Machine Learning-based RF Jamming Detection in Wireless Networks

Due to the open and shared nature of wireless medium, wireless networks are vulnerable to Radio Frequency (RF) jamming attacks since an attacker can easily emit an interference signal to prevent legitimate access to the medium or disrupt the reception of signal. An attacker may utilize different jamming strategies by exploiting the vulnerabilities of wireless protocols at different layers. Therefore, the detection and classification of jamming attacks is important to take proper countermeasures. In this paper, we firstly discuss some classic jamming strategies and some performance metrics for jamming detection. We then implement the jamming attack modules based on the NS-3 simulator, and study the effects of different types of jamming strategies. We propose some jamming detection schemes based on a variety of machine learning algorithms. The effectiveness of the proposed jamming detection schemes are valuated and optimized based on the collected data for different jamming attacks.

[1]  Zhuo Lu,et al.  From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic , 2011, 2011 Proceedings IEEE INFOCOM.

[2]  Klaus Wehrle,et al.  Machine learning-based jamming detection for IEEE 802.11: Design and experimental evaluation , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.

[3]  Zhuo Lu,et al.  Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications , 2014, IEEE Transactions on Mobile Computing.

[4]  Srikanth V. Krishnamurthy,et al.  A Measurement-Driven Anti-Jamming System for 802.11 Networks , 2011, IEEE/ACM Transactions on Networking.

[5]  Matti Latva-aho,et al.  On the UWB system coexistence with GSM900, UMTS/WCDMA, and GPS , 2002, IEEE J. Sel. Areas Commun..

[6]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[7]  Srikanth V. Krishnamurthy,et al.  Jammer localization in wireless networks: An experimentation-driven approach , 2016, Comput. Commun..

[8]  Frank Piessens,et al.  Advanced Wi-Fi attacks using commodity hardware , 2014, ACSAC.

[9]  James Gross,et al.  In VANETs we trust?: characterizing RF jamming in vehicular networks , 2012, VANET@MOBICOM.

[10]  Sudip Misra,et al.  Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks , 2010, Comput. Electr. Eng..

[11]  Xin Liu,et al.  Performance of IEEE 802.11 under Jamming , 2013, Mob. Networks Appl..

[12]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[13]  Jeffrey J. P. Tsai,et al.  A Framework of Machine Learning Based Intrusion Detection for Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[14]  Nagarajan Kandasamy,et al.  A real-time and protocol-aware reactive jamming framework built on software-defined radios , 2014, SRIF@SIGCOMM.

[15]  Wouter Joosen,et al.  Selective Jamming of LoRaWAN using Commodity Hardware , 2017, MobiQuitous.