On Assessing the Impact of Jamming Strategies on the Behavior of DYMO-Based MANETs

The wide-scale deployment of smart phones has begun to provide a pragmatic deployment environment for at-scale MANETs, (i.e., for providing non-cellular based mobile device services). The services enabled via these MANETs will, of course, be subject to cyber-attacks, some of the simplest of which are wireless jamming attacks. Through simulation studies, this work assesses the impact that such jamming attacks have on standard network-level MANET features, (i.e., packet delivery ratio (PDR), hops traveled, delay, etc.), using DYMO as the exemplar MANET routing protocol. More particularly, it is shown that jamming causes more complex effects to the MANET's behavior than generally has been reported. For example jamming can cause: a) it to take considerably longer for start-up transients to decay, and b) a larger percentage of the experiments in which statistical steady-states are never reached, (i.e., the start-up transients are never observed to decay). These results are important as they highlight that jamming can have significant impact's on MANET operations past just causing network disconnections. These issues, in turn, imply that designing jamming resistant or resilient MANETs may be significantly more challenging than prior work would tend to suggest.

[1]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[2]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..

[3]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[4]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[5]  P. Peebles Probability, Random Variables and Random Signal Principles , 1993 .

[6]  Radha Poovendran,et al.  Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[7]  Prashant Krishnamurthy,et al.  On limited-range strategic/random jamming attacks in wireless ad hoc networks , 2009, 2009 IEEE 34th Conference on Local Computer Networks.

[8]  Mingyan Liu,et al.  Random waypoint considered harmful , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[9]  B. Yu. Lemeshko,et al.  Comparative analysis of the power of goodness-of-fit tests for near competing hypotheses. II. Verification of complex hypotheses , 2009 .

[10]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[11]  Michael McGuire,et al.  Stationary distributions of random walk mobility models for wireless ad hoc networks , 2005, MobiHoc '05.

[12]  Scott F. Midkiff,et al.  Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses , 2008, IEEE Pervasive Computing.

[13]  B. Yu. Lemeshko,et al.  Comparative analysis of the power of goodness-of-fit tests for near competing hypotheses. I. The verification of simple hypotheses , 2009 .

[14]  Rajendra V. Boppana,et al.  Mitigating malicious control packet floods in ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[15]  Deepali Arora,et al.  STARS: A Framework for Statistically Rigorous Simulation-Based Network Research , 2011, 2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications.

[16]  Lijun Qian,et al.  Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.

[17]  Geethapriya Thamilarasu,et al.  A Cross-layer Approach to Detect Jamming Attacks in Wireless Ad hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[18]  Jalel Ben-Othman,et al.  Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution , 2009, 2009 IEEE International Conference on Communications.