Modeling and performance evaluation of jamming-tolerant wireless systems

Many of the failures suffered by wireless systems are not accidental; they are actually caused by security breaches. Therefore, the conventional QoS measures are not sufficient for quantifying the performance of wireless systems. In fact, there is a need for security-related QoS measures that describe the performance of wireless systems under security-breaches. In this paper we focus on Jamming which is one of the most common security breaches in wireless systems. We propose a mathematical model for jamming-tolerant wireless systems. Our model is based on the theory of semi-Markov processes (SMPs). By analyzing the steady-state behavior of the proposed SMP, we derive security-related performance measures such as the steady-state availability and the “mean time to process a packet” (MTTPP). By studying the transient behavior of the proposed SMP, we derive the “probability of packet failure” (PPF) and the “mean time to packet failure” (MTTPF) performance measures. With the proposed model, we analyze the performance of a real jamming-tolerant wireless system for smart grid applications and the numerical results are presented.

[1]  Tomas Olovsson,et al.  Towards operational measures of computer security: Experimentation and modelling , 1995 .

[2]  Zhuo Lu,et al.  From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic , 2011, 2011 Proceedings IEEE INFOCOM.

[3]  Kishor S. Trivedi Probability and Statistics with Reliability, Queuing, and Computer Science Applications , 1984 .

[4]  Richard A. Poisel,et al.  Modern Communications Jamming Principles and Techniques , 2003 .

[5]  Wenyuan Xu,et al.  Channel surfing: defending wireless sensor networks from jamming and interference , 2006, SenSys '06.

[6]  Xianzhi Wang,et al.  Trust architecture and reputation evaluation for internet of things , 2018, J. Ambient Intell. Humaniz. Comput..

[7]  B. Sarojini,et al.  Survey on Big Data and Cloud Computing , 2017, 2017 World Congress on Computing and Communication Technologies (WCCCT).

[8]  Longfei Wu,et al.  A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.

[9]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[10]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[11]  Radha Poovendran,et al.  Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[12]  Seong-Taek Park,et al.  A study on smart factory-based ambient intelligence context-aware intrusion detection system using machine learning , 2018, J. Ambient Intell. Humaniz. Comput..

[13]  Jim Kurose,et al.  Computer Networking: A Top-Down Approach , 1999 .

[14]  Srdjan Capkun,et al.  Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[15]  Rodolphe Ortalo,et al.  Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security , 1999, IEEE Trans. Software Eng..

[16]  Ingrid Moerman,et al.  Time-critical communication in 6TiSCH networks , 2018, 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW).

[17]  Guevara Noubir,et al.  On link layer denial of service in data wireless LANs , 2005, Wirel. Commun. Mob. Comput..

[18]  Akhil Gupta,et al.  Security threats of wireless networks: A survey , 2015, International Conference on Computing, Communication & Automation.

[19]  Somesh Jha,et al.  Minimization and Reliability Analyses of Attack Graphs , 2002 .

[20]  Aamir Mahmood,et al.  Wireless Mediation of Multiple Equi-Priority Events in Time-Critical Industrial Applications , 2018, SmartCitiesSecurity@MobiHoc.

[21]  Xin Liu,et al.  Performance of IEEE 802.11 under Jamming , 2008, Mobile Networks and Applications.

[22]  Xiaodong Wang,et al.  Robust Detection of MAC Layer Denial-of-Service Attacks in CSMA/CA Wireless Networks , 2008, IEEE Transactions on Information Forensics and Security.

[23]  Milena Ivanova,et al.  The IEC 61850 standard — Communication networks and automation systems from an electrical engineering point of view , 2016, 2016 19th International Symposium on Electrical Apparatus and Technologies (SIELA).

[24]  Moussa Ayyash,et al.  Spectrum Assignment in Cognitive Radio Networks for Internet-of-Things Delay-Sensitive Applications Under Jamming Attacks , 2018, IEEE Internet of Things Journal.

[25]  Bharat B. Madan,et al.  A method for modeling and quantifying the security attributes of intrusion tolerant systems , 2004, Perform. Evaluation.

[26]  Andrea Bobbio,et al.  Reliability and Availability Engineering - Modeling, Analysis, and Applications , 2017 .

[27]  Yang Xiao,et al.  Future Generation Computer Systems a Survey of Communication/networking in Smart Grids , 2022 .

[28]  Zhuo Lu,et al.  Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications , 2014, IEEE Transactions on Mobile Computing.

[29]  Jonathan Rodriguez,et al.  Network Intrusion Detection System for Jamming Attack in LoRaWAN Join Procedure , 2018, 2018 IEEE International Conference on Communications (ICC).

[30]  Ehsan Namjoo,et al.  LR-HIDS: logistic regression host-based intrusion detection system for cloud environments , 2018, Journal of Ambient Intelligence and Humanized Computing.

[31]  Tomas Olovsson,et al.  A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior , 1997, IEEE Trans. Software Eng..

[32]  Jim Kurose,et al.  Computer Networking: A Top-Down Approach (6th Edition) , 2007 .

[33]  Haythem Bany Salameh,et al.  Security-aware channel assignment in IoT-based cognitive radio networks for time-critical applications , 2017, 2017 Fourth International Conference on Software Defined Systems (SDS).