On Limited-Range Strategic/Random Jamming Attacks in Wireless Ad hoc Networks

被引:16
|
作者
Panyim, Korporn [1 ]
Hayajneh, Thaier [1 ]
Krishnamurthy, Prashant [1 ]
Tipper, David [1 ]
机构
[1] Univ Pittsburgh, Pittsburgh, PA 15213 USA
关键词
D O I
10.1109/LCN.2009.5355041
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Jamming attacks are considered one of the most devastating attacks as they are difficult to prevent and sometimes hard to detect. In this paper we consider the impact of the placement and range of limited-range jammers on ad hoc networks. Limited range jammers are more difficult to detect as they use transmission powers similar to that of regular nodes (or perhaps even smaller transmit powers). The attacker can locate his jammer(s) randomly in the network. Alternatively, jammers can be placed at strategic locations. For instance, intuitively, this can be nodes with the highest traffic inputs/outputs (discovered by sensing the traffic flow in the network). Using OPNET, we perform extensive simulations to show how significant such strategically placed attacks can be compared to random placement of limited-range jammers on both TCP and UDP traffic.
引用
收藏
页码:922 / 929
页数:8
相关论文
共 50 条
  • [1] Detection of Jamming Attacks in Wireless Ad Hoc Networks using Error Distribution
    Hamieh, Ali
    Ben-Othman, Jalel
    [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 4831 - 4836
  • [2] A cross-layer approach to detect jamming attacks in wireless ad hoc networks
    Thamilarasu, Geethapriya
    Mishra, Sumita
    Sridhar, Ramalingam
    [J]. MILCOM 2006, VOLS 1-7, 2006, : 2586 - +
  • [3] POWJAM: A power reaction system against jamming attacks in wireless ad hoc networks
    Hamieh, Ali
    [J]. 2012 9th Annual Conference on Wireless On-Demand Network Systems and Services, WONS 2012, 2012, : 9 - 15
  • [4] Jamming and sensing of encrypted wireless ad hoc networks
    Brown, Timothy X.
    James, Jesse E.
    Sethi, Amita
    [J]. Proc. Int. Symp. Mobile Ad Hoc Networking Comput., (120-130):
  • [5] Solution of detecting jamming attacks in vehicle ad hoc networks
    Nguyen, Anh Tuan
    Mokdad, Lynda
    Ben-Othman, Jalel
    [J]. MSWiM 2013 - Proceedings of the 16th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 2013, : 405 - 410
  • [6] Stealth attacks on ad-hoc wireless networks
    Jakobsson, M
    Wetzel, S
    Yener, B
    [J]. 2003 IEEE 58TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS1-5, PROCEEDINGS, 2003, : 2103 - 2111
  • [7] Effect of Jamming Signals on Wireless Ad Hoc and Sensor Networks
    Sarker, Jahangir H.
    Mouftah, Hussein T.
    [J]. GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 5629 - 5634
  • [8] DJAVA']JAVAN: Detecting jamming attacks in Vehicle Ad hoc Networks
    Mokdad, Lynda
    Ben-Othman, Jalel
    Anh Tuan Nguyen
    [J]. PERFORMANCE EVALUATION, 2015, 87 : 47 - 59
  • [9] Random power control in wireless ad hoc networks
    Kim, TS
    Kim, SL
    [J]. IEEE COMMUNICATIONS LETTERS, 2005, 9 (12) : 1046 - 1048
  • [10] Random power control in the wireless ad hoc networks
    Wen, Kai
    Guo, Wei
    Huang, Guang-Jie
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2008, 36 (07): : 1304 - 1308