Advertisement

Security and Efficiency Analysis of Anti-jamming Techniques

  • S. Kshipra Prasadh
  • Sumit Kumar JindalEmail author
Conference paper
  • 2 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1122)

Abstract

Internet of Things has resulted in ubiquitous computing, where all IoT devices are connected almost all the time, to provide continuous services. This makes the network prone to several attacks, one such attack being the Direct Denial of Service (DDoS) attack. Jamming, which is the use of malicious nodes to deliberately lower Signal to Noise ratio (SNR), is a subset of DDoS attacks, which affects physical layer devices and channels, and can cause errors in the upper layers. Anti-jamming techniques, which are used to mitigate the effects of jamming, must be analyzed from the security and efficiency perspective. In this paper, anti-jamming techniques and protocols, viz. JAM- Jammed Area Mapping, Channel surfing and spatial retreat, channel hopping, reactive jamming detection and trigger node detection; are compared with respect to security and efficiency parameters. The suitable techniques are finally selected for specific use cases.

Keywords

Jamming Device layer Signal to noise ratio Nodes Bit error rate Collision 

References

  1. 1.
    Alnifie, G., Simon, R.: A multi-channel defense against jamming attacks in wireless sensor networks. In: Proceedings of the 3rd ACM Workshop on QoS and Security for Wireless and Mobile Networks, pp. 95–104 (2007)Google Scholar
  2. 2.
    Bayraktaroglu, E., King, C., Liu, X., Noubir, G., Rajaraman, R., Thapa, B.: On the performance of IEEE 802.11 under jamming. In: IEEE the 27th Conference on Computer Communications, pp. 1265–1273 (2008)Google Scholar
  3. 3.
    Bellardo, J., Savage, S.: 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In: Proceedings of the 12th Conference on USENIX Security Symposium, pp. 15–28 (2003)Google Scholar
  4. 4.
    Broustis, I., Pelechrinis, K., Syrivelis, D., Krishnamurthy, S.V., Tassiulas, L.: FIJI: fighting implicit jamming in 802.11 WLANs. In: Security and Privacy in Communication Networks, vol. 19, pp. 21–40 (2009)Google Scholar
  5. 5.
    Chiang, J.T., Hu, Y.C.: Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Trans. Netw. 19(1), 286–298 (2011)CrossRefGoogle Scholar
  6. 6.
    Commander, C.W., Pardalos, P.M., Ryabchenko, V., Shylo, O.V., Uryasev, S., Zrazhevsky, G.: Jamming communication networks under complete uncertainty. Optimization Letters 2(1), 53–70 (2008)MathSciNetCrossRefGoogle Scholar
  7. 7.
    Gencer, C., Aydogan, E.K., Celik, C.: A decision support system for locating VHF/UHF radio jammer systems on the terrain. Information Systems Frontiers 10(1), 111–124 (2008)CrossRefGoogle Scholar
  8. 8.
    Gollakota, S., Katabi, D.: iJam: jamming oneself for secure wireless communication. Technical report, Massachusetts Institute of Technology (2010)Google Scholar
  9. 9.
    Andrea, I., Chrysostomou, C., Hadjichristofi, G.: Internet of Things: security vulnerabilities and challenges. In: 2015 IEEE Symposium on Computers and Communication (ISCC), 6 July 2015, pp. 180–187. IEEE (2015)Google Scholar
  10. 10.
    Aman, M.N., Chua, K.C., Sikdar, B.: Position paper: physical unclonable functions for IoT security. In: Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, 30 May 2016, pp. 10–13. ACM (2016)Google Scholar
  11. 11.
    Fang, H., Xu, L., Zou, Y., Wang, X., Choo, K.K.: Three-stage Stackelberg game for defending against full-duplex active eavesdropping attacks in cooperative communication. IEEE Trans. Veh. Technol. 67(11), 10788–10799 (2018)CrossRefGoogle Scholar
  12. 12.
    Bharathi, S., Kumar, D., Ram, D.: Defence against responsive and non-responsive jamming attack in cognitive radio networks: an evolutionary game theoretical approach. J. Eng. 2018(2), 68–75 (2018)Google Scholar
  13. 13.
    Chen, Y., Li, Y., Xu, D., Xiao, L.: Dqn-based power control for IoT transmission against jamming. In: 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 3 June 2018, pp. 1–5. IEEE (2018)Google Scholar
  14. 14.
    Bany Salameh, H., Almajali, S., Ayyash, M., Elgala, H.: Spectrum assignment in cognitive radio networks for Internet-of-Things delay-sensitive applications under jamming attacks, 2327–4662.  https://doi.org/10.1109/JIOT.2018.2817339CrossRefGoogle Scholar
  15. 15.
    Garnaev, A., Trappe, W., Petropulu, A.: An anti-jamming strategy when it is unknown which receivers will face with smart interference. In: International Conference on Wired/Wireless Internet Communication 18 June 2018, pp. 195–206. Springer, Cham (2018)Google Scholar
  16. 16.
    Bany Salameh, H., Almajali, S., Ayyash, M., Elgala, H.: Batch-based security-aware spectrum sharing with simultaneous assignment decisions in time-critical IoT networks with cognitive radio capabilities. Trans. Emerg. Telecommun. Technol. 29(11), e3317 (2018)CrossRefGoogle Scholar

Copyright information

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.School of Electronics EngineeringVellore Institute of TechnologyVelloreIndia

Personalised recommendations