A new approach to detect radio jamming attacks in wireless networks

Ming Yu, Wei Su, John Kosinski, Mengchu Zhou

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

For various wireless networks in adversarial environment, jamming attacks against radio channels can severely interfere with the normal network operations or even completely disrupt the network services. In this paper, we propose a new detection and defense method against hostile jamming by using dynamic radio channel allocation (RCA) technique at real-time and without relying on a large amount of data as in the existing methods. Each node independently estimates the normal value of the network throughput. By comparing the operational throughput to the normal value, an abnormal usage of the channel can be found. In this way, the jamming attacks can be detected by monitoring and analyzing the throughput. After detecting the jamming, the defense of the attack is a self-healing approach: switch the jammed channel to one of the available channels by the RCA techniques automatically. The effectiveness of the proposed method has been demonstrated by extensive simulation results.

Original languageEnglish (US)
Title of host publication2010 International Conference on Networking, Sensing and Control, ICNSC 2010
Pages721-726
Number of pages6
DOIs
StatePublished - Jun 9 2010
Event2010 International Conference on Networking, Sensing and Control, ICNSC 2010 - Chicago, IL, United States
Duration: Apr 10 2010Apr 12 2010

Publication series

Name2010 International Conference on Networking, Sensing and Control, ICNSC 2010

Other

Other2010 International Conference on Networking, Sensing and Control, ICNSC 2010
CountryUnited States
CityChicago, IL
Period4/10/104/12/10

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Control and Systems Engineering
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'A new approach to detect radio jamming attacks in wireless networks'. Together they form a unique fingerprint.

Cite this