Survey on Jamming Wireless Networks: Attacks and Prevention Strategies

Wireless networks are built upon the open shared medium which makes easy for attackers to conduct malicious activities. Jamming is one of the most serious security threats to information economy and it must be dealt efficiently. Jammer prevents legitimate data to reach the receiver side and also it seriously degrades the network performance. The objective of this paper is to provide a general overview of jamming in wireless network. It covers relevant works, different jamming techniques, various types of jammers and typical prevention techniques. Challenges associated with comparing several anti-jamming techniques are also highlighted.




References:
[1] G. T. Amariucai, “Physical layer security in wireless networks:
Intelligent jamming and eavesdropping”, Ph. D thesis, Louisiana State
University, Louisiana, 2009.
[2] A. D. Wyner, “The wire-tap channel,” The Bell System Technical
Journal, vol. 54, pp. 1355–1387, Oct. 1975.
[3] W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The feasibility of
launching and detecting jamming attacks in wireless networks,”
MobiHoc 05, pp 46-57, May 2005.
[4] Konstantinos Pelechrinis, Marios Iliofotou and Srikanth V.
Krishnamurthy, “Denial of Service Attacks in Wireless Networks: The
Case of Jammers”, IEEE Communications Surveys & Tutorials, vol. 13,
no. 2, pp.245-257, April 2011.
[5] M. Acharya and D. Thuente, “Intelligent jamming attacks,
counterattacks and (counter)2 attacks in 802.11b wireless networks,” In
Proceedings of OPNETWORK Conference, Aug. 2005.
[6] L. Lazos, S. Liu, and M. Krunz, “Mitigating control-channel jamming
attacks in multi-channel ad hoc networks”, In Proceedings of the 2nd
ACM conference on wireless network security, pp.169–180, March
2009.
[7] G. Noubir and G. Lin, “Low-power DoS attacks in data wireless lans
and countermeasures” Mobile Computing and Communications Review,
vol.7, no.3, pp.29–30, July 2003.
[8] Y. Liu, P. Ning, H. Dai, and A. Liu, “Randomized differential DSSS:
Jamming-resistant wireless broadcast communication”, IEEE
Proceedings of INFOCOM, pp. 1-9, March 2010.
[9] W. Xu, T. Wood, W. Trappe, and Y. Zhang, ”Channel surfing and
spatial retreats: Defenses against wireless denial of service”, In
Proceedings of the 3rd ACM workshop on Wireless security, pp. 80–89,
2004
[10] W. Xu, W. Trappe, and Y. Zhang, “Anti-Jamming Timing Channels for
Wireless Networks,” Proc. First ACM Conf. Wireless Security, 2008.
[11] Z. Lin and M. V. Schaar, “MAC Layer Jamming Mitigation Using a
Game Augmented by Intervention”, EURASIP journal on Wireless
Communications and Networking, pp-1-14, no. 78, 2011.
[12] M. Li, I. Koutsopoulos, and R. Poovendran, “Optimal jamming attacks
and network defence policies in wireless sensor networks,” In
Proceedings of the 26th IEEE International Conference on Computer
Communications (INFOCOM ’07), pp. 1307–1315, May 2007.
[13] B. Awerbuch, A. Richa, and C. Scheideler, “A jamming resistant MAC
protocol for single-hop wireless networks,” 27th ACM Symposium on
Principles of Distributed Computing (PODC ’08), pp. 45–54, Aug.2008.
[14] U. Patel, T. Biswas, and R. Dutta, “A Routing Approach to Jamming
Mitigation in Wireless Multihop Networks”, IEEE Workshop on Local
& Metropolitan Area Networks (LANMAN), pp. 1-6, Oct. 2011.
[15] E. Altman, K. Avrachenkov, and A. Garnaev, “A jamming game in
wireless networks with transmission cost,” In Proceedings of the 1st
EuroFGI International Conference on Network Control and
Optimization, pp. 1–12, June 2007.
[16] G. Thamilarasu, S. Mishra and R. Sridhar,” Improving Reliability of
Jamming Attack Detection in Ad hoc Networks”, International Journal
of Communication Networks and Information Security (IJCNIS), vol. 3,
no. 1, pp. 57-66, April 2011.
[17] D. Chen, J. Deng, and P. K. Varshney, “Protecting wireless networks
against a denial of service attack based on virtual jamming,” In
MOBICOM -Proceedings of the Ninth Annual International Conference
on Mobile Computing and Networking, ACM, 2003.
[18] D. Thuente and M. Acharya, “Intelligent jamming in wireless networks
with applications to 802.11b and other networks,” in Proceedings of the
25th IEEE Communications Society Military Communications
Conference (MILCOM), pp.1075-1081, Oct. 2006.
[19] W. Xu, K. Ma, W. Trappe, and Y. Zhang, “Jamming sensor networks:
Attacks and defense strategies,” in IEEE Network, pp.41 - 47, May
2006.
[20] Y. Law, P. Hartel, J. D. Hartog, and P. Havinga, “Link-layer jamming
attacks on S-Mac,” in Proc. 2nd Euro. Wksp. Wireless Sensor Network,
pp. 217-225, Feb. 2005.
[21] A. Wood and J. Stankovic, “Denial of service in sensor networks,” IEEE
Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002.
[22] B. Onings, “PHY and MAC Layer Security in 802.11 Networks”, Ulm
University.
[23] J. T. Chiang, and Y. C. Hu, “Cross-Layer Jamming Detection and
Mitigation in Wireless Broadcast Networks”, IEEE/ ACM transactions
on networking, vol.19, no.1, pp. 286-298, Feb. 2011.
[24] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in mobile ad hoc
networks: Challenges and solutions,” IEEE Wireless Communications,
vol. 11, no. 1, pp. 38-47, Feb. 2004.
[25] D. Djenouri, L. Khelladi, and N. Badache, “A survey of security issues
in mobile ad hoc and sensor networks”, IEEE communications surveys
and Tutorials, vol. 7, no.4, pp. 2-8, Dec. 2005.
[26] Y. Zhang, and W. Lee, “Security in Mobile Ad-Hoc Networks”, in Book
Ad Hoc Networks Technologies and Protocols (Chapter 9), Springer,
2005.
[27] A. Proano, and L. Lazos, “Packet-hiding methods for preventing
selective jamming attacks”, IEEE Transaction Dependable Secure
Computing, vol. 9, No.1, pp. 101–114, Jan 2012.
[28] W. Xu, T. Wood, W. Trappe, and Y. Zhang, “Channel surfing and
spatial retreats: defenses against wireless denial of service”, In Proceedings of the 3rd ACM workshop on Wireless security, pp. 80–89,
2004.
[29] S. Liu, L. Lazos, and M. Krunz, “Thwarting Inside Jamming Attacks on
Wireless Broadcast Communications”, Proceedings of the fourth ACM
conference on Wireless network security WiSec’11, pp. 29-40, June
2011.
[30] L. Wang, and A. M. Wyglinski, “A Combined Approach for
Distinguishing different Types of Jamming Attacks Against Wireless
Networks”, IEEE Pacific Rim Conference on Communications,
Computers and Signal Processing (PacRim), pp. 809–814, Aug. 2011.
[31] A. Richa, C. Scheideler, S. Schmid, and J. Zhang J, “An Efficient and
fair MAC protocol robust to reactive interference”, IEEE/ACM
Transaction on. Networking, vol. 21, no. 3, pp.760–771, June 2013.
[32] M. Strasser, B. Danev, and S. Capkun, “Detection of reactive jamming
in sensor networks”, ACM Transaction on Sensor Networks, vol. 7, no.
2, pp.1–29, Aug. 2010.
[33] Y. Xuan, Y. Shen, N. P. Nguyen, and M. T. Thai, “A trigger
identification service for defending reactive jammers in WSN”, IEEE
Transaction on Mobile Computing, vol.11, no.5, pp.793–806, March
2012.
[34] M. Wilhelm, I. Martinovic, J. Schmitt, and V. Lenders, “Reactive
jamming in wireless networks: How realistic is the threat?”, In
Proceedings of ACM conference on Wireless Network Security, pp. 47-
52, June 2011.
[35] S R Ratna, R Ravi, and B Shekhar, “An Intelligent Approach based on
Neuro- Fuzzy Detachment Scheme for Preventing jamming Attack in
Wireless Networks”, Journal of Intelligent and fuzzy logic, Doi
10.3233/IFS-141363, in press, Sep. 2014.
[36] D. Tagra, M. Rahman, and S. Sampalli, “Technique for Preventing DOS
Attacks on RFID Systems”, IEEE International Conference on Software,
Telecommunications and Computer Networks (SoftCOM), pp. 6–10, Sep.
2010.
[37] N. S. Kapo, J. Chen, and L. Wosinska, “A New Approach to Optical
Networks Security: Attack-Aware Routing and Wavelength
Assignment”, IEEE/ACM Transactions on Networking, vol. 18, no. 3,
pp. 750-760, June 2010.
[38] M. Furdek, N. S. Kapov, and M. Grbac, “Attack-Aware Wavelength
Assignment for Localization of In-band Cross talk Attack Propagation”,
Journal of Optical Communication Networking, vol. 2, no. 11, pp. 1000-
1009, Nov. 2010.
[39] F. Ahsan, S. Djahel, F. N. Abdesselam, and S. Mohsin, “Neighbor based
Channel Hopping Coordination: Practical against Jammer?”, The 9th
IEEE International Workshop on Wireless Local Networks, pp. 993-998,
Oct. 2009.
[40] S. Chen, K. Zeng, and P. Mohapatra, “Jamming-Resistant
Communication: Channel Surfing without Negotiation” IEEE
International Conference on Communications, pp. 1-6, May 2010.
[41] B. Wang, Y. Wu, K. J. R. Liu, and T. C. Clancy, “An Anti-Jamming
Stochastic Game for Cognitive Radio Networks”, IEEE Journal on
Selected Areas in Communications, vol. 29, no. 4, pp. 877–889, March
2011.
[42] S. Misra, R. Singh and S.V.R. Mohan, “Geomorphic zonalisation of
wireless sensor networks based on prevalent jamming effects”, IET
Communication, vol. 5, no. 12, pp. 1732–1743, Aug. 2011.
[43] Y. Desmedt, R. S. Naini, H. Wang, C. Charnes, and J. Pieprzyk,
“Broadcast anti-jamming systems”, In Proc. of the IEEE International
Conference on Networks (ICON), pp. 349–355, Oct. 1999.
[44] Y. Wu, B. Wang, K. J. R. Liu, and T. C. Clancy, “Anti-Jamming Games
in Multi-Channel Cognitive Radio Networks”, IEEE Journal on Selected
Areas in Communications, vol. 30, no. 1, pp. 4-15, Jan. 2012.
[45] R. A. Poisel, “Modern Communications Jamming Principles and
Techniques”, Artech House Publishers, Second Edition, 2011.
[46] S. Wei, R. Kannan, V. Chakravarthy, and M. Rangaswamy, “CSI Usage
over Parallel Fading Channels under Jamming Attacks: A Game Theory
Study”, IEEE Transactions on Communications, vol. 60, no. 4, pp.
1167-1175, April 2012.
[47] L. Xiao, H. Dai, and P. Ning, “MAC Design of Uncoordinated FHBased
Collaborative Broadcast”, IEEE Wireless Communications
Letters, vol. 1, no. 3, pp. 261-264, June 2012.
[48] J.H. Sarker H.T. Mouftah, “Mitigating the effect of jamming signals in
wireless ad hoc and sensor networks”, IET Communications, vol. 6, no.
3, pp. 311–317, 2012.
[49] C. Popper, M. Strasser, and S. Capkun, “Jamming-resistant broadcast
communication without shared keys”, In Proc. of the USENIX Security
Symposium, 2009.
[50] S. Liu, L. Lazos, and M. Krunz, “Thwarting Control-Channel Jamming
Attacks from Inside Jammers“, IEEE Transactions on Mobile
Computing, vol. 11, no. 9, pp. 1545-1558, Sep. 2012.
[51] C. Chen, M Song, C. Xin, and J. Backens, “A Game-Theoretical Anti-
Jamming Scheme for Cognitive Radio Networks”, IEEE Network,
vol.27, no. 3, pp.22-27, May 2013.
[52] S. Misra, S. K. Dhurandher, A. Rayankula, and D. Agrawal "Using
honey nodes for defense against jamming attacks in wireless
infrastructure-based networks," Computers & Electrical Engineering,
vol. 36, pp. 367-382, 2010.
[53] A. Mpitziopoulos, G. Damianos, C. Konstantopoulos, and G. Pantziou,
"A survey on jamming attacks and countermeasures in WSNs", IEEE
Surveys & Tutorials on communications, vol. 11, No. 4, pp. 42-56, 2009.
[54] A. L. Toledo, and X. Wang, “Robust Detection of MAC Layer Denialof-
Service Attacks in CSMA/CA Wireless Networks”, IEEE
Transactions on Information Forensics and Security, vol. 3, no. 3, pp.
347-358, 2008.
[55] S. R. Ratna, and R. Ravi, “Malicious Route Defending Reliable-Data
Transmission Scheme for Multi Path Routing in Wireless Network”,
World Academy of Science, Engineering and Technology, vol:8, no:12,
pp. 1950-1955, Dec. 2014.
[56] K. Panyim, and P. Krishnamurthy, “A Hybrid Key redistribution
Scheme for Sensor Networks Employing Spatial Retreats to Cope with
Jamming Attacks”, Mobile Network Application, vol.10, pp. 715-731,
2009.
[57] P. Tague, S. Nabar, J. Ritcey, and R. Poovendran, “Jamming-Aware
Traffic Allocation for Multiple-Path Routing Using Portfolio Selection,”
IEEE Trans. Networking, vol. 19, no. 1, pp. 184-194, 2011.
[58] Y. Zhang, L. Lazos, and W. Kozma, "AMD: Audit-based Misbehavior
Detection in Wireless Ad Hoc Networks", IEEE Transactions on Mobile
Computing, no. 1, PrePrints PrePrints, doi:10.1109/TMC.2012.257.
[59] H. Mustafa, X. Zhang, Z. Liu, W. Xu, and A. Perrig, “Jamming-
Resilient Multipath Routing”, IEEE Transactions on Dependable and
Secure Computing, vol. 9, no. 6, pp. 852- 864, Nov. 2012.
[60] K. Pelechrinis, I. Broustis, S. V. Krishnamurthy, and C. Gkantsidis, “A
Measurement-Driven Anti-Jamming System for 802.11 Networks”,
IEEE/ACM Transaction on Networking, vol. 19, no. 4, pp. 1208-1222,
Aug. 2011.
[61] P. Tague, M. Li, and R. Poovendran, “Probabilistic mitigation of control
channel jamming via random key distribution”, in Proceedings of IEEE
PIMRC, pp.1–5, 2007.
[62] N. S. Kapov, J. Chen, and L. Wosinska, “A New approach to Optical
Networks Security: Attack-Aware Routing and Wavelength
Assignment”, IEEE/ACM Transactions on Networking, vol. 18, no. 3,
pp.750-760, June 2010.
[63] D. M. Shila, Y. Cheng, and T. Anjali, “Mitigating Selective Forwarding
Attacks with a Channel-Aware Approach in WMNs”, IEEE
Transactions on Wireless Communications, vol. 9, no. 5, pp. 1661-1675,
May 2010.
[64] K. Pelechrinis, C. Koufogiannakis, and S. V. Krishnamurthy, “On the
Efficacy of Frequency Hopping in Coping with Jamming Attacks in
802.11 Networks”, IEEE Transactions on Wireless Communications,
vol. 9, no. 10, pp.3258-3271, Oct. 2010.
[65] M. Li, I. Koutsopoulos, and R. Poovendran, “Optimal Jamming Attack
Strategies and Network Defense Policies in Wireless Sensor Networks”,
IEEE Transactions on Mobile Computing, vol. 9, no. 8, pp. 1119-1138,
Aug. 2010.
[66] P. Tague, M. Li, and R. Poovendran, “Mitigation of Control Channel
Jamming under Node Capture Attacks”, IEEE Transactions on Mobile
Computing, vol. 8, no. 9, pp.1221-1234, Sep. 2009.
[67] B. Xiao, B. Yu, C. Gao, “CHEMAS: Identify suspect nodes in selective
forwarding attacks”, Journal of parallel and distributed computing-
Elsevier, vol. 67, pp.1218–1230, 2007.
[68] M. Cagalj, S. Capkun, and J. P. Hubaux, “Wormhole-Based Anti
jamming Techniques in Sensor Networks”, IEEE Transactions on
Mobile Computing, vol. 6, no. 1, pp.100-114, Jan. 2007.
[69] M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. Levitt, “Spread
Spectrum Communications Handbook”, McGraw-Hill, 2001.
[70] J. Jeung, S. Jeong, and J. Lim, “Anti Jamming – Based Medium Access
Control Using Adaptive Rapid Channel Hopping in 802.11: AJ-MAC”
Springer, ICCSA, pp. 70–82, 2011.
[71] Y. B. Reddy, and S. Srivathsan, “Game Theory Model for Selective
Forward Attacks in Wireless Sensor Networks”, IEEE Conference on
Control & Automation, pp.458-463, 2009. [72] Z. L. Wenye, and W. C. Wang, “Hiding Traffic with Camouflage:
Minimizing Message Delay in the Smart Grid under Jamming”, IEEE
international conference on computer communications, pp. 3066-3070,
2012.
[73] C. Popper, M. Strasser, and S. Capkun, “Anti-Jamming Broadcast
Communication using Uncoordinated Spread Spectrum Techniques“,
IEEE Journal on Selected Areas in Communications, vol. 28, no. 5,
pp.703-715, June 2010.
[74] W. Saad, X. Zhou, B. Maham, T. Basar, and H. V. Poor, ”Tree
Formation with Physical Layer Security Considerations in Wireless
Multi-Hop Networks, IEEE Transactions on Wireless Communications,
vol. 11, no. 11, pp.3980-3991, Nov. 2012
[75] Q. Wang, P. Xu, K. Ren, and X. Y. Li, “Towards Optimal Adaptive
UFH-Based Anti-Jamming Wireless Communication”, IEEE Journal on
Selected Areas in Communications, vol. 30, no. 1, pp.16-30, Jan. 2012.
[76] A. Proano, and L. Lazos, “Hiding Contextual Information in WSNs”,
IEEE International Symposium on a World of Wireless, Mobile and
Multimedia Networks, pp. 1-6, 2012
[77] B. Sklar, Digital Communications, Fundamentals, and Applications.
Prentice-Hall, 2001.
[78] A. Proano, and L. Lazos, “Perfect Contextual Information Privacy in
WSNs under Colluding Eavesdroppers”, WiSec’13 Proceedings of the
sixth ACM conference on Security and privacy in wireless and mobile
networks, pp.89-94, 2013.
[79] J. T. Chiang, and Y.C. Hu, “Dynamic jamming mitigation for wireless
broadcast networks”, In proceedings. Of INFOCOM, pp. 1211–1219,
2008.