Jamming and anti-jamming techniques in wireless networks: a survey

Because of the proliferation of wireless technologies, jamming in wireless networks has become a major research problem due to the ease in blocking communication in wireless networks. Jamming attacks are a subset of denial of service (DoS) attacks in which malicious nodes block legitimate communication by causing intentional interference in networks. To better understand jamming and anti-jamming, we surveyed and analysed their various techniques. For evaluating jamming, we categorised the types of jammers implemented in the literature and investigated the placement strategies for supporting effective jamming. For anti-jamming approaches, we start by discussing the protocols for localising jammers before presenting the mechanisms for detection and jamming countermeasure. We present comparison tables for each of the jammer types, jammer placements, jammer localisation, jamming detection schemes and jamming countermeasures. Our analyses are helpful for selecting an existing strategy for a particular system setup. Finally, we discuss open issues in this field.

[1]  Guevara Noubir,et al.  Linear programming models for jamming attacks on network traffic flows , 2008, WiOpt 2008.

[2]  Rami G. Melhem,et al.  Jamming Mitigation in Multi-Radio Wireless Networks: Reactive or Proactive? , 2008, SecureComm.

[3]  Emile H. L. Aarts,et al.  Simulated Annealing: Theory and Applications , 1987, Mathematics and Its Applications.

[4]  Wenyuan Xu,et al.  Extracting jamming signals to locate radio interferers and jammers , 2012, MobiHoc '12.

[5]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[6]  Xin Liu,et al.  Performance of IEEE 802.11 under Jamming , 2008, Mobile Networks and Applications.

[7]  David Williams,et al.  Probability with Martingales , 1991, Cambridge mathematical textbooks.

[8]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[9]  Peng Ning,et al.  Jamming-Resistant Collaborative Broadcast Using Uncoordinated Frequency Hopping , 2012, IEEE Transactions on Information Forensics and Security.

[10]  Dan Rubenstein,et al.  Using Channel Hopping to Increase 802.11 Resilience to Jamming Attacks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[11]  Rami G. Melhem,et al.  Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks , 2008, MobiQuitous.

[12]  Jitendra K. Tugnait,et al.  Spectrally Efficient Jamming Mitigation Based on Code-Controlled Frequency Hopping , 2011, IEEE Transactions on Wireless Communications.

[13]  Yih-Chun Hu,et al.  Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks , 2007, IEEE/ACM Transactions on Networking.

[14]  Sencun Zhu,et al.  An Algorithm for Jammer Localization in Wireless Sensor Networks , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.

[15]  Peng Ning,et al.  Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication , 2010, 2010 Proceedings IEEE INFOCOM.

[16]  Taieb Znati,et al.  Reactive jamming attacks in multi-radio wireless sensor networks: an efficient mitigating measure by identifying trigger nodes , 2009, FOWANC '09.

[17]  Eylem Ekici,et al.  Adaptive Channel Hopping for Interference Robust Wireless Sensor Networks , 2010, 2010 IEEE International Conference on Communications.

[18]  Ranjit Singh,et al.  Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System , 2010, Sensors.

[19]  Prashant Krishnamurthy,et al.  On limited-range strategic/random jamming attacks in wireless ad hoc networks , 2009, 2009 IEEE 34th Conference on Local Computer Networks.

[20]  Srdjan Capkun,et al.  Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[21]  Srikanth V. Krishnamurthy,et al.  On the Efficacy of Frequency Hopping in Coping with Jamming Attacks in 802.11 Networks , 2010, IEEE Transactions on Wireless Communications.

[22]  Guevara Noubir,et al.  Linear programming models for jamming attacks on network traffic flows , 2008, 2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops.

[23]  Hong Huang,et al.  Jamming Dust: A Low-Power Distributed Jammer Network , 2010 .

[24]  Jalel Ben-Othman,et al.  Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution , 2009, 2009 IEEE International Conference on Communications.

[25]  Zhuo Lu,et al.  From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic , 2011, 2011 Proceedings IEEE INFOCOM.

[26]  Charalampos Konstantopoulos,et al.  Defending Wireless Sensor Networks from Jamming Attacks , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[27]  Gang Zhou,et al.  DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[28]  Marimuthu Palaniswami,et al.  Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2009, SASN '05.

[29]  Kumkum Garg,et al.  A Hybrid Model of Defense Techniques against Base Station Jamming Attack in Wireless Sensor Networks , 2009, 2009 First International Conference on Computational Intelligence, Communication Systems and Networks.

[30]  F. Golatowski,et al.  Weighted Centroid Localization in Zigbee-based Sensor Networks , 2007, 2007 IEEE International Symposium on Intelligent Signal Processing.

[31]  Geethapriya Thamilarasu,et al.  Game Theoretic Modeling of Jamming Attacks in Ad hoc Networks , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[32]  Srikanth V. Krishnamurthy,et al.  Gaming the jammer: Is frequency hopping effective? , 2009, 2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.

[33]  Wenyuan Xu,et al.  Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.

[34]  Christian Scheideler,et al.  A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks , 2010, DISC.

[35]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[36]  Srdjan Capkun,et al.  Detection of Reactive Jamming in Sensor Networks , 2009 .

[37]  Srdjan Capkun,et al.  Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.

[38]  Wenyuan Xu,et al.  Localizing jammers in wireless networks , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[39]  Wenyuan Xu,et al.  Determining the position of a jammer using a virtual-force iterative approach , 2011, Wirel. Networks.

[40]  Robert Simon,et al.  MULEPRO: a multi-channel response to jamming attacks in wireless sensor networks , 2010, Wirel. Commun. Mob. Comput..

[41]  Srinivasan Seshan,et al.  Understanding and mitigating the impact of RF interference on 802.11 networks , 2007, SIGCOMM 2007.

[42]  Lisa Ann Osadciw,et al.  Jamming attack detection and countermeasures in wireless sensor network using ant system , 2006, SPIE Defense + Commercial Sensing.

[43]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[44]  Panos M. Pardalos,et al.  Jamming communication networks under complete uncertainty , 2008, Optim. Lett..

[45]  Stefan Savage,et al.  802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.

[46]  Leandros Tassiulas,et al.  FIJI: Fighting Implicit Jamming in 802.11 WLANs , 2009, SecureComm.

[47]  Deborah Estrin,et al.  GPS-less low-cost outdoor localization for very small devices , 2000, IEEE Wirel. Commun..

[48]  Sisi Liu,et al.  Mitigating control-channel jamming attacks in multi-channel ad hoc networks , 2009, WiSec '09.

[49]  Dina Katabi,et al.  iJam: Jamming Oneself for Secure Wireless Communication , 2010 .

[50]  Xiaodong Wang,et al.  Jammer Localization in Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[51]  Radha Poovendran,et al.  Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[52]  Srikanth V. Krishnamurthy,et al.  Lightweight Jammer Localization in Wireless Networks: System Design and Implementation , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[53]  Alon Efrat,et al.  Optimization Schemes for Protective Jamming , 2012, MobiHoc '12.

[54]  P. Consul,et al.  A Generalization of the Poisson Distribution , 1973 .

[55]  Steven D. Glaser,et al.  Feasibility analysis of controller design for adaptive channel hopping , 2009, VALUETOOLS.

[56]  Ivan Martinovic,et al.  Short paper: reactive jamming in wireless networks: how realistic is the threat? , 2011, WiSec '11.

[57]  Emel Kizilkaya Aydogan,et al.  A decision support system for locating VHF/UHF radio jammer systems on the terrain , 2008, Inf. Syst. Frontiers.

[58]  Wenyuan Xu,et al.  Exploiting Jamming-Caused Neighbor Changes for Jammer Localization , 2012, IEEE Transactions on Parallel and Distributed Systems.

[59]  Christian Scheideler,et al.  A jamming-resistant MAC protocol for single-hop wireless networks , 2008, PODC '08.

[60]  Robert Simon,et al.  A multi-channel defense against jamming attacks in wireless sensor networks , 2007, Q2SWinet '07.