Open Access   Article Go Back

Defeating Jamming Attack in Wireless Network Techniques

T. Aruna1 , R. Anandha Jothi2 , V. Palanisamy3

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-5 , Page no. 1384-1388, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i5.13841388

Online published on May 31, 2019

Copyright © T. Aruna, R. Anandha Jothi, V. Palanisamy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: T. Aruna, R. Anandha Jothi, V. Palanisamy, “Defeating Jamming Attack in Wireless Network Techniques,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1384-1388, 2019.

MLA Style Citation: T. Aruna, R. Anandha Jothi, V. Palanisamy "Defeating Jamming Attack in Wireless Network Techniques." International Journal of Computer Sciences and Engineering 7.5 (2019): 1384-1388.

APA Style Citation: T. Aruna, R. Anandha Jothi, V. Palanisamy, (2019). Defeating Jamming Attack in Wireless Network Techniques. International Journal of Computer Sciences and Engineering, 7(5), 1384-1388.

BibTex Style Citation:
@article{Aruna_2019,
author = {T. Aruna, R. Anandha Jothi, V. Palanisamy},
title = {Defeating Jamming Attack in Wireless Network Techniques},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {7},
Issue = {5},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {1384-1388},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4417},
doi = {https://doi.org/10.26438/ijcse/v7i5.13841388}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i5.13841388}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4417
TI - Defeating Jamming Attack in Wireless Network Techniques
T2 - International Journal of Computer Sciences and Engineering
AU - T. Aruna, R. Anandha Jothi, V. Palanisamy
PY - 2019
DA - 2019/05/31
PB - IJCSE, Indore, INDIA
SP - 1384-1388
IS - 5
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
292 209 downloads 112 downloads
  
  
           

Abstract

The open nature of the wireless form leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional intrusion with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat representation. However, adversaries with internal knowledge of protocol description and network secrets can launch low-effort jamming attacks that are difficult to recognize and counter. In this work, we address the issue of selective jamming attacks in wireless networks. In these attacks, the opponent is active only for a short period of time, selectively targeting messages of high importance. We embellish the advantages of selective jamming in terms of network staging mortification, and opponent effort by presenting two case studies; a selective pounce, on TCP and one on routing. We show that selective jamming attacks can be launched by execute real-time packet classification at the physical layer. To mitigate this pounce, we develop three schemes that intercept real-time packet classification by combining cryptography primitives with physical-layer attributes. We inspect the security of our procedure and evaluate their computational and communication overhead.

Key-Words / Index Term

Jamming, Attack, Network, Defective

References

[1] R. Ananadha Jothi V. Palanisamy, “Trust Based Association Estimation Technique on AODV Protocol Against Packet Droppers in MANET”, International Journal of Applied Engineering Research,10 (55) (2015) 2408-2413.
[2] R. Ananadha Jothi and V. Palanisamy Various Attacks and Its Countermeasures in Mobile Ad Hoc Networks: A Survey International Journal of Engineering Research & Technology,3 (3) (2014) 50-57.
[3] J. Nithyapriya, R. Ananadha Jothi, V. Palanisamy, “Securing data with selective encryption based DAC scheme for MANET” , Computer Networks, Big Data and IoT. (Springer) Dec- 2018 (Accepted)
[4] J.NithyaPriya ,R.Anandha Jothi, V.Palanisamy, “Security scheme for MANET based on echoing and path changing”International Journal of Innovative science and research technology. 3 (10) (2018) 601-603.
[5] M. Jeevamaheswari, R. Anandha Jothi, V. Palanisamy ,” AODV Routing Protocol to Defence Against Packet Dropping Gray Hole Attack In MANET”, International Journal of Scientific Research in Science and Technology, 2018 IJSRST | Volume 4 | Issue 2 | Print ISSN: 2395-6011 | Online ISSN: 2395-602X.
[6] V. Anantharam and S. Verdu, “Bits through queues,” IEEE Trans. Inf. Theory, vol. 42, no. 1, pp. 4–18, Jan. 1996.
[7] G. Morabito, “Exploiting the timing channel to increase energy efficiency in wireless networks,” IEEE J. Sel. Areas Commun., vol. 29, no. 8,pp. 1711–1720, Sep. 2011.
[8] L. Galluccio, G. Morabito, and S. Palazzo, “TC-Aloha: A novel access scheme for wireless networks with transmit-only nodes,” IEEE Trans.Wireless Commun., vol. 12, no. 8, pp. 3696–3709, Aug. 2013.
[9] W. Xu, W. Trappe, and Y. Zhang, “Anti-jamming timing channels for wireless networks,” inProc. 1st ACM Conf. Wireless Netw. Security, 2008,pp. 203–213.
[10] S. D’Oro, L. Galluccio, G. Morabito, and S. Palazzo, “Efficiency analysis of jamming-based countermeasures against malicious timing channel in tactical communications,” inProc. IEEE ICC, 2013, pp. 4020–4024.
[11] W. Xu, K. Ma, W. Trappe, and Y. Zhang, “Jamming sensor networks: Attack and defense strategies,”IEEE Netw., vol. 20, no. 3, pp. 41–47, May/Jun. 2006.
[12] R. Saranyadevi, M. Shobana, and D. Prabakar, “A survey on preventing jamming attacks in wireless communication,” Int. J. Comput. Appl., vol. 57, no. 23, pp. 1–3, Nov. 2012.
[13] R. Poisel, Modern Communications Jamming Principles and Techniques. Norwood, MA, USA: Artech House, 2004, ser. Artech House information warfare library. [Online]. Available: http://books.google.it/books? Id=CZDXton6vaQC.
[14] R.-T. Chinta, T. F. Wong, and J. M. Shea, “Energy-efficient jamming attacks in IEEE 802.11 MAC,” inProc. IEEE MILCOM, 2009, pp. 1–7.
[15] Y. W. Law, L. Van Hoesel, J. Doumen, P. Hartel, and P. Havinga, “Energyefficient link-layer jamming attacks against wireless sensor network MAC protocols,” inProc. 3rd ACM Workshop Security Ad Hoc Sensor Netw. 2005, pp. 76–88.
[16] S. M. Bamakan, H.Wang, T.Yingjie, Y. shi, An effective instrusion detection framework based on MCLP/SVM optimized by timevarying chaos particle swarm optimization, Neurocomputing, Volume 199, 2016, page 90- 102.
[17] I. Yaqoob, E. Ahmed, M. H. Rehman, A. I. A. Ahmed, M. A. AlGaradi, M. Imran, M. Guizani, The rise of ransomware and emerging security challenges and solutions in the Internet of Things, Computer Networks, Vol. 129, Part 2, pp. 444-458, Dec, 2017.
[18] H. Wang, J. Gu, S. Wang, An effective intrusion detection framework based on SVM with feature augmentation, Knowledge-Based Systems, Volume 136, 2017, Pages 130-139, ISSN 0950-7051, https://doi.org/10.1016/j.knosys.2017.09.014.
[19] D. Gong, Y. Yang, and Z. Pan, “Energy-efficient clustering in lossy wireless sensor networks,”J. Parallel Distrib. Comput. vol. 73, no. 9, pp. 1323–1336, Sep. 2013.
[20] M. Ma, Y. Yang, and M. Zhao, “Tour planning for mobile data gathering mechanisms in wireless sensor networks, ”IEEE Trans. Veh. Technol., vol. 62, no. 4, pp. 1472–1483, May 2013.
[21] M. Zhao and Y. Yang, “Bounded relay hop mobile data gathering in wireless sensor networks,” IEEE Trans. Comput., vol. 61, no. 2, pp. 265–271, Feb. 2012.
[22] K. Xu, H. Hassanein, G. Takahara, and Q. Wang, “Relay node deployment strategies in heterogeneous wireless sensor networks,”IEEE Trans. Mobile Comput., vol. 9, no. 2, pp. 145–159, Feb. 2010.
[23] E. Lee, S. Park, F. Yu, and S.-H. Kim, “Data gathering mechanism with local sink in geographic routing for wireless sensor networks,”IEEE Trans. Consum. Electron. vol. 56, no. 3, pp. 1433–1441, Aug. 2010.
[24] B. Yang, J. Liu, S. Shenker, J. Li, and K. Zheng, “Keep forwarding: Towards K-link failure resilient routing,” inProc. IEEE INFOCOM, Apr./May 2014, pp. 1617–1625.
[25] T. Elhourani, A. Gopalan, and S. Ramasubramanian, “IP fast reroutingfor multi-link failures,” in Proc. IEEE INFOCOM, Apr./May 2014, pp. 2148–2156.
[26] T. Elhourani, A. Gopalan, and S. Ramasubramanian, “IP fast rerouting for multi-link failures,” IEEE/ACM Trans. Netw., vol. 24, no. 5, pp. 3014–3025, Oct. 2016.
[27] M. Chiesa et al., “On the resiliency of static forwarding tables,”IEEE/ACM Trans. Netw., vol. 25, no. 2, pp. 1133–1146, Apr. 2016.
[28] S. Kini, S. Ramasubramanian, A. Kvalbein, and A. F. Hansen, “Fast recovery from dual-link or single-node failures in IP networks using tunneling,” IEEE/ACM Trans. Netw., vol. 18, no. 6, pp. 1988–1999, Dec. 2010.
[29] W. Xu, K. Ma, W. Trappe, and Y. Zhang, “Jamming sensor networks: Attack and defense strategies,”IEEE Netw., vol. 20, no. 3, pp. 41–47, May/Jun. 2006.
[30] R.-T. Chinta, T. F. Wong, and J. M. Shea, “Energy-efficient jamming attacks in IEEE 802.11 MAC,” inProc. IEEE MILCOM, 2009, pp. 1–7.
[31] D.G.Harkut, M.S.Ali and P.B.Lohiya, “Scheduling Task of Wireless Sensor Network Using Earliest Deadline First Algorithm” in ISROSET-Journal(IJSRCSE), vol.2, Issue.2, pp.1-6, Mar-2014.
[32] Umesh Kumar Singh, Jalaj Patidar and Kailash Chandra Phuleriya, “On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks” Isroset-Journal(IJSRCSE), vol.3, Issue.1, PP.11-15, Jan-2015.
[33] U.Korupolu, S.Kartik, and GK.Chakravarthi, “An Efficient Approach for Secure Data Aggregation Method in Wireless Sensor Networks With the Impact of Collusion Attacks” Isroset-Journal(IJSRCSE), vol.3, Issue.3, PP.26-29, Jan-2016.
[34] Lubdha M. Bendale, Roshani.L. Jain, Gayatri D.Patil, “Study of Various Routing Protocols in Mobile Ad-Hoc Networks”(IJSRNSC) Vol.06, Special Issue.01, PP.1-5, Jan-2018.
[35] Poonam Ahuja, “Bluetooth and Ad Hoc Networking” (IJSRNSC)
Vol.1, Issue.2, PP.31-34, May-2013.