Skip to main content

2019 | OriginalPaper | Buchkapitel

An Overview of Methods of Reducing the Effect of Jamming Attacks at the Physical Layer of Wireless Networks

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Jamming as a form of denial-of-service is a commonly-used attack initiated against security at the physical layer of a wireless system. This paper starts with an overview of various types of jamming and measures for its detection. Then, a number of methods for jamming mitigation that can be used at the physical layer are discussed and compared according to their main advantages and drawbacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wu, Y., Schober, R., Ng, D.W.K., Xiao, C., Caire, G.: Secure massive MIMO transmission with an active eavesdropper. IEEE Trans. Inf. Theory 62(7), 3880–3900 (2016)MathSciNetCrossRef Wu, Y., Schober, R., Ng, D.W.K., Xiao, C., Caire, G.: Secure massive MIMO transmission with an active eavesdropper. IEEE Trans. Inf. Theory 62(7), 3880–3900 (2016)MathSciNetCrossRef
2.
Zurück zum Zitat Bash, B.A., Goeckel, D., Towsley, D., Guha, S.: Hiding information in noise: fundamental limits of covert wireless communication. IEEE Commun. Mag. 53(12), 26–31 (2015)CrossRef Bash, B.A., Goeckel, D., Towsley, D., Guha, S.: Hiding information in noise: fundamental limits of covert wireless communication. IEEE Commun. Mag. 53(12), 26–31 (2015)CrossRef
3.
Zurück zum Zitat Basciftci, Y.O., Koksal, C.E., Ashikhmin, A.: Securing massive MIMO at the physical layer. In: 2015 IEEE Conference on Communications and Network Security (CNS), Florence, pp. 272–280 (2015) Basciftci, Y.O., Koksal, C.E., Ashikhmin, A.: Securing massive MIMO at the physical layer. In: 2015 IEEE Conference on Communications and Network Security (CNS), Florence, pp. 272–280 (2015)
4.
Zurück zum Zitat Miller, R., Trappe, W.: On the vulnerabilities of CSI in MIMO wireless communication systems. IEEE Trans. Mob. Comput. 11(8), 1386–1398 (2012)CrossRef Miller, R., Trappe, W.: On the vulnerabilities of CSI in MIMO wireless communication systems. IEEE Trans. Mob. Comput. 11(8), 1386–1398 (2012)CrossRef
5.
Zurück zum Zitat Pirzadeh, H., Razavizadeh, S.M., Björnson, E.: Subverting massive MIMO by smart jamming. IEEE Wirel. Commun. Lett. 5(1), 20–23 (2016)CrossRef Pirzadeh, H., Razavizadeh, S.M., Björnson, E.: Subverting massive MIMO by smart jamming. IEEE Wirel. Commun. Lett. 5(1), 20–23 (2016)CrossRef
6.
Zurück zum Zitat Sinha, P., Jha, Rai, A.K., Bhushan, B.: Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: a survey. In: 2017 International Conference on Signal Processing and Communication (ICSPC), Coimbatore, pp. 288–293 (2017) Sinha, P., Jha, Rai, A.K., Bhushan, B.: Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: a survey. In: 2017 International Conference on Signal Processing and Communication (ICSPC), Coimbatore, pp. 288–293 (2017)
7.
Zurück zum Zitat Amin, Y.M., Abdel-Hamid, A.T.: Classification and analysis of IEEE 802.15.4 PHY layer attacks. In: 2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT), Cairo, pp. 1–8 (2016) Amin, Y.M., Abdel-Hamid, A.T.: Classification and analysis of IEEE 802.15.4 PHY layer attacks. In: 2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT), Cairo, pp. 1–8 (2016)
8.
Zurück zum Zitat Muraleedharan, R., Osadciw, L.: Jamming attack detection and countermeasures in wireless sensor network using ant system. In: 2006 SPIE Symposium on Defense and Security, April 2006 (2006) Muraleedharan, R., Osadciw, L.: Jamming attack detection and countermeasures in wireless sensor network using ant system. In: 2006 SPIE Symposium on Defense and Security, April 2006 (2006)
9.
Zurück zum Zitat Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., Pantziou, G.: A survey on jamming attacks and countermeasures in WSNs. IEEE Communications Surveys Tutorials 11(4), 42–56 (2009). Fourth QuarterCrossRef Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., Pantziou, G.: A survey on jamming attacks and countermeasures in WSNs. IEEE Communications Surveys Tutorials 11(4), 42–56 (2009). Fourth QuarterCrossRef
10.
Zurück zum Zitat Zou, Y., Zhu, J., Wang, X., Hanzo, L.: A survey on wireless security: technical challenges, recent advances, and future trends. Proc. IEEE 104(9), 1727–1765 (2016)CrossRef Zou, Y., Zhu, J., Wang, X., Hanzo, L.: A survey on wireless security: technical challenges, recent advances, and future trends. Proc. IEEE 104(9), 1727–1765 (2016)CrossRef
11.
Zurück zum Zitat O’Flynn, C.P.: Message denial and alteration on IEEE 802.15.4 low-power radio networks. In: 2011 4th IFIP International Conference on New Technologies, Mobility and Security, Paris, pp. 1–5 (2011) O’Flynn, C.P.: Message denial and alteration on IEEE 802.15.4 low-power radio networks. In: 2011 4th IFIP International Conference on New Technologies, Mobility and Security, Paris, pp. 1–5 (2011)
12.
Zurück zum Zitat Jokar, P., Nicanfar, H., Leung, V.C.M.: Specification-based Intrusion Detection for home area networks in smart grids. In: 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), Brussels, pp. 208–213 (2011) Jokar, P., Nicanfar, H., Leung, V.C.M.: Specification-based Intrusion Detection for home area networks in smart grids. In: 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm), Brussels, pp. 208–213 (2011)
13.
Zurück zum Zitat Pelechrinis, K., Iliofotou, M., Krishnamurthy, S.V.: Denial of service attacks in wireless networks: the case of jammers. IEEE Commun. Surv. Tutor. 13(2), 245–257 (2011). Second QuarterCrossRef Pelechrinis, K., Iliofotou, M., Krishnamurthy, S.V.: Denial of service attacks in wireless networks: the case of jammers. IEEE Commun. Surv. Tutor. 13(2), 245–257 (2011). Second QuarterCrossRef
14.
Zurück zum Zitat Wood, A.D., Stankovic, J.A., Zhou, G.: DEEJAM: defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In: 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, San Diego, CA, pp. 60–69 (2007) Wood, A.D., Stankovic, J.A., Zhou, G.: DEEJAM: defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In: 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, San Diego, CA, pp. 60–69 (2007)
15.
Zurück zum Zitat Wood, A.D., Stankovic, J.A., Son, S.H.: JAM: a jammed-area mapping service for sensor networks. In: 24th IEEE Real-Time Systems Symposium, RTSS 2003, Cancun, Mexico, pp. 286–297 (2003) Wood, A.D., Stankovic, J.A., Son, S.H.: JAM: a jammed-area mapping service for sensor networks. In: 24th IEEE Real-Time Systems Symposium, RTSS 2003, Cancun, Mexico, pp. 286–297 (2003)
16.
Zurück zum Zitat Xu, W., Wood, T., Trappe, W., Zhang, Y.: Channel surfing and spatial retreats: defenses against wireless denial of service. In: Proceedings of the 2004 ACM Workshop on Wireless Security (WiSe), NY, USA, pp. 80–89 (2004) Xu, W., Wood, T., Trappe, W., Zhang, Y.: Channel surfing and spatial retreats: defenses against wireless denial of service. In: Proceedings of the 2004 ACM Workshop on Wireless Security (WiSe), NY, USA, pp. 80–89 (2004)
17.
Zurück zum Zitat Vadlamani, S., Eksioglu, B., Medal, H., Nandi, A.: Jamming attacks on wireless networks: a taxonomic survey. Int. J. Prod. Econ. 172, 76–94 (2016)CrossRef Vadlamani, S., Eksioglu, B., Medal, H., Nandi, A.: Jamming attacks on wireless networks: a taxonomic survey. Int. J. Prod. Econ. 172, 76–94 (2016)CrossRef
18.
Zurück zum Zitat Navda, V., Bohra, A., Ganguly, S., Rubenstein, D.: Using channel hopping to increase 802.11 resilience to jamming attacks. In: IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, Barcelona, pp. 2526–2530 (2007) Navda, V., Bohra, A., Ganguly, S., Rubenstein, D.: Using channel hopping to increase 802.11 resilience to jamming attacks. In: IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications, Barcelona, pp. 2526–2530 (2007)
19.
Zurück zum Zitat Bloch, M., Barros, J.: Physical-Layer Security: From Information Theory to Security Engineering. Cambridge University Press, Cambridge (2011)CrossRef Bloch, M., Barros, J.: Physical-Layer Security: From Information Theory to Security Engineering. Cambridge University Press, Cambridge (2011)CrossRef
20.
Zurück zum Zitat Liu, Y., Ning, P., Dai, H., Liu, A.: Randomized differential DSSS: jamming-resistant wireless broadcast communication. In: IEEE INFOCOM, pp. 1–9 (2010) Liu, Y., Ning, P., Dai, H., Liu, A.: Randomized differential DSSS: jamming-resistant wireless broadcast communication. In: IEEE INFOCOM, pp. 1–9 (2010)
21.
Zurück zum Zitat Do, T.T., Björnson, E., Larsson, E.G.: Jamming resistant receivers for massive MIMO. In: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, LA, pp. 3619–3623 (2017) Do, T.T., Björnson, E., Larsson, E.G.: Jamming resistant receivers for massive MIMO. In: 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), New Orleans, LA, pp. 3619–3623 (2017)
22.
Zurück zum Zitat Peel, C.B., Hochwald, B.M., Swindlehurst, A.L.: A vector-perturbation technique for near-capacity multiantenna multiuser communication-part I: channel inversion and regularization. IEEE Trans. Commun. 53(1), 195–202 (2005)CrossRef Peel, C.B., Hochwald, B.M., Swindlehurst, A.L.: A vector-perturbation technique for near-capacity multiantenna multiuser communication-part I: channel inversion and regularization. IEEE Trans. Commun. 53(1), 195–202 (2005)CrossRef
23.
Zurück zum Zitat Zeng, H., Cao, C., Li, H., Yan, Q.: Enabling jamming-resistant communications in wireless MIMO networks. In: 2017 IEEE Conference on Communications and Network Security (CNS), Las Vegas, NV, pp. 1–9 (2017) Zeng, H., Cao, C., Li, H., Yan, Q.: Enabling jamming-resistant communications in wireless MIMO networks. In: 2017 IEEE Conference on Communications and Network Security (CNS), Las Vegas, NV, pp. 1–9 (2017)
24.
Zurück zum Zitat DeBruhl, B., Tague, P.: Digital filter design for jamming mitigation in 802.15.4 communication. In: 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), Maui, HI, pp. 1–6 (2011) DeBruhl, B., Tague, P.: Digital filter design for jamming mitigation in 802.15.4 communication. In: 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), Maui, HI, pp. 1–6 (2011)
25.
Zurück zum Zitat DeBruhl, B., Tague, P.: Mitigation of periodic jamming in a spread spectrum system by adaptive filter selection. In: Proceedings of the International Symposium on Photonic and Electromagnetic Crystal Structures, pp. 431–439 (2012) DeBruhl, B., Tague, P.: Mitigation of periodic jamming in a spread spectrum system by adaptive filter selection. In: Proceedings of the International Symposium on Photonic and Electromagnetic Crystal Structures, pp. 431–439 (2012)
26.
Zurück zum Zitat Nikolova, Z., Stoyanov, G., Iliev, G., Poulkov, V.: Complex coefficient IIR digital filters. In: Márquez, F.P.G. (ed.) Digital Filters, Chapter 9, April 2011, pp. 209–239. InTech (2011). ISBN: 978-953-307-190-9 Nikolova, Z., Stoyanov, G., Iliev, G., Poulkov, V.: Complex coefficient IIR digital filters. In: Márquez, F.P.G. (ed.) Digital Filters, Chapter 9, April 2011, pp. 209–239. InTech (2011). ISBN: 978-953-307-190-9
Metadaten
Titel
An Overview of Methods of Reducing the Effect of Jamming Attacks at the Physical Layer of Wireless Networks
verfasst von
Dimitriya Mihaylova
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-23976-3_24