Anti-Jamming Schemes to Prevent Selective Jamming Attacks

International Journal of Computer Trends and Technology (IJCTT)          
© - November Issue 2013 by IJCTT Journal
Volume-5 Issue-1                           
Year of Publication : 2013
Authors :Ramesh Kande , B.Madhura Vani.


Ramesh Kande , B.Madhura Vani."Anti-Jamming Schemes to Prevent Selective Jamming Attacks"International Journal of Computer Trends and Technology (IJCTT),V5(1):20-25 November Issue 2013 .ISSN Published by Seventh Sense Research Group.

Abstract:- Wireless networks are more vulnerable to interference attacks as they are open in nature. These attacks are also known as Denial-of-Service attacks that cause some sort of jamming in the network. Jamming problem has been around in wirelessnetworks. Many existing solutions to prevent jamming attacks employed external threat model. However, there is possibility of internal attacks. Adversaries with good knowledge of network details including protocol specifications and other secret can make jamming attacks that are not easy to handle. Such attacks are named as selective jamming attacks as they are active for very short span of time that focus on messages with highest significance. Recently Proan˜o and Lazos proposed an internal threat model to handle selective jamming attacks. They also provided three schemes for preventing selective jamming attacks. In this built a prototype application in Java platform to implement the schemes for preventing selective jamming attacks. Experimental results revealed that the prototype can be used in real world wireless networks.


References -

[1] W. Xu, T. Wood, W. Trappe, and Y. Zhang, “Channel Surfing andSpatial Retreats: Defenses against Wireless Denial of Service,”Proc. Third ACM Workshop Wireless Security, pp. 80-89, 2004.
[2] W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The Feasibility ofLaunching and Detecting Jamming Attacks in Wireless Networks,”Proc. ACM Int’l Symp. Mobile Ad Hoc Networking andComputing (MobiHoc), pp. 46-57, 2005.
[3] G. Noubir and G. Lin, “Low-Power DoS Attacks in Data WirelessLans and Countermeasures,” Mobile Computing and Comm. Rev.,vol. 7, no. 3, pp. 29-30, 2003.
[4] L. Lazos, S. Liu, and M. Krunz, “Mitigating Control-ChannelJamming Attacks in Multi-Channel Ad Hoc Networks,” Proc.Second ACM Conf. Wireless Network Security, pp. 169-180, 2009.
[5] M.K. Simon, J.K. Omura, R.A. Scholtz, and B.K. Levitt, SpreadSpectrum Communications Handbook.McGraw-Hill, 2001.
[6] D. Thuente and M. Acharya, “Intelligent Jamming in WirelessNetworks with Applications to 802.11 b and Other Networks,”Proc. IEEE Military Comm. Conf. (MILCOM), 2006.
[7] T.X. Brown, J.E. James, and A. Sethi, “Jamming and Sensing ofEncrypted Wireless Ad Hoc Networks,” Proc. ACM Int’l Symp.Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 120-130,2006.
[8] M. Wilhelm, I. Martinovic, J. Schmitt, and V. Lenders, “ReactiveJamming in Wireless Networks: How Realistic Is the Threat,” Proc.ACM Conf. Wireless Network Security (WiSec), 2011.
[9] Alejandro Proan˜o and Loukas Lazos, “Packet-Hiding Methods for Preventing Selective Jamming Attacks”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 1, JANUARY/FEBRUARY 2012.
[10] T. Dempsey, G. Sahin, Y. Morton, and C. Hopper, “Intelligent Sensing and Classification in Ad Hoc Networks: A Case Study,” IEEE Aerospace and Electronic Systems Magazine, vol. 24, no. 8, pp. 23-30, Aug. 2009.
[11] X. Liu, G. Noubir, and R. Sundaram, “Spread: Foiling Smart Jammers Using Multi-Layer Agility,” Proc. IEEE INFOCOM, pp. 2536-2540, 2007.
[12] B. Greenstein, D. Mccoy, J. Pang, T. Kohno, S. Seshan, and D. Wetherall, “Improving Wireless Privacy with an Identifier-Free Link Layer Protocol,” Proc. Int’l Conf. Mobile Systems, Applications, and Services (MobiSys), 2008.
[13] B. Thapa, G. Noubir, R. Rajaramanand, and B. Sheng, “On the Robustness of IEEE802.11 Rate Adaptation Algorithms against Smart Jamming,” Proc. ACM Conf. Wireless Network Security (WiSec), 2011.
[14] A. Chan, X. Liu, G. Noubir, and B. Thapa, “Control Channel Jamming: Resilience and Identification of Traitors,” Proc. IEEE Int’l Symp. Information Theory (ISIT), 2007.
[15] P. Tague, M. Li, and R. Poovendran, “Mitigation of Control Channel Jamming under Node Capture Attacks,” IEEE Trans. Mobile Computing, vol. 8, no. 9, pp. 1221-1234, Sept. 2009.
[16] P. Tague, M. Li, and R. Poovendran, “Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution,” Proc. IEEE Int’l Symp.Personal, Indoor and Mobile Radio Comm. (PIMRC), 2007.
[17] M. Strasser, C. Po¨pper, and S. _Capkun, “Efficient Uncoordinated fhss Anti-Jamming Communication,” Proc. ACM Int’l Symp.Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 207-218, 2009.
[18] Y. Desmedt, “Broadcast Anti-Jamming Systems,” Computer Networks, vol. 35, nos. 2/3, pp. 223-236, Feb. 2001.
[19] C. Po¨pper, M. Strasser, and S. _Capkun, “Jamming-Resistant Broadcast
[20] G. Lin and G. Noubir, “On Link Layer Denial of Service in Data Wireless LANs,” Wireless Comm. and Mobile Computing, vol. 5, no. 3, pp. 273-284, May 2004.

Keywords :— Wireless networks,selective jamming attacks, packet classification