Skip to main content
main-content
Top

Hint

Swipe to navigate through the chapters of this book

2020 | OriginalPaper | Chapter

Security and Efficiency Analysis of Anti-jamming Techniques

share
SHARE

Abstract

Internet of Things has resulted in ubiquitous computing, where all IoT devices are connected almost all the time, to provide continuous services. This makes the network prone to several attacks, one such attack being the Direct Denial of Service (DDoS) attack. Jamming, which is the use of malicious nodes to deliberately lower Signal to Noise ratio (SNR), is a subset of DDoS attacks, which affects physical layer devices and channels, and can cause errors in the upper layers. Anti-jamming techniques, which are used to mitigate the effects of jamming, must be analyzed from the security and efficiency perspective. In this paper, anti-jamming techniques and protocols, viz. JAM- Jammed Area Mapping, Channel surfing and spatial retreat, channel hopping, reactive jamming detection and trigger node detection; are compared with respect to security and efficiency parameters. The suitable techniques are finally selected for specific use cases.
Literature
1.
go back to reference Alnifie, G., Simon, R.: A multi-channel defense against jamming attacks in wireless sensor networks. In: Proceedings of the 3rd ACM Workshop on QoS and Security for Wireless and Mobile Networks, pp. 95–104 (2007) Alnifie, G., Simon, R.: A multi-channel defense against jamming attacks in wireless sensor networks. In: Proceedings of the 3rd ACM Workshop on QoS and Security for Wireless and Mobile Networks, pp. 95–104 (2007)
2.
go back to reference Bayraktaroglu, E., King, C., Liu, X., Noubir, G., Rajaraman, R., Thapa, B.: On the performance of IEEE 802.11 under jamming. In: IEEE the 27th Conference on Computer Communications, pp. 1265–1273 (2008) Bayraktaroglu, E., King, C., Liu, X., Noubir, G., Rajaraman, R., Thapa, B.: On the performance of IEEE 802.11 under jamming. In: IEEE the 27th Conference on Computer Communications, pp. 1265–1273 (2008)
3.
go back to reference Bellardo, J., Savage, S.: 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In: Proceedings of the 12th Conference on USENIX Security Symposium, pp. 15–28 (2003) Bellardo, J., Savage, S.: 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In: Proceedings of the 12th Conference on USENIX Security Symposium, pp. 15–28 (2003)
4.
go back to reference Broustis, I., Pelechrinis, K., Syrivelis, D., Krishnamurthy, S.V., Tassiulas, L.: FIJI: fighting implicit jamming in 802.11 WLANs. In: Security and Privacy in Communication Networks, vol. 19, pp. 21–40 (2009) Broustis, I., Pelechrinis, K., Syrivelis, D., Krishnamurthy, S.V., Tassiulas, L.: FIJI: fighting implicit jamming in 802.11 WLANs. In: Security and Privacy in Communication Networks, vol. 19, pp. 21–40 (2009)
5.
go back to reference Chiang, J.T., Hu, Y.C.: Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Trans. Netw. 19(1), 286–298 (2011) CrossRef Chiang, J.T., Hu, Y.C.: Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Trans. Netw. 19(1), 286–298 (2011) CrossRef
6.
go back to reference Commander, C.W., Pardalos, P.M., Ryabchenko, V., Shylo, O.V., Uryasev, S., Zrazhevsky, G.: Jamming communication networks under complete uncertainty. Optimization Letters 2(1), 53–70 (2008) MathSciNetCrossRef Commander, C.W., Pardalos, P.M., Ryabchenko, V., Shylo, O.V., Uryasev, S., Zrazhevsky, G.: Jamming communication networks under complete uncertainty. Optimization Letters 2(1), 53–70 (2008) MathSciNetCrossRef
7.
go back to reference Gencer, C., Aydogan, E.K., Celik, C.: A decision support system for locating VHF/UHF radio jammer systems on the terrain. Information Systems Frontiers 10(1), 111–124 (2008) CrossRef Gencer, C., Aydogan, E.K., Celik, C.: A decision support system for locating VHF/UHF radio jammer systems on the terrain. Information Systems Frontiers 10(1), 111–124 (2008) CrossRef
8.
go back to reference Gollakota, S., Katabi, D.: iJam: jamming oneself for secure wireless communication. Technical report, Massachusetts Institute of Technology (2010) Gollakota, S., Katabi, D.: iJam: jamming oneself for secure wireless communication. Technical report, Massachusetts Institute of Technology (2010)
9.
go back to reference Andrea, I., Chrysostomou, C., Hadjichristofi, G.: Internet of Things: security vulnerabilities and challenges. In: 2015 IEEE Symposium on Computers and Communication (ISCC), 6 July 2015, pp. 180–187. IEEE (2015) Andrea, I., Chrysostomou, C., Hadjichristofi, G.: Internet of Things: security vulnerabilities and challenges. In: 2015 IEEE Symposium on Computers and Communication (ISCC), 6 July 2015, pp. 180–187. IEEE (2015)
10.
go back to reference Aman, M.N., Chua, K.C., Sikdar, B.: Position paper: physical unclonable functions for IoT security. In: Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, 30 May 2016, pp. 10–13. ACM (2016) Aman, M.N., Chua, K.C., Sikdar, B.: Position paper: physical unclonable functions for IoT security. In: Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, 30 May 2016, pp. 10–13. ACM (2016)
11.
go back to reference Fang, H., Xu, L., Zou, Y., Wang, X., Choo, K.K.: Three-stage Stackelberg game for defending against full-duplex active eavesdropping attacks in cooperative communication. IEEE Trans. Veh. Technol. 67(11), 10788–10799 (2018) CrossRef Fang, H., Xu, L., Zou, Y., Wang, X., Choo, K.K.: Three-stage Stackelberg game for defending against full-duplex active eavesdropping attacks in cooperative communication. IEEE Trans. Veh. Technol. 67(11), 10788–10799 (2018) CrossRef
12.
go back to reference Bharathi, S., Kumar, D., Ram, D.: Defence against responsive and non-responsive jamming attack in cognitive radio networks: an evolutionary game theoretical approach. J. Eng. 2018(2), 68–75 (2018) Bharathi, S., Kumar, D., Ram, D.: Defence against responsive and non-responsive jamming attack in cognitive radio networks: an evolutionary game theoretical approach. J. Eng. 2018(2), 68–75 (2018)
13.
go back to reference Chen, Y., Li, Y., Xu, D., Xiao, L.: Dqn-based power control for IoT transmission against jamming. In: 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 3 June 2018, pp. 1–5. IEEE (2018) Chen, Y., Li, Y., Xu, D., Xiao, L.: Dqn-based power control for IoT transmission against jamming. In: 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 3 June 2018, pp. 1–5. IEEE (2018)
15.
go back to reference Garnaev, A., Trappe, W., Petropulu, A.: An anti-jamming strategy when it is unknown which receivers will face with smart interference. In: International Conference on Wired/Wireless Internet Communication 18 June 2018, pp. 195–206. Springer, Cham (2018) Garnaev, A., Trappe, W., Petropulu, A.: An anti-jamming strategy when it is unknown which receivers will face with smart interference. In: International Conference on Wired/Wireless Internet Communication 18 June 2018, pp. 195–206. Springer, Cham (2018)
16.
go back to reference Bany Salameh, H., Almajali, S., Ayyash, M., Elgala, H.: Batch-based security-aware spectrum sharing with simultaneous assignment decisions in time-critical IoT networks with cognitive radio capabilities. Trans. Emerg. Telecommun. Technol. 29(11), e3317 (2018) CrossRef Bany Salameh, H., Almajali, S., Ayyash, M., Elgala, H.: Batch-based security-aware spectrum sharing with simultaneous assignment decisions in time-critical IoT networks with cognitive radio capabilities. Trans. Emerg. Telecommun. Technol. 29(11), e3317 (2018) CrossRef
Metadata
Title
Security and Efficiency Analysis of Anti-jamming Techniques
Authors
S. Kshipra Prasadh
Sumit Kumar Jindal
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-39875-0_27