A Jammer Deployment Method for Multi-hop Wireless Network Based on Degree Distribution

In recent years, Multi-Hop Wireless Network (MHWN) has been widely researched and deployed since it is a feasible architecture to realize pervasive network connection in complex network environment. As one of the hot research topics in MHWN, jamming attack has attracted much attention due to the fact that it is a simple but effective attack method to reduce the throughput of MHWN. The current jamming attack methods are mostly proposed from the perspective of time or frequency domain. In contrast, as a non-negligible problem, jammers' spatial deployment has drawn much little attention. In order to bridge this gap, this paper firstly formulates the problem of jammer deployment. Secondly, a jammer deployment method based on network degree distribution theory is put forward. Finally, the performance of the proposed method is validated through a series of simulation experiments.

[1]  J. H. Fan,et al.  Interference activity aware multi-path routing protocol , 2012, EURASIP J. Wirel. Commun. Netw..

[2]  Xiaodong Wang,et al.  Jamming attack in WSN: a spatial perspective , 2011, UbiComp '11.

[3]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[4]  Bao-Qiang Kan,et al.  Interference activity aware multi-path routing protocol , 2012 .

[5]  Triet Vo Huu,et al.  Counter-jamming using mixed mechanical and software interference cancellation , 2013, WiSec '13.

[6]  Sisi Liu,et al.  Mitigating control-channel jamming attacks in multi-channel ad hoc networks , 2009, WiSec '09.

[7]  Yuan Xue,et al.  Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks , 2011, J. Netw. Comput. Appl..

[8]  Srdjan Capkun,et al.  Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .

[9]  J.E. Mazo,et al.  Digital communications , 1985, Proceedings of the IEEE.

[10]  Srdjan Capkun,et al.  Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.

[11]  Radha Poovendran,et al.  Mitigation of Control Channel Jamming under Node Capture Attacks , 2009, IEEE Transactions on Mobile Computing.

[12]  Mithun Acharya,et al.  Intelligent Jamming in 802 . 11 b Wireless Networks , 2004 .

[13]  Wenyuan Xu,et al.  Anti-jamming timing channels for wireless networks , 2008, WiSec '08.

[14]  Radha Poovendran,et al.  Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[15]  ZhangJin,et al.  An efficient and fair MAC protocol robust to reactive interference , 2013 .

[16]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[17]  Christian Scheideler,et al.  An Efficient and Fair MAC Protocol Robust to Reactive Interference , 2013, IEEE/ACM Transactions on Networking.

[18]  Yuan Xue,et al.  Taxonomy for description of cross-domain attacks on CPS , 2013, HiCoNS '13.

[19]  Elaine Shi,et al.  Detection of denial-of-message attacks on sensor network broadcasts , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[20]  Srinivasan Seshan,et al.  Understanding and mitigating the impact of RF interference on 802.11 networks , 2007, SIGCOMM 2007.

[21]  Timothy X. Brown,et al.  Jamming and sensing of encrypted wireless ad hoc networks , 2006, MobiHoc '06.

[22]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.