Jammer forensics: Localization in peer to peer networks based on Q-learning

Jamming attacks are a class of network denial of service attacks that can easily be carried out in wireless networks. In order to be able to repair a network in the presence of such attacks, it is desirable to identify the location of jammed nodes and the congested area that is affected by the jammer. In this paper, we propose the design of a Q-learning based attack-localization algorithm that is integrated with the OLSR routing protocol. Our Q-learning attack-localization algorithm is distributed, asynchronous and can identify the location of the jammer in run-time as the attack takes place. We examine the performance of our approach using NS3 network simulations under two different network topologies, and for both naive and intelligent attack scenarios.

[1]  Erik G. Ström,et al.  Cooperative Received Signal Strength-Based Sensor Localization With Unknown Transmit Powers , 2013, IEEE Transactions on Signal Processing.

[2]  Wenyuan Xu,et al.  Exploiting Jamming-Caused Neighbor Changes for Jammer Localization , 2012, IEEE Transactions on Parallel and Distributed Systems.

[3]  Dimitri P. Bertsekas,et al.  Distributed asynchronous policy iteration in dynamic programming , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[4]  Sencun Zhu,et al.  An Algorithm for Jammer Localization in Wireless Sensor Networks , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.

[5]  Guevara Noubir,et al.  On Connectivity in Ad Hoc Networks under Jamming Using Directional Antennas and Mobility , 2004, WWIC.

[6]  D. Barrios-Aranibar,et al.  LEARNING FROM DELAYED REWARDS USING INFLUENCE VALUES APPLIED TO COORDINATION IN MULTI-AGENT SYSTEMS , 2007 .

[7]  Hing-Cheung So,et al.  Received signal strength based positioning for multiple nodes in wireless sensor networks , 2014, Digit. Signal Process..

[8]  Donggang Liu,et al.  Attack-Resistant Location Estimation in Wireless Sensor Networks , 2008, TSEC.

[9]  Deborah Estrin,et al.  GPS-less low-cost outdoor localization for very small devices , 2000, IEEE Wirel. Commun..

[10]  David Girbau,et al.  Energy Analysis of Received Signal Strength Localization in Wireless Sensor Networks , 2011 .

[11]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[12]  Srikanth V. Krishnamurthy,et al.  Lightweight Jammer Localization in Wireless Networks: System Design and Implementation , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[13]  Wenyuan Xu,et al.  Localizing jammers in wireless networks , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[14]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[15]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[16]  Guolin Sun,et al.  Simple distributed interference source localization for radio environment mapping , 2010, 2010 IFIP Wireless Days.

[17]  Wenyuan Xu,et al.  Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.

[18]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[19]  T. Aaron Gulliver,et al.  Blind Received Signal Strength Difference Based Source Localization With System Parameter Errors , 2014, IEEE Transactions on Signal Processing.

[20]  F. Golatowski,et al.  Weighted Centroid Localization in Zigbee-based Sensor Networks , 2007, 2007 IEEE International Symposium on Intelligent Signal Processing.

[21]  Patrick Tague,et al.  All your jammers belong to us — Localization of wireless sensors under jamming attack , 2012, 2012 IEEE International Conference on Communications (ICC).

[22]  Chin-Tau A. Lea,et al.  Received Signal Strength-Based Wireless Localization via Semidefinite Programming: Noncooperative and Cooperative Schemes , 2010, IEEE Transactions on Vehicular Technology.