JADE: Jamming-averse routing on cognitive radio mesh networks

The spectrum sensing capability of cognitive radio (CR) enables a lot of opportunities to wireless networks, but also enables intelligent attacks by malicious players. One attack in this category is reactive jamming, in which the attacker senses the wireless spectrum, decodes parts of packets, and selectively interferes with packets. In so doing, an attacker can reduce energy expenditure and increase stealth while maintaining a high impact. Of the approaches to mitigate jamming, in this work, we focus on the jamming resilient routing in CR mesh networks. To do this we use signal-to-noise-interference ratio (SINR) which reflects the jamming impact. This metric is difficult to measure with commodity radio chipsets that cannot differentiate jamming interference from the received signal. Detecting SINR becomes even harder if reactive jamming is used by an attacker. In this study, we develop a mechanism to estimate SINR under reactive jamming. The estimated SINR information of each wireless link is then used to determine the jamming-averse directivity (JAD) of packets, which improves the routing performance of the victim network. We validate the proposed mechanism with a simulation study, showing that the proposed JAD escorted (JADE) routing dramatically improves routing path discovery performance including path discovery probability, path length, elapsed time for path discovery, retransmission attempts, and path quality under reactive jamming. Among the 200 route requests at 10 different configurations in our simulation, the reactive jammer disrupts the 77.5% of total requests. However, our JADE routing decreases the route discovery failure rate to 7.5% by saving the 96.7% of failed requests.

[1]  Ivan Martinovic,et al.  Short paper: reactive jamming in wireless networks: how realistic is the threat? , 2011, WiSec '11.

[2]  Mihui Kim,et al.  DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System , 2010, Sensors.

[3]  Satish K. Tripathi,et al.  A framework for reliable routing in mobile ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[4]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[5]  Richard A. Poisel,et al.  Introduction to Communication Electronic Warfare Systems , 2002 .

[6]  Wenyuan Xu,et al.  Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.

[7]  Sayyed Aziz,et al.  PACKET-HIDING METHODS FOR PREVENTING SELECTIVE JAMMING ATTACKS , 2014 .

[8]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[9]  Philippe Jacquet,et al.  Optimized Link State Routing Protocol (OLSR) , 2003, RFC.

[10]  Wenyuan Xu,et al.  Short paper: Jamming-resilient multipath routing leveraging availability-based correlation , 2011, WiSec '11.

[11]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[12]  David L. Johnson,et al.  Simple pragmatic approach to mesh routing using BATMAN , 2008 .

[13]  Patrick Tague,et al.  MeshJam: Intelligent Jamming Attack and Defense in IEEE 802.11s Wireless Mesh Networks , 2013, 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems.

[14]  Richard A. Poisel,et al.  Modern Communications Jamming Principles and Techniques , 2003 .