Transmission Early-Stopping Scheme for Anti-Jamming Over Delay-Sensitive IoT Applications

Time-critical, wireless Internet of Things applications have been drawing increasing attention lately. The most characterizing feature of such applications is that a packet has to be delivered within a certain deadline. Not meeting the deadline could result in severe consequences. Jamming attacks utilize the shared nature of the wireless medium to corrupt transmitted packets. Although a corrupted packet could be retransmitted several times until successful delivery, this would add latency and hence could lead to missing the deadline. In this paper, we propose a jamming detection scheme that uses the packet transmission time as a statistic to make detection decisions. The key insight behind our proposed scheme is that, a long transmission/retransmission time for a certain packet indicates an abnormal condition, such as jamming. Therefore, we devise an optimal transmission-time threshold that, when exceeded, a jammer is detected. Unlike most existing detection schemes where, in case of a detection error, retransmission could continue until the deadline is reached, our scheme aims to detect the jammer earlier than the deadline so that the remaining time (until the deadline) could be utilized in retransmitting the packet over a safe channel. The proposed detection scheme is a general framework that can be applied to many situations. After conducting a thorough analysis, we apply the proposed early-stop jamming detection framework to the distributed coordinated function medium access mechanism specified by the 802.11 standard. Our simulation results show significant performance gains achieved by the proposed scheme.

[1]  Xinyu Yang,et al.  A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.

[2]  Xin Liu,et al.  Performance of IEEE 802.11 under Jamming , 2008, Mobile Networks and Applications.

[3]  Longfei Wu,et al.  A Survey on Security and Privacy Issues in Internet-of-Things , 2017, IEEE Internet of Things Journal.

[4]  Srdjan Capkun,et al.  Detection of Reactive Jamming in Sensor Networks , 2009 .

[5]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[6]  Ricardo J. Rodríguez,et al.  Survivability Model for Security and Dependability Analysis of a Vulnerable Critical System , 2018, 2018 27th International Conference on Computer Communication and Networks (ICCCN).

[7]  L. Scharf,et al.  Statistical Signal Processing: Detection, Estimation, and Time Series Analysis , 1991 .

[8]  Andrea Bobbio,et al.  Reliability and Availability Engineering - Modeling, Analysis, and Applications , 2017 .

[9]  Shi Jin,et al.  Optimal Jamming Attack Strategy Against Wireless State Estimation: A Game Theoretic Approach , 2018, IECON 2018 - 44th Annual Conference of the IEEE Industrial Electronics Society.

[10]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[11]  Bo Yu,et al.  An improved detection method for different types of jamming attacks in wireless networks , 2014, The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014).

[12]  Ziyuan Cai,et al.  A New Model-Based Method to Detect Radio Jamming Attack to Wireless Networks , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).

[13]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[14]  Hang Liu,et al.  Modeling and performance evaluation of jamming-tolerant wireless systems , 2019, J. Ambient Intell. Humaniz. Comput..

[15]  Sajjad Hussain Shah,et al.  A survey: Internet of Things (IOT) technologies, applications and challenges , 2016, 2016 IEEE Smart Energy Grid Engineering (SEGE).

[16]  Moussa Ayyash,et al.  Spectrum Assignment in Cognitive Radio Networks for Internet-of-Things Delay-Sensitive Applications Under Jamming Attacks , 2018, IEEE Internet of Things Journal.

[17]  Sailes K. Sengijpta Fundamentals of Statistical Signal Processing: Estimation Theory , 1995 .

[18]  Zhuo Lu,et al.  From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic , 2011, 2011 Proceedings IEEE INFOCOM.

[19]  Kishor S. Trivedi Probability and Statistics with Reliability, Queuing, and Computer Science Applications , 1984 .

[20]  E. Veronica Belmega,et al.  Mitigating Jamming Attacks Using Energy Harvesting , 2019, IEEE Wireless Communications Letters.

[21]  H. Vincent Poor,et al.  An introduction to signal detection and estimation (2nd ed.) , 1994 .

[22]  K. J. Ray Liu,et al.  Optimal Defense against Jamming Attacks in Cognitive Radio Networks Using the Markov Decision Process Approach , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[23]  Zhuo Lu,et al.  Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications , 2014, IEEE Transactions on Mobile Computing.

[24]  Mikael Gidlund,et al.  A Delay-Bounded MAC Protocol for Mission- and Time-Critical Applications in Industrial Wireless Sensor Networks , 2018, IEEE Sensors Journal.

[25]  Sanjay E. Sarma,et al.  The Future Internet of Things: Secure, Efficient, and Model-Based , 2017, IEEE Internet of Things Journal.

[26]  Radha Poovendran,et al.  Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[27]  Jim Kurose,et al.  Computer Networking: A Top-Down Approach (6th Edition) , 2007 .

[28]  Donggang Liu,et al.  Fast jamming detection in sensor networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[29]  Kishor S. Trivedi,et al.  Transient performance & availability modeling in high volume outpatient clinics , 2017, 2017 Annual Reliability and Maintainability Symposium (RAMS).

[30]  Giancarlo Fortino,et al.  Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.

[31]  David L Adamy,et al.  Ew 101: A First Course in Electronic Warfare , 2001 .