Improving anti-jamming capability and increasing jamming impact with mobility control

The impact of a jamming attack on wireless communication depends on a number of physical characteristics and network protocol parameters. In particular, it depends on the relative geometries of the adversarial network of jammers and the network under attack. Hence, changes in network geometry achieved through node and jammer mobility can have significant influence on the impact of a jamming attack. In this work, we investigate the use of mobility as a tool to allow both the adversarial network and the network under attack to reconfigure their geometry in an attempt to improve attack impact and protocol performance, respectively. We present a mobility control framework for use by nodes in the network under attack and by jammer in the adversarial network. We show that a number of factors can be incorporated into node and jammer mobility using the proposed framework.

[1]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[2]  Pramod K. Varshney,et al.  Energy-efficient deployment of Intelligent Mobile sensor networks , 2005, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[3]  H. Vincent Poor,et al.  An energy-efficient approach to power control and receiver design in wireless data networks , 2005, IEEE Transactions on Communications.

[4]  Qijun Gu,et al.  Privacy Preserving Mobility Control Protocols in Wireless Sensor Networks , 2008, 2008 International Symposium on Parallel Architectures, Algorithms, and Networks (i-span 2008).

[5]  Donald F. Towsley,et al.  Mobility improves coverage of sensor networks , 2005, MobiHoc '05.

[6]  Don J. Torrieri Principles of Secure Communication Systems , 1985 .

[7]  Jie Wu,et al.  Mobility control schemes with quick convergence in wireless sensor networks , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.

[8]  Jie Wu,et al.  Mobility control for achieving optimal configuration in wireless sensor networks , 2010, Wirel. Networks.

[9]  Srdjan Capkun,et al.  Mobility helps security in ad hoc networks , 2003, MobiHoc '03.

[10]  David J. Thuente,et al.  Intelligent jamming in wireless networks with applications to 802.11b and other networks , 2006 .

[11]  Wade Trappe,et al.  Managing the Mobility of a Mobile Sensor Network Using Network Dynamics , 2008, IEEE Transactions on Parallel and Distributed Systems.

[12]  Jie Wu,et al.  Mobility Control for Complete Coverage in Wireless Sensor Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems Workshops.

[13]  Guevara Noubir,et al.  On link layer denial of service in data wireless LANs , 2005, Wirel. Commun. Mob. Comput..

[14]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[15]  Wenyuan Xu,et al.  Channel Surfing: Defending Wireless Sensor Networks from Interference , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[16]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[17]  Zack J. Butler,et al.  Controlling mobile sensors for monitoring events with coverage constraints , 2004, IEEE International Conference on Robotics and Automation, 2004. Proceedings. ICRA '04. 2004.

[18]  Thomas F. La Porta,et al.  Sensor relocation in mobile sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[19]  Xin Liu,et al.  SPREAD: Foiling Smart Jammers Using Multi-Layer Agility , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[20]  Tracy Camp,et al.  A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..

[21]  Jie Lin,et al.  Towards mobility as a network control primitive , 2004, MobiHoc '04.