROBABILISTIC MITIGATION OF CONTROL CHANNEL JAMMING VIA RANDOM KEY DISTRIBUTION Patrick Tague, Mingyan Li, and Radha Poovendran Network Security Lab NSL, Department of Electrical Engineering, University

More information

IJSER 1. INTRODUCTION 2. ANALYSIS

IJSER 1. INTRODUCTION 2. ANALYSIS International Journal of Scientific & Engineering Research, Volume 6, Issue 10, October-2015 1011 Packet-Hiding Methods for Preventing Selective Jamming Attacks Guttula Pavani Abstract The open nature

More information

Achieving Network Consistency. Octav Chipara

Achieving Network Consistency. Octav Chipara Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures

More information

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 AN ATTEMPT TO FIND A SOLUTION FOR DESTRUCTING JAMMING PROBLEMS USING GAME THERORITIC ANALYSIS Abstract Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 1 P. G Scholar, E-mail: ghowsegk2326@gmail.com 2 Assistant

More information

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Security in Sensor Networks Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Mobile Ad-hoc Networks (MANET) Mobile Random and perhaps constantly changing

More information

Thwarting Control-Channel Jamming Attacks from Inside Jammers

Thwarting Control-Channel Jamming Attacks from Inside Jammers IEEE TRANSACTIONS ON OBILE COPUTING, VOL. X, NO. X, 1 Thwarting Control-Channel Jamming Attacks from Inside Jammers Sisi Liu, Student ember, IEEE, Loukas Lazos, ember, IEEE, and arwan runz, Fellow, IEEE

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication

More information

Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods

Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods S.B.Gavali 1, A. K. Bongale 2 and A.B.Gavali 3 1 Department of Computer Engineering, Dr.D.Y.Patil College of Engineering,

More information

Partial overlapping channels are not damaging

Partial overlapping channels are not damaging Journal of Networking and Telecomunications (2018) Original Research Article Partial overlapping channels are not damaging Jing Fu,Dongsheng Chen,Jiafeng Gong Electronic Information Engineering College,

More information

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA and Improvement with PCF in TORA using OPNET tool Anupam Sharma, Deepinderjeet Kaur Dhaliwal Desh Bhagat University Mandi Gobindgarh Punjab

More information

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller

Medium Access Control. Wireless Networks: Guevara Noubir. Slides adapted from Mobile Communications by J. Schiller Wireless Networks: Medium Access Control Guevara Noubir Slides adapted from Mobile Communications by J. Schiller S200, COM3525 Wireless Networks Lecture 4, Motivation Can we apply media access methods

More information

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification

More information

BASIC CONCEPTS OF HSPA

BASIC CONCEPTS OF HSPA 284 23-3087 Uen Rev A BASIC CONCEPTS OF HSPA February 2007 White Paper HSPA is a vital part of WCDMA evolution and provides improved end-user experience as well as cost-efficient mobile/wireless broadband.

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #8 Interference and Jamming Announcements Homework #1 is due today Questions? Not everyone has signed up for a Survey These are required,

More information

Secure Pairwise Key Establishment in Large-scale Sensor Networks: An Area Partitioning and Multi-group Key Predistribution Approach

Secure Pairwise Key Establishment in Large-scale Sensor Networks: An Area Partitioning and Multi-group Key Predistribution Approach Secure Pairwise Key Establishment in Large-scale Sensor Networks: An Area Partitioning and Multi-group Key Predistribution Approach Dijiang Huang Arizona State University Deep Medhi University of Missouri

More information

An Effective Defensive Node against Jamming Attacks in Sensor Networks

An Effective Defensive Node against Jamming Attacks in Sensor Networks International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 6ǁ June. 2013 ǁ PP.41-46 An Effective Defensive Node against Jamming Attacks in Sensor

More information

Minimization of Jamming Attack in Wireless Broadcast Networks Using Neighboring Node Technique

Minimization of Jamming Attack in Wireless Broadcast Networks Using Neighboring Node Technique International Journal of Scientific and Research Publications, Volume 2, Issue 5, May 2012 1 Minimization of Jamming Attack in Wireless Broadcast Networks Using Neighboring Node Technique R.Priyadarshini,

More information

Improving Reliability of Jamming Attack Detection in Ad hoc Networks

Improving Reliability of Jamming Attack Detection in Ad hoc Networks Improving Reliability of Jamming Attack Detection in Ad hoc Networks Geethapriya Thamilarasu 1, Sumita Mishra 2 and Ramalingam Sridhar 3 1 State University of New York, Institute of Technology, Utica,

More information

A Combinatorial Framework for Frequency Hopping Multiple Access

A Combinatorial Framework for Frequency Hopping Multiple Access Fourteenth International Workshop on Algebraic and Combinatorial Coding Theory September 7 13, 2014, Svetlogorsk (Kaliningrad region), Russia pp. 271 276 A Combinatorial Framework for Frequency Hopping

More information

Wi-Fi. Wireless Fidelity. Spread Spectrum CSMA. Ad-hoc Networks. Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering

Wi-Fi. Wireless Fidelity. Spread Spectrum CSMA. Ad-hoc Networks. Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering Wi-Fi Wireless Fidelity Spread Spectrum CSMA Ad-hoc Networks Engr. Mian Shahzad Iqbal Lecturer Department of Telecommunication Engineering Outline for Today We learned how to setup a WiFi network. This

More information

Multiple Access Methods

Multiple Access Methods Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Multiple Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 16.11.2004 Content of presentation Protocol

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster

INTRODUCTION TO WIRELESS SENSOR NETWORKS. CHAPTER 3: RADIO COMMUNICATIONS Anna Förster INTRODUCTION TO WIRELESS SENSOR NETWORKS CHAPTER 3: RADIO COMMUNICATIONS Anna Förster OVERVIEW 1. Radio Waves and Modulation/Demodulation 2. Properties of Wireless Communications 1. Interference and noise

More information

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu

More information

CS434/534: Topics in Networked (Networking) Systems

CS434/534: Topics in Networked (Networking) Systems CS434/534: Topics in Networked (Networking) Systems Wireless Foundation: Wireless Mesh Networks Yang (Richard) Yang Computer Science Department Yale University 08A Watson Email: yry@cs.yale.edu http://zoo.cs.yale.edu/classes/cs434/

More information

Jamming Attacks with its Various Techniques and AODV in Wireless Networks

Jamming Attacks with its Various Techniques and AODV in Wireless Networks IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 4 Ver. II (Jul. Aug. 2016), PP 48-52 www.iosrjournals.org Jamming Attacks with its

More information

Performance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming Attacks in WLAN

Performance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming Attacks in WLAN IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 02 July 2016 ISSN (online): 2349-6010 Performance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming

More information

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks M. KIRAN KUMAR 1, M. KANCHANA 2, I. SAPTHAMI 3, B. KRISHNA MURTHY 4 1, 2, M. Tech Student, 3 Asst. Prof 1, 4, Siddharth Institute

More information

An Opportunistic Frequency Channels Selection Scheme for Interference Minimization

An Opportunistic Frequency Channels Selection Scheme for Interference Minimization Proceedings of 2014 Zone 1 Conference of the American Society for Engineering Education (ASEE Zone 1) An Opportunistic Frequency Channels Selection Scheme for Interference Minimization 978-1-4799-5233-5/14/$31.00

More information

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access Spread Spectrum Chapter 18 FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access Single Carrier The traditional way Transmitted signal

More information

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel

More information

Multiple Access System

Multiple Access System Multiple Access System TDMA and FDMA require a degree of coordination among users: FDMA users cannot transmit on the same frequency and TDMA users can transmit on the same frequency but not at the same

More information

An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (M2M) Networks

An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (M2M) Networks 1 An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (MM) Networks Chen-Yu Hsu, Chi-Hsien Yen, and Chun-Ting Chou Department of Electrical Engineering National Taiwan University {b989117,

More information

All Your Jammers Belong To Us - Localization of Wireless Sensors Under Jamming Attack

All Your Jammers Belong To Us - Localization of Wireless Sensors Under Jamming Attack All Your ammers Belong To Us - Localization of Wireless Sensors Under amming Attack Yu Seung Kim, Frank Mokaya, Eric Chen, and Patrick Tague Electrical and Computer Engineering Carnegie Mellon University

More information

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Avoiding Selective Attacks with using Packet Hiding Approaches in Wireless Network

Avoiding Selective Attacks with using Packet Hiding Approaches in Wireless Network Avoiding Selective Attacks with using Packet Hiding Approaches in Wireless Network Patel Dhaval Dhirubhai 1, Singh Kashkumar Nirmalsingh 2 1 Computer Network and Engineering, EastWest Institute of Technology,

More information

Medium Access Control

Medium Access Control CMPE 477 Wireless and Mobile Networks Medium Access Control Motivation for Wireless MAC SDMA FDMA TDMA CDMA Comparisons CMPE 477 Motivation Can we apply media access methods from fixed networks? Example

More information

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( )

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( ) CHAPTER 2 Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication (2170710) Syllabus Chapter-2.4 Spread Spectrum Spread Spectrum SS was developed initially for military and intelligence

More information

Lecture on Sensor Networks

Lecture on Sensor Networks Lecture on Sensor Networks Copyright (c) 2008 Dr. Thomas Haenselmann (University of Mannheim, Germany). Permission is granted to copy, distribute and/or modify this document under the terms of the GNU

More information

A Framework for Energy-efficient Adaptive Jamming of Adversarial Communications

A Framework for Energy-efficient Adaptive Jamming of Adversarial Communications A Framework for Energy-efficient Adaptive Jamming of Adversarial Communications Jiasi Chen, Soumya Sen, Mung Chiang Princeton University Princeton, NJ, USA David J. Dorsey Lockheed Martin ATL Cherry Hill,

More information

Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques

Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques 1 Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques Ju-Yen Hung and Venkatesh Sarangan *, MSCS 219, Computer Science Department, Oklahoma State University, Stillwater,

More information

Mobile Communications

Mobile Communications COMP61242 Mobile Communications Lecture 7 Multiple access & medium access control (MAC) Barry Cheetham 16/03/2018 Lecture 7 1 Multiple access Communication links by wire or radio generally provide access

More information

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks

More information

Wormhole-Based Anti-Jamming Techniques in Sensor. Networks

Wormhole-Based Anti-Jamming Techniques in Sensor. Networks Wormhole-Based Anti-Jamming Techniques in Sensor Networks Mario Čagalj Srdjan Čapkun Jean-Pierre Hubaux Laboratory for Computer Communications and Applications (LCA) Faculty of Informatics and Communication

More information

Revisiting Neighbor Discovery with Interferences Consideration

Revisiting Neighbor Discovery with Interferences Consideration Author manuscript, published in "3rd ACM international workshop on Performance Evaluation of Wireless Ad hoc, Sensor and Ubiquitous Networks (PEWASUN ) () 7-1" DOI : 1.115/1131.1133 Revisiting Neighbor

More information

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,

More information

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.955

More information

Chapter 2 Overview. Duplexing, Multiple Access - 1 -

Chapter 2 Overview. Duplexing, Multiple Access - 1 - Chapter 2 Overview Part 1 (2 weeks ago) Digital Transmission System Frequencies, Spectrum Allocation Radio Propagation and Radio Channels Part 2 (last week) Modulation, Coding, Error Correction Part 3

More information

Analysis and Optimization on Jamming-resistant Collaborative Broadcast in Large-Scale Networks

Analysis and Optimization on Jamming-resistant Collaborative Broadcast in Large-Scale Networks Analysis and Optimization on Jamming-resistant Collaborative Broadcast in Large-Scale Networks Chengzhi Li, Huaiyu Dai, Liang Xiao 2 and Peng Ning 3 ECE Dept, 2 Dept Comm Engineering, 3 CS Dept, NC State

More information

Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling

Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling Efficient Method of Secondary Users Selection Using Dynamic Priority Scheduling ABSTRACT Sasikumar.J.T 1, Rathika.P.D 2, Sophia.S 3 PG Scholar 1, Assistant Professor 2, Professor 3 Department of ECE, Sri

More information

The Pennsylvania State University The Graduate School COMPROMISE-RESILIENT ANTI-JAMMING COMMUNICATION IN WIRELESS SENSOR NETWORKS

The Pennsylvania State University The Graduate School COMPROMISE-RESILIENT ANTI-JAMMING COMMUNICATION IN WIRELESS SENSOR NETWORKS The Pennsylvania State University The Graduate School COMPROMISE-RESILIENT ANTI-JAMMING COMMUNICATION IN WIRELESS SENSOR NETWORKS A Thesis in Computer Science and Engineering by Xuan Jiang c 2011 Xuan

More information

Exercise Data Networks

Exercise Data Networks (due till January 19, 2009) Exercise 9.1: IEEE 802.11 (WLAN) a) In which mode of operation is this network in? b) Why is the start of the back-off timers delayed until the DIFS contention phase? c) How

More information

Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying

Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying Achievable Transmission Capacity of Cognitive Radio Networks with Cooperative Relaying Xiuying Chen, Tao Jing, Yan Huo, Wei Li 2, Xiuzhen Cheng 2, Tao Chen 3 School of Electronics and Information Engineering,

More information

Wireless Networked Systems

Wireless Networked Systems Wireless Networked Systems CS 795/895 - Spring 2013 Lec #4: Medium Access Control Power/CarrierSense Control, Multi-Channel, Directional Antenna Tamer Nadeem Dept. of Computer Science Power & Carrier Sense

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer

Politecnico di Milano Advanced Network Technologies Laboratory. Beyond Standard MAC Sublayer Politecnico di Milano Advanced Network Technologies Laboratory Beyond Standard 802.15.4 MAC Sublayer MAC Design Approaches o Conten&on based n Allow collisions n O2en CSMA based (SMAC, STEM, Z- MAC, GeRaF,

More information

ISSN Vol.06,Issue.09, October-2014, Pages:

ISSN Vol.06,Issue.09, October-2014, Pages: ISSN 2348 2370 Vol.06,Issue.09, October-2014, Pages:882-886 www.ijatir.org Wireless Network Packet Classification Selective Jamming Attacks VARTIKA GUPTA 1, M.VINAYA BABU 2 1 PG Scholar, Vishnu Sree Institute

More information

On the Performance of Cooperative Routing in Wireless Networks

On the Performance of Cooperative Routing in Wireless Networks 1 On the Performance of Cooperative Routing in Wireless Networks Mostafa Dehghan, Majid Ghaderi, and Dennis L. Goeckel Department of Computer Science, University of Calgary, Emails: {mdehghan, mghaderi}@ucalgary.ca

More information

Power-Modulated Challenge-Response Schemes for Verifying Location Claims

Power-Modulated Challenge-Response Schemes for Verifying Location Claims Power-Modulated Challenge-Response Schemes for Verifying Location Claims Yu Zhang, Zang Li, Wade Trappe WINLAB, Rutgers University, Piscataway, NJ 884 {yu, zang, trappe}@winlab.rutgers.edu Abstract Location

More information

UNIT- 3. Introduction. The cellular advantage. Cellular hierarchy

UNIT- 3. Introduction. The cellular advantage. Cellular hierarchy UNIT- 3 Introduction Capacity expansion techniques include the splitting or sectoring of cells and the overlay of smaller cell clusters over larger clusters as demand and technology increases. The cellular

More information

Cognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks

Cognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks Cognitive Wireless Network 15-744: Computer Networking L-19 Cognitive Wireless Networks Optimize wireless networks based context information Assigned reading White spaces Online Estimation of Interference

More information

Ad Hoc Networks - Routing and Security Issues

Ad Hoc Networks - Routing and Security Issues Ad Hoc Networks - Routing and Security Issues Mahalingam Ramkumar Mississippi State University, MS January 25, 2005 1 2 Some Basic Terms Basic Terms Ad Hoc vs Infrastructured AHN MANET (Mobile Ad hoc NETwork)

More information

Fault-tolerant Coverage in Dense Wireless Sensor Networks

Fault-tolerant Coverage in Dense Wireless Sensor Networks Fault-tolerant Coverage in Dense Wireless Sensor Networks Akshaye Dhawan and Magdalena Parks Department of Mathematics and Computer Science, Ursinus College, 610 E Main Street, Collegeville, PA, USA {adhawan,

More information

Efficient rekeying algorithms for WiMAX networks

Efficient rekeying algorithms for WiMAX networks SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks. 2009; 2:392 400 Published online 30 July 2009 in Wiley InterScience (www.interscience.wiley.com).124 Efficient rekeying algorithms for WiMAX

More information

Wireless Communication

Wireless Communication Wireless Communication Systems @CS.NCTU Lecture 9: MAC Protocols for WLANs Fine-Grained Channel Access in Wireless LAN (SIGCOMM 10) Instructor: Kate Ching-Ju Lin ( 林靖茹 ) 1 Physical-Layer Data Rate PHY

More information

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks Jingpu Shi Theodoros Salonidis Edward Knightly Networks Group ECE, University Simulation in single-channel multi-hop

More information

Chapter 4: Directional and Smart Antennas. Prof. Yuh-Shyan Chen Department of CSIE National Taipei University

Chapter 4: Directional and Smart Antennas. Prof. Yuh-Shyan Chen Department of CSIE National Taipei University Chapter 4: Directional and Smart Antennas Prof. Yuh-Shyan Chen Department of CSIE National Taipei University 1 Outline Antennas background Directional antennas MAC and communication problems Using Directional

More information

INTEGRATED APPROACH TO DEFEND JAMMING ATTACK IN WSN

INTEGRATED APPROACH TO DEFEND JAMMING ATTACK IN WSN International Journal of Computer Engineering & Technology (IJCET) Volume 9, Issue 3, May-June 2018, pp. 148 158, Article ID: IJCET_09_03_017 Available online at http://www.iaeme.com/ijcet/issues.asp?jtype=ijcet&vtype=9&itype=3

More information

FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL

FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL U.P.B. Sci. Bull., Series C, Vol. 79, Iss. 4, 2017 ISSN 2286-3540 FPGA-BASED DESIGN AND IMPLEMENTATION OF THREE-PRIORITY PERSISTENT CSMA PROTOCOL Xu ZHI 1, Ding HONGWEI 2, Liu LONGJUN 3, Bao LIYONG 4,

More information

Continuous Monitoring Techniques for a Cognitive Radio Based GSM BTS

Continuous Monitoring Techniques for a Cognitive Radio Based GSM BTS NCC 2009, January 6-8, IIT Guwahati 204 Continuous Monitoring Techniques for a Cognitive Radio Based GSM BTS Baiju Alexander, R. David Koilpillai Department of Electrical Engineering Indian Institute of

More information

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor Avoiding Interference in the 2.4-GHz ISM Band Designers can create frequency-agile 2.4 GHz designs using procedures provided by standards bodies or by building their own protocol. By Ryan Winfield Woodings

More information

Efficient Anti-Jamming Technique Based on Detecting a Hopping Sequence of a Smart Jammer

Efficient Anti-Jamming Technique Based on Detecting a Hopping Sequence of a Smart Jammer IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 12, Issue 3 Ver. II (May June 2017), PP 118-123 www.iosrjournals.org Efficient Anti-Jamming

More information

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,

More information

Chutima Prommak and Boriboon Deeka. Proceedings of the World Congress on Engineering 2007 Vol II WCE 2007, July 2-4, 2007, London, U.K.

Chutima Prommak and Boriboon Deeka. Proceedings of the World Congress on Engineering 2007 Vol II WCE 2007, July 2-4, 2007, London, U.K. Network Design for Quality of Services in Wireless Local Area Networks: a Cross-layer Approach for Optimal Access Point Placement and Frequency Channel Assignment Chutima Prommak and Boriboon Deeka ESS

More information

Trust Based Suspicious Route Categorization for Wireless Networks and its Applications to Physical Layer Attack S. RAJA RATNA 1, DR. R.

Trust Based Suspicious Route Categorization for Wireless Networks and its Applications to Physical Layer Attack S. RAJA RATNA 1, DR. R. Trust Based Suspicious Route Categorization for Wireless Networks and its Applications to Physical Layer Attack S. RAJA RATNA 1, DR. R. RAVI 2 1 Research Scholar, Department of Computer Science and Engineering,

More information