Dynamic Adaptive Anti-Jamming via Controlled Mobility

In this paper, the mobility of network nodes is explored as a new promising approach for jamming defense. To fulfill it, properly designed node motion that can intelligently adapt to the jammer's action is crucial. In our study, anti-jamming mobility control is investigated in the context of the single and multiple commodity flow problems, in the presence of intelligent mobile jammers which can respond to the evasion of legitimate nodes as well. Based on spectral graph theory, two new spectral quantities, single- and multi-weighted Cheeger constants and corresponding eigenvalue variants, are constructed to direct motions of the defender and the attacker in this dynamic adaptive competition. Both analytical and simulation results are presented to justify the effectiveness of the proposed approach. Furthermore, the proposed scheme can also be applied in cognitive radio networks to reconfigure the secondary users in the presence of mobile primary users.

[1]  Peng Ning,et al.  Communication Efficiency of Anti-Jamming Broadcast in Large-Scale Multi-Channel Wireless Networks , 2012, IEEE Transactions on Signal Processing.

[2]  Peng Ning,et al.  Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication , 2010, 2010 Proceedings IEEE INFOCOM.

[3]  David Kempe,et al.  A decentralized algorithm for spectral analysis , 2008, J. Comput. Syst. Sci..

[4]  Wenyuan Xu,et al.  Anti-jamming timing channels for wireless networks , 2008, WiSec '08.

[5]  Srikanth V. Krishnamurthy,et al.  Lightweight Jammer Localization in Wireless Networks: System Design and Implementation , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[6]  Scott D. Coutts Passive localization of moving emitters using out-of-plane multipath , 2000, IEEE Trans. Aerosp. Electron. Syst..

[7]  Sushil Jajodia,et al.  Moving Target Defense II , 2013, Advances in Information Security.

[8]  Guosen Yue,et al.  Anti-jamming coding techniques with application to cognitive radio , 2009, IEEE Transactions on Wireless Communications.

[9]  Tao Jin,et al.  Zero pre-shared secret key establishment in the presence of jammers , 2009, MobiHoc '09.

[10]  Devavrat Shah,et al.  Product Multicommodity Flow in Wireless Networks , 2006, IEEE Transactions on Information Theory.

[11]  Jochen Könemann,et al.  Faster and Simpler Algorithms for Multicommodity Flow and Other Fractional Packing Problems , 2007, SIAM J. Comput..

[12]  Patrick Tague,et al.  Improving anti-jamming capability and increasing jamming impact with mobility control , 2010, The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010).

[13]  Ieee Staff,et al.  2013 IEEE Conference on Communications and Network Security (CNS) , 2013 .

[14]  Fan Chung,et al.  Spectral Graph Theory , 1996 .

[15]  Zhu Han,et al.  Dogfight in Spectrum: Jamming and Anti-Jamming in Multichannel Cognitive Radio Systems , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[16]  Guevara Noubir,et al.  Linear programming models for jamming attacks on network traffic flows , 2008, WiOpt 2008.

[17]  Frank Thomson Leighton,et al.  Multicommodity max-flow min-cut theorems and their use in designing approximation algorithms , 1999, JACM.

[18]  Wenyuan Xu,et al.  Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.

[19]  D. R. Fulkerson,et al.  Maximal Flow Through a Network , 1956 .

[20]  Xiang-Yang Li,et al.  Towards Optimal Adaptive UFH-Based Anti-Jamming Wireless Communication , 2012, IEEE Journal on Selected Areas in Communications.

[21]  Wenyuan Xu,et al.  Exploiting Jamming-Caused Neighbor Changes for Jammer Localization , 2012, IEEE Transactions on Parallel and Distributed Systems.

[22]  J. A. Tomlin,et al.  Minimum-Cost Multicommodity Network Flows , 1966, Oper. Res..

[23]  Peng Ning,et al.  BitTrickle: Defending against broadband and high-power reactive jamming attacks , 2012, 2012 Proceedings IEEE INFOCOM.

[24]  Srdjan Capkun,et al.  Anti-jamming broadcast communication using uncoordinated spread spectrum techniques , 2010, IEEE Journal on Selected Areas in Communications.

[25]  Franz S. Hover,et al.  Laplacians for flow networks , 2011, SIAM J. Discret. Math..

[26]  Srdjan Capkun,et al.  Jamming-resistant Broadcast Communication without Shared Keys , 2009, USENIX Security Symposium.

[27]  D. West Introduction to Graph Theory , 1995 .

[28]  Ruey-Wen Liu,et al.  Anti-jamming filtering in the autocorrelation domain , 2004, IEEE Signal Processing Letters.

[29]  Wade Trappe,et al.  Managing the Mobility of a Mobile Sensor Network Using Network Dynamics , 2008, IEEE Transactions on Parallel and Distributed Systems.

[30]  Jonah Sherman,et al.  Breaking the Multicommodity Flow Barrier for O(vlog n)-Approximations to Sparsest Cut , 2009, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.

[31]  Rudra Dutta,et al.  A routing approach to jamming mitigation in wireless multihop networks , 2011, 2011 18th IEEE Workshop on Local & Metropolitan Area Networks (LANMAN).

[32]  Srdjan Capkun,et al.  Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[33]  Peng Ning,et al.  USD-FH: Jamming-resistant wireless communication using Frequency Hopping with Uncoordinated Seed Disclosure , 2010, The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010).

[34]  Peng Ning,et al.  Dynamic Adaptive Anti-Jamming via Mobility Control , 2013 .

[35]  Peng Ning,et al.  Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure , 2010, ACSAC '10.

[36]  Jie Lin,et al.  Towards mobility as a network control primitive , 2004, MobiHoc '04.

[37]  Andrea Goldsmith,et al.  Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).

[38]  K. J. Ray Liu,et al.  An anti-jamming stochastic game for cognitive radio networks , 2011, IEEE Journal on Selected Areas in Communications.

[39]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[40]  Tamer Basar,et al.  Graph-theoretic approach for connectivity maintenance in mobile networks in the presence of a jammer , 2010, 49th IEEE Conference on Decision and Control (CDC).