Statistics-Based Jamming Detection Algorithm for Jamming Attacks against Tactical MANETs

In this paper, we propose a detection approach for reactive jamming attacks in the tactical wireless ad hoc networks. A significant weakness for all wireless communication systems is a vulnerability to jamming attacks. In the worst case scenario, jammers possess the potential to completely block data transmissions in the wireless network. Since tactical networks are typically utilized in crisis-management and battlefield operations, reliable and secure communications are a critical factor for mission success. Thus, jamming attacks must be detected and mitigated immediately by the wireless network. New approaches for the detection and mitigation of jamming attacks are required, especially for tactical networks based on mobile ad hoc technology where centralized detection algorithms are unusable. We present a novel mechanism to detect jamming in tactical ad hoc networks, which is based on the required number of re-transmission attempts of transmitted packets and packet delivery rate of received packets. Our proposed approach employs several network performance parameters, which differentiates our approach from most existing detection algorithms, since only a single parameter is commonly used as a detection decision. The simulation model of proposed detection algorithm is implemented in ns-3 network simulator.

[1]  Srdjan Capkun,et al.  Detection of Reactive Jamming in Sensor Networks , 2009 .

[2]  Radha Poovendran,et al.  Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[3]  Donggang Liu,et al.  Efficient and timely jamming detection in wireless sensor networks , 2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012).

[4]  Jalel Ben-Othman,et al.  Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution , 2009, 2009 IEEE International Conference on Communications.

[5]  Xiaoyan Hong,et al.  A group mobility model for ad hoc wireless networks , 1999, MSWiM '99.

[6]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[7]  Murat Çakiroglu,et al.  Jamming detection mechanisms for wireless sensor networks , 2008, Infoscale.

[8]  Li Li,et al.  On designing bandwidth constrained mobile tactical networks for complex terrains , 2012, IEEE Communications Magazine.

[9]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[10]  Brian Haberman,et al.  Key Challenges of Military Tactical Networking and the Elusive Promise of MANET Technology , 2006, IEEE Communications Magazine.

[11]  Peter C. Mason,et al.  Mitigating Security Threats in Tactical Networks , 2010 .

[12]  J. Andel Sequential Analysis , 2022, The SAGE Encyclopedia of Research Design.