Survey on Jamming Wireless Networks: Attacks and Prevention Strategies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32804
Survey on Jamming Wireless Networks: Attacks and Prevention Strategies

Authors: S. Raja Ratna, R. Ravi

Abstract:

Wireless networks are built upon the open shared medium which makes easy for attackers to conduct malicious activities. Jamming is one of the most serious security threats to information economy and it must be dealt efficiently. Jammer prevents legitimate data to reach the receiver side and also it seriously degrades the network performance. The objective of this paper is to provide a general overview of jamming in wireless network. It covers relevant works, different jamming techniques, various types of jammers and typical prevention techniques. Challenges associated with comparing several anti-jamming techniques are also highlighted.

Keywords: Channel, Cryptography, Frequency, Jamming, Legitimate, Security, Wavelength.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1110295

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3109

References:


[1] G. T. Amariucai, “Physical layer security in wireless networks: Intelligent jamming and eavesdropping”, Ph. D thesis, Louisiana State University, Louisiana, 2009.
[2] A. D. Wyner, “The wire-tap channel,” The Bell System Technical Journal, vol. 54, pp. 1355–1387, Oct. 1975.
[3] W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The feasibility of launching and detecting jamming attacks in wireless networks,” MobiHoc 05, pp 46-57, May 2005.
[4] Konstantinos Pelechrinis, Marios Iliofotou and Srikanth V. Krishnamurthy, “Denial of Service Attacks in Wireless Networks: The Case of Jammers”, IEEE Communications Surveys & Tutorials, vol. 13, no. 2, pp.245-257, April 2011.
[5] M. Acharya and D. Thuente, “Intelligent jamming attacks, counterattacks and (counter)2 attacks in 802.11b wireless networks,” In Proceedings of OPNETWORK Conference, Aug. 2005.
[6] L. Lazos, S. Liu, and M. Krunz, “Mitigating control-channel jamming attacks in multi-channel ad hoc networks”, In Proceedings of the 2nd ACM conference on wireless network security, pp.169–180, March 2009.
[7] G. Noubir and G. Lin, “Low-power DoS attacks in data wireless lans and countermeasures” Mobile Computing and Communications Review, vol.7, no.3, pp.29–30, July 2003.
[8] Y. Liu, P. Ning, H. Dai, and A. Liu, “Randomized differential DSSS: Jamming-resistant wireless broadcast communication”, IEEE Proceedings of INFOCOM, pp. 1-9, March 2010.
[9] W. Xu, T. Wood, W. Trappe, and Y. Zhang, ”Channel surfing and spatial retreats: Defenses against wireless denial of service”, In Proceedings of the 3rd ACM workshop on Wireless security, pp. 80–89, 2004
[10] W. Xu, W. Trappe, and Y. Zhang, “Anti-Jamming Timing Channels for Wireless Networks,” Proc. First ACM Conf. Wireless Security, 2008.
[11] Z. Lin and M. V. Schaar, “MAC Layer Jamming Mitigation Using a Game Augmented by Intervention”, EURASIP journal on Wireless Communications and Networking, pp-1-14, no. 78, 2011.
[12] M. Li, I. Koutsopoulos, and R. Poovendran, “Optimal jamming attacks and network defence policies in wireless sensor networks,” In Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM ’07), pp. 1307–1315, May 2007.
[13] B. Awerbuch, A. Richa, and C. Scheideler, “A jamming resistant MAC protocol for single-hop wireless networks,” 27th ACM Symposium on Principles of Distributed Computing (PODC ’08), pp. 45–54, Aug.2008.
[14] U. Patel, T. Biswas, and R. Dutta, “A Routing Approach to Jamming Mitigation in Wireless Multihop Networks”, IEEE Workshop on Local & Metropolitan Area Networks (LANMAN), pp. 1-6, Oct. 2011.
[15] E. Altman, K. Avrachenkov, and A. Garnaev, “A jamming game in wireless networks with transmission cost,” In Proceedings of the 1st EuroFGI International Conference on Network Control and Optimization, pp. 1–12, June 2007.
[16] G. Thamilarasu, S. Mishra and R. Sridhar,” Improving Reliability of Jamming Attack Detection in Ad hoc Networks”, International Journal of Communication Networks and Information Security (IJCNIS), vol. 3, no. 1, pp. 57-66, April 2011.
[17] D. Chen, J. Deng, and P. K. Varshney, “Protecting wireless networks against a denial of service attack based on virtual jamming,” In MOBICOM -Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking, ACM, 2003.
[18] D. Thuente and M. Acharya, “Intelligent jamming in wireless networks with applications to 802.11b and other networks,” in Proceedings of the 25th IEEE Communications Society Military Communications Conference (MILCOM), pp.1075-1081, Oct. 2006.
[19] W. Xu, K. Ma, W. Trappe, and Y. Zhang, “Jamming sensor networks: Attacks and defense strategies,” in IEEE Network, pp.41 - 47, May 2006.
[20] Y. Law, P. Hartel, J. D. Hartog, and P. Havinga, “Link-layer jamming attacks on S-Mac,” in Proc. 2nd Euro. Wksp. Wireless Sensor Network, pp. 217-225, Feb. 2005.
[21] A. Wood and J. Stankovic, “Denial of service in sensor networks,” IEEE Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002.
[22] B. Onings, “PHY and MAC Layer Security in 802.11 Networks”, Ulm University.
[23] J. T. Chiang, and Y. C. Hu, “Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks”, IEEE/ ACM transactions on networking, vol.19, no.1, pp. 286-298, Feb. 2011.
[24] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in mobile ad hoc networks: Challenges and solutions,” IEEE Wireless Communications, vol. 11, no. 1, pp. 38-47, Feb. 2004.
[25] D. Djenouri, L. Khelladi, and N. Badache, “A survey of security issues in mobile ad hoc and sensor networks”, IEEE communications surveys and Tutorials, vol. 7, no.4, pp. 2-8, Dec. 2005.
[26] Y. Zhang, and W. Lee, “Security in Mobile Ad-Hoc Networks”, in Book Ad Hoc Networks Technologies and Protocols (Chapter 9), Springer, 2005.
[27] A. Proano, and L. Lazos, “Packet-hiding methods for preventing selective jamming attacks”, IEEE Transaction Dependable Secure Computing, vol. 9, No.1, pp. 101–114, Jan 2012.
[28] W. Xu, T. Wood, W. Trappe, and Y. Zhang, “Channel surfing and spatial retreats: defenses against wireless denial of service”, In Proceedings of the 3rd ACM workshop on Wireless security, pp. 80–89, 2004.
[29] S. Liu, L. Lazos, and M. Krunz, “Thwarting Inside Jamming Attacks on Wireless Broadcast Communications”, Proceedings of the fourth ACM conference on Wireless network security WiSec’11, pp. 29-40, June 2011.
[30] L. Wang, and A. M. Wyglinski, “A Combined Approach for Distinguishing different Types of Jamming Attacks Against Wireless Networks”, IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PacRim), pp. 809–814, Aug. 2011.
[31] A. Richa, C. Scheideler, S. Schmid, and J. Zhang J, “An Efficient and fair MAC protocol robust to reactive interference”, IEEE/ACM Transaction on. Networking, vol. 21, no. 3, pp.760–771, June 2013.
[32] M. Strasser, B. Danev, and S. Capkun, “Detection of reactive jamming in sensor networks”, ACM Transaction on Sensor Networks, vol. 7, no. 2, pp.1–29, Aug. 2010.
[33] Y. Xuan, Y. Shen, N. P. Nguyen, and M. T. Thai, “A trigger identification service for defending reactive jammers in WSN”, IEEE Transaction on Mobile Computing, vol.11, no.5, pp.793–806, March 2012.
[34] M. Wilhelm, I. Martinovic, J. Schmitt, and V. Lenders, “Reactive jamming in wireless networks: How realistic is the threat?”, In Proceedings of ACM conference on Wireless Network Security, pp. 47- 52, June 2011.
[35] S R Ratna, R Ravi, and B Shekhar, “An Intelligent Approach based on Neuro- Fuzzy Detachment Scheme for Preventing jamming Attack in Wireless Networks”, Journal of Intelligent and fuzzy logic, Doi 10.3233/IFS-141363, in press, Sep. 2014.
[36] D. Tagra, M. Rahman, and S. Sampalli, “Technique for Preventing DOS Attacks on RFID Systems”, IEEE International Conference on Software, Telecommunications and Computer Networks (SoftCOM), pp. 6–10, Sep. 2010.
[37] N. S. Kapo, J. Chen, and L. Wosinska, “A New Approach to Optical Networks Security: Attack-Aware Routing and Wavelength Assignment”, IEEE/ACM Transactions on Networking, vol. 18, no. 3, pp. 750-760, June 2010.
[38] M. Furdek, N. S. Kapov, and M. Grbac, “Attack-Aware Wavelength Assignment for Localization of In-band Cross talk Attack Propagation”, Journal of Optical Communication Networking, vol. 2, no. 11, pp. 1000- 1009, Nov. 2010.
[39] F. Ahsan, S. Djahel, F. N. Abdesselam, and S. Mohsin, “Neighbor based Channel Hopping Coordination: Practical against Jammer?”, The 9th IEEE International Workshop on Wireless Local Networks, pp. 993-998, Oct. 2009.
[40] S. Chen, K. Zeng, and P. Mohapatra, “Jamming-Resistant Communication: Channel Surfing without Negotiation” IEEE International Conference on Communications, pp. 1-6, May 2010.
[41] B. Wang, Y. Wu, K. J. R. Liu, and T. C. Clancy, “An Anti-Jamming Stochastic Game for Cognitive Radio Networks”, IEEE Journal on Selected Areas in Communications, vol. 29, no. 4, pp. 877–889, March 2011.
[42] S. Misra, R. Singh and S.V.R. Mohan, “Geomorphic zonalisation of wireless sensor networks based on prevalent jamming effects”, IET Communication, vol. 5, no. 12, pp. 1732–1743, Aug. 2011.
[43] Y. Desmedt, R. S. Naini, H. Wang, C. Charnes, and J. Pieprzyk, “Broadcast anti-jamming systems”, In Proc. of the IEEE International Conference on Networks (ICON), pp. 349–355, Oct. 1999.
[44] Y. Wu, B. Wang, K. J. R. Liu, and T. C. Clancy, “Anti-Jamming Games in Multi-Channel Cognitive Radio Networks”, IEEE Journal on Selected Areas in Communications, vol. 30, no. 1, pp. 4-15, Jan. 2012.
[45] R. A. Poisel, “Modern Communications Jamming Principles and Techniques”, Artech House Publishers, Second Edition, 2011.
[46] S. Wei, R. Kannan, V. Chakravarthy, and M. Rangaswamy, “CSI Usage over Parallel Fading Channels under Jamming Attacks: A Game Theory Study”, IEEE Transactions on Communications, vol. 60, no. 4, pp. 1167-1175, April 2012.
[47] L. Xiao, H. Dai, and P. Ning, “MAC Design of Uncoordinated FHBased Collaborative Broadcast”, IEEE Wireless Communications Letters, vol. 1, no. 3, pp. 261-264, June 2012.
[48] J.H. Sarker H.T. Mouftah, “Mitigating the effect of jamming signals in wireless ad hoc and sensor networks”, IET Communications, vol. 6, no. 3, pp. 311–317, 2012.
[49] C. Popper, M. Strasser, and S. Capkun, “Jamming-resistant broadcast communication without shared keys”, In Proc. of the USENIX Security Symposium, 2009.
[50] S. Liu, L. Lazos, and M. Krunz, “Thwarting Control-Channel Jamming Attacks from Inside Jammers“, IEEE Transactions on Mobile Computing, vol. 11, no. 9, pp. 1545-1558, Sep. 2012.
[51] C. Chen, M Song, C. Xin, and J. Backens, “A Game-Theoretical Anti- Jamming Scheme for Cognitive Radio Networks”, IEEE Network, vol.27, no. 3, pp.22-27, May 2013.
[52] S. Misra, S. K. Dhurandher, A. Rayankula, and D. Agrawal "Using honey nodes for defense against jamming attacks in wireless infrastructure-based networks," Computers & Electrical Engineering, vol. 36, pp. 367-382, 2010.
[53] A. Mpitziopoulos, G. Damianos, C. Konstantopoulos, and G. Pantziou, "A survey on jamming attacks and countermeasures in WSNs", IEEE Surveys & Tutorials on communications, vol. 11, No. 4, pp. 42-56, 2009.
[54] A. L. Toledo, and X. Wang, “Robust Detection of MAC Layer Denialof- Service Attacks in CSMA/CA Wireless Networks”, IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 347-358, 2008.
[55] S. R. Ratna, and R. Ravi, “Malicious Route Defending Reliable-Data Transmission Scheme for Multi Path Routing in Wireless Network”, World Academy of Science, Engineering and Technology, vol:8, no:12, pp. 1950-1955, Dec. 2014.
[56] K. Panyim, and P. Krishnamurthy, “A Hybrid Key redistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks”, Mobile Network Application, vol.10, pp. 715-731, 2009.
[57] P. Tague, S. Nabar, J. Ritcey, and R. Poovendran, “Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection,” IEEE Trans. Networking, vol. 19, no. 1, pp. 184-194, 2011.
[58] Y. Zhang, L. Lazos, and W. Kozma, "AMD: Audit-based Misbehavior Detection in Wireless Ad Hoc Networks", IEEE Transactions on Mobile Computing, no. 1, PrePrints PrePrints, doi:10.1109/TMC.2012.257.
[59] H. Mustafa, X. Zhang, Z. Liu, W. Xu, and A. Perrig, “Jamming- Resilient Multipath Routing”, IEEE Transactions on Dependable and Secure Computing, vol. 9, no. 6, pp. 852- 864, Nov. 2012.
[60] K. Pelechrinis, I. Broustis, S. V. Krishnamurthy, and C. Gkantsidis, “A Measurement-Driven Anti-Jamming System for 802.11 Networks”, IEEE/ACM Transaction on Networking, vol. 19, no. 4, pp. 1208-1222, Aug. 2011.
[61] P. Tague, M. Li, and R. Poovendran, “Probabilistic mitigation of control channel jamming via random key distribution”, in Proceedings of IEEE PIMRC, pp.1–5, 2007.
[62] N. S. Kapov, J. Chen, and L. Wosinska, “A New approach to Optical Networks Security: Attack-Aware Routing and Wavelength Assignment”, IEEE/ACM Transactions on Networking, vol. 18, no. 3, pp.750-760, June 2010.
[63] D. M. Shila, Y. Cheng, and T. Anjali, “Mitigating Selective Forwarding Attacks with a Channel-Aware Approach in WMNs”, IEEE Transactions on Wireless Communications, vol. 9, no. 5, pp. 1661-1675, May 2010.
[64] K. Pelechrinis, C. Koufogiannakis, and S. V. Krishnamurthy, “On the Efficacy of Frequency Hopping in Coping with Jamming Attacks in 802.11 Networks”, IEEE Transactions on Wireless Communications, vol. 9, no. 10, pp.3258-3271, Oct. 2010.
[65] M. Li, I. Koutsopoulos, and R. Poovendran, “Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks”, IEEE Transactions on Mobile Computing, vol. 9, no. 8, pp. 1119-1138, Aug. 2010.
[66] P. Tague, M. Li, and R. Poovendran, “Mitigation of Control Channel Jamming under Node Capture Attacks”, IEEE Transactions on Mobile Computing, vol. 8, no. 9, pp.1221-1234, Sep. 2009.
[67] B. Xiao, B. Yu, C. Gao, “CHEMAS: Identify suspect nodes in selective forwarding attacks”, Journal of parallel and distributed computing- Elsevier, vol. 67, pp.1218–1230, 2007.
[68] M. Cagalj, S. Capkun, and J. P. Hubaux, “Wormhole-Based Anti jamming Techniques in Sensor Networks”, IEEE Transactions on Mobile Computing, vol. 6, no. 1, pp.100-114, Jan. 2007.
[69] M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. Levitt, “Spread Spectrum Communications Handbook”, McGraw-Hill, 2001.
[70] J. Jeung, S. Jeong, and J. Lim, “Anti Jamming – Based Medium Access Control Using Adaptive Rapid Channel Hopping in 802.11: AJ-MAC” Springer, ICCSA, pp. 70–82, 2011.
[71] Y. B. Reddy, and S. Srivathsan, “Game Theory Model for Selective Forward Attacks in Wireless Sensor Networks”, IEEE Conference on Control & Automation, pp.458-463, 2009.
[72] Z. L. Wenye, and W. C. Wang, “Hiding Traffic with Camouflage: Minimizing Message Delay in the Smart Grid under Jamming”, IEEE international conference on computer communications, pp. 3066-3070, 2012.
[73] C. Popper, M. Strasser, and S. Capkun, “Anti-Jamming Broadcast Communication using Uncoordinated Spread Spectrum Techniques“, IEEE Journal on Selected Areas in Communications, vol. 28, no. 5, pp.703-715, June 2010.
[74] W. Saad, X. Zhou, B. Maham, T. Basar, and H. V. Poor, ”Tree Formation with Physical Layer Security Considerations in Wireless Multi-Hop Networks, IEEE Transactions on Wireless Communications, vol. 11, no. 11, pp.3980-3991, Nov. 2012
[75] Q. Wang, P. Xu, K. Ren, and X. Y. Li, “Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication”, IEEE Journal on Selected Areas in Communications, vol. 30, no. 1, pp.16-30, Jan. 2012.
[76] A. Proano, and L. Lazos, “Hiding Contextual Information in WSNs”, IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp. 1-6, 2012
[77] B. Sklar, Digital Communications, Fundamentals, and Applications. Prentice-Hall, 2001.
[78] A. Proano, and L. Lazos, “Perfect Contextual Information Privacy in WSNs under Colluding Eavesdroppers”, WiSec’13 Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, pp.89-94, 2013.
[79] J. T. Chiang, and Y.C. Hu, “Dynamic jamming mitigation for wireless broadcast networks”, In proceedings. Of INFOCOM, pp. 1211–1219, 2008.