Self-healing wireless networks under insider jamming attacks

As jamming is a very serious threat to the normal operation of wireless networks, recently much research has been done to deal with it. Different from most existing research, In this work, we tackle the jamming attack problem in a systematic way. Specifically, we design a protocol that is capable of self-healing wireless networks under jamming attacks. The protocol identifies and excludes an insider jammer and then restores normal data communications among benign nodes despite the presence of jamming by an initially unknown compromised node. Our scheme integrates key management, jammer identification and jammer isolation in one system. We evaluated the protocol with USRP devices and GNURadio in the context of jammer localization. The experiments show that our protocol can identify and isolate the insider jammer with high accuracy.

[1]  Sisi Liu,et al.  Thwarting inside jamming attacks on wireless broadcast communications , 2011, WiSec '11.

[2]  Yih-Chun Hu,et al.  Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks , 2007, IEEE/ACM Transactions on Networking.

[3]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[4]  Don J. Torrieri Direction finding of a compromised node in a spread-spectrum network , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.

[5]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[6]  Don Torrieri,et al.  Principles of Spread-Spectrum Communication Systems , 2004 .

[7]  Richard A. Poisel,et al.  Modern Communications Jamming Principles and Techniques , 2003 .

[8]  Dan Rubenstein,et al.  Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[9]  Donggang Liu,et al.  Adaptive Jamming-Resistant Broadcast Systems with Partial Channel Sharing , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.

[10]  Peng Ning,et al.  BitTrickle: Defending against broadband and high-power reactive jamming attacks , 2012, 2012 Proceedings IEEE INFOCOM.

[11]  Srdjan Capkun,et al.  Efficient uncoordinated FHSS anti-jamming communication , 2009, MobiHoc '09.

[12]  Don Torrieri Principles of Spread-Spectrum Communication Systems, 2nd Edition , 2011 .

[13]  Klara Nahrstedt,et al.  A novel approach to identify insider-based jamming attacks in multi-channel wireless networks , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[14]  Theodore S. Rappaport,et al.  Wireless Communications: Principles and Practice (2nd Edition) by , 2012 .

[15]  Josef Pieprzyk,et al.  Broadcast anti-jamming systems , 2001, Comput. Networks.

[16]  Aleksandar Neskovic,et al.  Modern approaches in modeling of mobile radio systems propagation environment , 2000, IEEE Communications Surveys & Tutorials.

[17]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.