Skip to main content

Tipp

Weitere Kapitel dieses Buchs durch Wischen aufrufen

2020 | OriginalPaper | Buchkapitel

Security and Efficiency Analysis of Anti-jamming Techniques

share
TEILEN

Abstract

Internet of Things has resulted in ubiquitous computing, where all IoT devices are connected almost all the time, to provide continuous services. This makes the network prone to several attacks, one such attack being the Direct Denial of Service (DDoS) attack. Jamming, which is the use of malicious nodes to deliberately lower Signal to Noise ratio (SNR), is a subset of DDoS attacks, which affects physical layer devices and channels, and can cause errors in the upper layers. Anti-jamming techniques, which are used to mitigate the effects of jamming, must be analyzed from the security and efficiency perspective. In this paper, anti-jamming techniques and protocols, viz. JAM- Jammed Area Mapping, Channel surfing and spatial retreat, channel hopping, reactive jamming detection and trigger node detection; are compared with respect to security and efficiency parameters. The suitable techniques are finally selected for specific use cases.
Literatur
1.
Zurück zum Zitat Alnifie, G., Simon, R.: A multi-channel defense against jamming attacks in wireless sensor networks. In: Proceedings of the 3rd ACM Workshop on QoS and Security for Wireless and Mobile Networks, pp. 95–104 (2007) Alnifie, G., Simon, R.: A multi-channel defense against jamming attacks in wireless sensor networks. In: Proceedings of the 3rd ACM Workshop on QoS and Security for Wireless and Mobile Networks, pp. 95–104 (2007)
2.
Zurück zum Zitat Bayraktaroglu, E., King, C., Liu, X., Noubir, G., Rajaraman, R., Thapa, B.: On the performance of IEEE 802.11 under jamming. In: IEEE the 27th Conference on Computer Communications, pp. 1265–1273 (2008) Bayraktaroglu, E., King, C., Liu, X., Noubir, G., Rajaraman, R., Thapa, B.: On the performance of IEEE 802.11 under jamming. In: IEEE the 27th Conference on Computer Communications, pp. 1265–1273 (2008)
3.
Zurück zum Zitat Bellardo, J., Savage, S.: 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In: Proceedings of the 12th Conference on USENIX Security Symposium, pp. 15–28 (2003) Bellardo, J., Savage, S.: 802.11 denial-of-service attacks: real vulnerabilities and practical solutions. In: Proceedings of the 12th Conference on USENIX Security Symposium, pp. 15–28 (2003)
4.
Zurück zum Zitat Broustis, I., Pelechrinis, K., Syrivelis, D., Krishnamurthy, S.V., Tassiulas, L.: FIJI: fighting implicit jamming in 802.11 WLANs. In: Security and Privacy in Communication Networks, vol. 19, pp. 21–40 (2009) Broustis, I., Pelechrinis, K., Syrivelis, D., Krishnamurthy, S.V., Tassiulas, L.: FIJI: fighting implicit jamming in 802.11 WLANs. In: Security and Privacy in Communication Networks, vol. 19, pp. 21–40 (2009)
5.
Zurück zum Zitat Chiang, J.T., Hu, Y.C.: Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Trans. Netw. 19(1), 286–298 (2011) CrossRef Chiang, J.T., Hu, Y.C.: Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Trans. Netw. 19(1), 286–298 (2011) CrossRef
6.
Zurück zum Zitat Commander, C.W., Pardalos, P.M., Ryabchenko, V., Shylo, O.V., Uryasev, S., Zrazhevsky, G.: Jamming communication networks under complete uncertainty. Optimization Letters 2(1), 53–70 (2008) MathSciNetCrossRef Commander, C.W., Pardalos, P.M., Ryabchenko, V., Shylo, O.V., Uryasev, S., Zrazhevsky, G.: Jamming communication networks under complete uncertainty. Optimization Letters 2(1), 53–70 (2008) MathSciNetCrossRef
7.
Zurück zum Zitat Gencer, C., Aydogan, E.K., Celik, C.: A decision support system for locating VHF/UHF radio jammer systems on the terrain. Information Systems Frontiers 10(1), 111–124 (2008) CrossRef Gencer, C., Aydogan, E.K., Celik, C.: A decision support system for locating VHF/UHF radio jammer systems on the terrain. Information Systems Frontiers 10(1), 111–124 (2008) CrossRef
8.
Zurück zum Zitat Gollakota, S., Katabi, D.: iJam: jamming oneself for secure wireless communication. Technical report, Massachusetts Institute of Technology (2010) Gollakota, S., Katabi, D.: iJam: jamming oneself for secure wireless communication. Technical report, Massachusetts Institute of Technology (2010)
9.
Zurück zum Zitat Andrea, I., Chrysostomou, C., Hadjichristofi, G.: Internet of Things: security vulnerabilities and challenges. In: 2015 IEEE Symposium on Computers and Communication (ISCC), 6 July 2015, pp. 180–187. IEEE (2015) Andrea, I., Chrysostomou, C., Hadjichristofi, G.: Internet of Things: security vulnerabilities and challenges. In: 2015 IEEE Symposium on Computers and Communication (ISCC), 6 July 2015, pp. 180–187. IEEE (2015)
10.
Zurück zum Zitat Aman, M.N., Chua, K.C., Sikdar, B.: Position paper: physical unclonable functions for IoT security. In: Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, 30 May 2016, pp. 10–13. ACM (2016) Aman, M.N., Chua, K.C., Sikdar, B.: Position paper: physical unclonable functions for IoT security. In: Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security, 30 May 2016, pp. 10–13. ACM (2016)
11.
Zurück zum Zitat Fang, H., Xu, L., Zou, Y., Wang, X., Choo, K.K.: Three-stage Stackelberg game for defending against full-duplex active eavesdropping attacks in cooperative communication. IEEE Trans. Veh. Technol. 67(11), 10788–10799 (2018) CrossRef Fang, H., Xu, L., Zou, Y., Wang, X., Choo, K.K.: Three-stage Stackelberg game for defending against full-duplex active eavesdropping attacks in cooperative communication. IEEE Trans. Veh. Technol. 67(11), 10788–10799 (2018) CrossRef
12.
Zurück zum Zitat Bharathi, S., Kumar, D., Ram, D.: Defence against responsive and non-responsive jamming attack in cognitive radio networks: an evolutionary game theoretical approach. J. Eng. 2018(2), 68–75 (2018) Bharathi, S., Kumar, D., Ram, D.: Defence against responsive and non-responsive jamming attack in cognitive radio networks: an evolutionary game theoretical approach. J. Eng. 2018(2), 68–75 (2018)
13.
Zurück zum Zitat Chen, Y., Li, Y., Xu, D., Xiao, L.: Dqn-based power control for IoT transmission against jamming. In: 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 3 June 2018, pp. 1–5. IEEE (2018) Chen, Y., Li, Y., Xu, D., Xiao, L.: Dqn-based power control for IoT transmission against jamming. In: 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 3 June 2018, pp. 1–5. IEEE (2018)
15.
Zurück zum Zitat Garnaev, A., Trappe, W., Petropulu, A.: An anti-jamming strategy when it is unknown which receivers will face with smart interference. In: International Conference on Wired/Wireless Internet Communication 18 June 2018, pp. 195–206. Springer, Cham (2018) Garnaev, A., Trappe, W., Petropulu, A.: An anti-jamming strategy when it is unknown which receivers will face with smart interference. In: International Conference on Wired/Wireless Internet Communication 18 June 2018, pp. 195–206. Springer, Cham (2018)
16.
Zurück zum Zitat Bany Salameh, H., Almajali, S., Ayyash, M., Elgala, H.: Batch-based security-aware spectrum sharing with simultaneous assignment decisions in time-critical IoT networks with cognitive radio capabilities. Trans. Emerg. Telecommun. Technol. 29(11), e3317 (2018) CrossRef Bany Salameh, H., Almajali, S., Ayyash, M., Elgala, H.: Batch-based security-aware spectrum sharing with simultaneous assignment decisions in time-critical IoT networks with cognitive radio capabilities. Trans. Emerg. Telecommun. Technol. 29(11), e3317 (2018) CrossRef
Metadaten
Titel
Security and Efficiency Analysis of Anti-jamming Techniques
verfasst von
S. Kshipra Prasadh
Sumit Kumar Jindal
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-39875-0_27