Time Series Analysis for Jamming Attack Detection in Wireless Networks

Due to the open nature of wireless communication medium, wireless networks are susceptible to jamming attacks. Jammers interfere with the legitimate nodes by sending strong jamming signals. Legitimate nodes can successfully transmit only between the gaps of the jamming signals. It is therefore very important to detect a jamming attack as soon as it happens in order to effectively take counter measurements. There are various types of jamming attacks, however, the {\it signature} of all jamming attacks is the performance degradation of legitimate nodes. Based on this observation, we develop a detection method using time series analysis approach. We model the network measurements taken over time as time series, and employ a sequential change point detection algorithm to detect the change of state in the time series, which is an indicator of change in the network state. Timely and accurate detection is the first step before further identification and localization of the source of interference. In this paper, we address the detection part and leave the localization of the jammer to future work. The jamming attacks are simulated in ns-3 simulator, and the detection result is satisfactory in terms of false alarm rate and detection delay.

[1]  Gang Zhou,et al.  RID: radio interference detection in wireless sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[2]  E. S. Page CONTINUOUS INSPECTION SCHEMES , 1954 .

[3]  Geethapriya Thamilarasu,et al.  A Cross-layer Approach to Detect Jamming Attacks in Wireless Ad hoc Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[4]  Bo Yu,et al.  An improved detection method for different types of jamming attacks in wireless networks , 2014, The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014).

[5]  Radha Poovendran,et al.  Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[6]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[7]  G. Lorden PROCEDURES FOR REACTING TO A CHANGE IN DISTRIBUTION , 1971 .

[8]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[9]  Ying Lin,et al.  Distributed detection of jamming and defense in wireless sensor networks , 2009, 2009 43rd Annual Conference on Information Sciences and Systems.

[10]  Donggang Liu,et al.  Fast jamming detection in sensor networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[11]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[12]  Ziyuan Cai,et al.  A New Model-Based Method to Detect Radio Jamming Attack to Wireless Networks , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).

[13]  Jens B. Schmitt,et al.  Detection of Reactive Jamming in DSSS-based Wireless Communications , 2014, IEEE Transactions on Wireless Communications.

[14]  Srdjan Capkun,et al.  Detection of Reactive Jamming in Sensor Networks , 2009 .

[15]  Murat Çakiroglu,et al.  Jamming detection mechanisms for wireless sensor networks , 2008, Infoscale.