On Optimal Antijamming Strategies in Sensor Networks

Physical layer radio jamming is a serious security threat to a wireless sensor network since the network relies on open wireless radio channels. A radio jammer is typically strategic and chooses its jamming strategy in response to the possible defense strategy taken by the sensor network. In this paper we model the interaction between the sensor network and the attacker as a noncooperative nonzero-sum static game. In such a game, the sensor network has a set of strategies of controlling its probability of wireless channel access and the attacker manipulates its jamming by controlling its jamming probability after sensing a transmission activity. We propose an algorithm for computing the optimal strategies for jamming attack and network defense. A critical issue is that there may exist a number of possible strategy profiles of Nash equilibria. To address this issue, we further propose to choose realistic Nash equilibria by applying the Pareto dominance and risk dominance. Our numerical results demonstrate that the strategies chosen by the Pareto dominance and risk dominance achieve the expected performance. Our results presented in the paper provide valuable defense guidance for wireless sensor networks against jamming attacks.

[1]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[2]  Ranjan K. Mallik,et al.  Analysis of an on-off jamming situation as a dynamic game , 2000, IEEE Trans. Commun..

[3]  Srdjan Capkun,et al.  Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .

[4]  Hari Balakrishnan,et al.  Fast portscan detection using sequential hypothesis testing , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[5]  Albert Levi,et al.  Quarantine region scheme to mitigate spam attacks in wireless-sensor networks , 2006, IEEE Transactions on Mobile Computing.

[6]  Venugopal V. Veeravalli,et al.  Multihypothesis sequential probability ratio tests - Part I: Asymptotic optimality , 1999, IEEE Trans. Inf. Theory.

[7]  Elaine Shi,et al.  Detection of denial-of-message attacks on sensor network broadcasts , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[8]  Yanmin Zhu,et al.  A Game-Theoretic Approach to Anti-jamming in Sensor Networks , 2010, 2010 IEEE 16th International Conference on Parallel and Distributed Systems.

[9]  Yee Wei Law,et al.  Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.

[10]  Wenyuan Xu,et al.  Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.

[11]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[12]  Donggang Liu,et al.  Improving key predistribution with deployment knowledge in static sensor networks , 2005, TOSN.

[13]  Guevara Noubir,et al.  On link layer denial of service in data wireless LANs , 2005, Wirel. Commun. Mob. Comput..

[14]  Radha Poovendran,et al.  Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[15]  Bülent Yener,et al.  Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks , 2004, ESORICS.