TY - GEN
T1 - A new approach to detect radio jamming attacks in wireless networks
AU - Yu, Ming
AU - Su, Wei
AU - Kosinski, John
AU - Zhou, Mengchu
PY - 2010
Y1 - 2010
N2 - For various wireless networks in adversarial environment, jamming attacks against radio channels can severely interfere with the normal network operations or even completely disrupt the network services. In this paper, we propose a new detection and defense method against hostile jamming by using dynamic radio channel allocation (RCA) technique at real-time and without relying on a large amount of data as in the existing methods. Each node independently estimates the normal value of the network throughput. By comparing the operational throughput to the normal value, an abnormal usage of the channel can be found. In this way, the jamming attacks can be detected by monitoring and analyzing the throughput. After detecting the jamming, the defense of the attack is a self-healing approach: switch the jammed channel to one of the available channels by the RCA techniques automatically. The effectiveness of the proposed method has been demonstrated by extensive simulation results.
AB - For various wireless networks in adversarial environment, jamming attacks against radio channels can severely interfere with the normal network operations or even completely disrupt the network services. In this paper, we propose a new detection and defense method against hostile jamming by using dynamic radio channel allocation (RCA) technique at real-time and without relying on a large amount of data as in the existing methods. Each node independently estimates the normal value of the network throughput. By comparing the operational throughput to the normal value, an abnormal usage of the channel can be found. In this way, the jamming attacks can be detected by monitoring and analyzing the throughput. After detecting the jamming, the defense of the attack is a self-healing approach: switch the jammed channel to one of the available channels by the RCA techniques automatically. The effectiveness of the proposed method has been demonstrated by extensive simulation results.
UR - http://www.scopus.com/inward/record.url?scp=77953087723&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77953087723&partnerID=8YFLogxK
U2 - 10.1109/ICNSC.2010.5461570
DO - 10.1109/ICNSC.2010.5461570
M3 - Conference contribution
AN - SCOPUS:77953087723
SN - 9781424464531
T3 - 2010 International Conference on Networking, Sensing and Control, ICNSC 2010
SP - 721
EP - 726
BT - 2010 International Conference on Networking, Sensing and Control, ICNSC 2010
T2 - 2010 International Conference on Networking, Sensing and Control, ICNSC 2010
Y2 - 10 April 2010 through 12 April 2010
ER -