Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications

Recently, wireless networking for emerging cyber-physical systems, in particular the smart grid, has been drawing increasing attention in that it has broad applications for time-critical message delivery among electronic devices on physical infrastructures. However, the shared nature of wireless channels unavoidably exposes the messages in transit to jamming attacks, which broadcast radio interference to affect the network availability of electronic equipments. An important, yet open research question is how to model and detect jamming attacks in such wireless networks, where communication traffic is more time-critical than that in conventional data-service networks, such as cellular and WiFi networks. In this paper, we aim at modeling and detecting jamming attacks against time-critical wireless networks with applications to the smart grid. In contrast to communication networks where packets-oriented metrics, such as packet loss and throughput are used to measure the network performance, we introduce a new metric, message invalidation ratio, to quantify the performance of time-critical applications. Our modeling approach is inspired by the similarity between the behavior of a jammer who attempts to disrupt the delivery of a time-critical message and the behavior of a gambler who intends to win a gambling game. Therefore, by gambling-based modeling and real-time experiments, we find that there exists a phase transition phenomenon for successful time-critical message delivery under a variety of jamming attacks. That is, as the probability that a packet is jammed increases from 0 to 1, the message invalidation ratio first increases slightly, then increases dramatically to 1. Based on analytical and experimental results, we design the Jamming Attack Detection based on Estimation (JADE) scheme to achieve robust jamming detection, and implement JADE in a wireless network for power substations in the smart grid.

[1]  Mark Adamiak,et al.  IEC 61850 Communication Networks and Systems In Substations: An Overview for Users , 1988 .

[2]  David Williams,et al.  Probability with Martingales , 1991, Cambridge mathematical textbooks.

[3]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[4]  Nirwan Ansari,et al.  Do Low Rate DoS Attacks Affect QoS Sensitive VoIP Traffic? , 2006, 2006 IEEE International Conference on Communications.

[5]  Dan Rubenstein,et al.  Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[6]  F. Cleveland Uses of Wireless Communications to Enhance Power System Reliability , 2007, 2007 IEEE Power Engineering Society General Meeting.

[7]  T.S. Sidhu,et al.  Modelling and Simulation for Performance Evaluation of IEC61850-Based Substation Communication Systems , 2007, IEEE Transactions on Power Delivery.

[8]  S. Emrich Dispelling the Myths Associated with Spread Spectrum Radio Technology in Electric Power SCADA Networks , 2007, 2007 IEEE Power Engineering Society General Meeting.

[9]  Radha Poovendran,et al.  Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[10]  D. Malone,et al.  Modeling the 802.11 Distributed Coordination Function in Nonsaturated Heterogeneous Conditions , 2007, IEEE/ACM Transactions on Networking.

[11]  Srdjan Capkun,et al.  Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[12]  J.-P. Hubaux,et al.  Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.

[13]  Yih-Chun Hu,et al.  Dynamic Jamming Mitigation for Wireless Broadcast Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[14]  Xiaodong Wang,et al.  Robust Detection of MAC Layer Denial-of-Service Attacks in CSMA/CA Wireless Networks , 2008, IEEE Transactions on Information Forensics and Security.

[15]  Xin Liu,et al.  Performance of IEEE 802.11 under Jamming , 2008, Mobile Networks and Applications.

[16]  Jalel Ben-Othman,et al.  Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution , 2009, 2009 IEEE International Conference on Communications.

[17]  Anish Arora,et al.  Capabilities of Low-Power Wireless Jammers , 2009, IEEE INFOCOM 2009.

[18]  Srdjan Capkun,et al.  Efficient uncoordinated FHSS anti-jamming communication , 2009, MobiHoc '09.

[19]  Tarlochan S. Sidhu,et al.  Evaluation of communication technologies for IEC 61850 based distribution automation system with distributed energy resources , 2009, 2009 IEEE Power & Energy Society General Meeting.

[20]  Srdjan Capkun,et al.  Jamming-resistant Broadcast Communication without Shared Keys , 2009, USENIX Security Symposium.

[21]  H. J. Zhou,et al.  Efficient application of GPRS and CDMA networks in SCADA system , 2010, IEEE PES General Meeting.

[22]  Peng Ning,et al.  Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication , 2010, 2010 Proceedings IEEE INFOCOM.

[23]  Nada Golmie,et al.  NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 1.0 , 2010 .

[24]  Mark D. Hadley,et al.  A Survey of Wireless Communications for the Electric Power System , 2010 .

[25]  Jianfeng Ma,et al.  On Network Performance Evaluation toward the Smart Grid: A Case Study of DNP3 over TCP/IP , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[26]  Enrico Casini,et al.  IP QoS with military precedence level for the NATO information infrastructure , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[27]  Zhuo Lu,et al.  From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic , 2011, 2011 Proceedings IEEE INFOCOM.

[28]  Ivan Martinovic,et al.  Short paper: reactive jamming in wireless networks: how realistic is the threat? , 2011, WiSec '11.

[29]  Daisuke Umehara,et al.  New throughput analysis of long-distance IEEE 802.11 wireless communication system for smart grid , 2011, 2011 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[30]  Bo Sheng,et al.  On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming , 2011, WiSec '11.

[31]  Nada Golmie,et al.  NIST Framework and Roadmap for Smart Grid Interoperability Standards, Release 2.0 , 2012 .

[32]  Tao Jin,et al.  Efficient Spread Spectrum Communication without Preshared Secrets , 2013, IEEE Transactions on Mobile Computing.