International Journal of P2P
Network Trends and Technology

Research Article | Open Access | Download PDF
Volume 3 | Issue 2 | Year 2013 | Article Id. IJPTT-V3I2P405 | DOI : https://doi.org/10.14445/22492615/IJPTT-V3I2P405

Method for Preventing Selective Jamming Attacks


Umesh Kumar Awasthi and K. John Singh

Citation :

Umesh Kumar Awasthi and K. John Singh, "Method for Preventing Selective Jamming Attacks," International Journal of P2P Network Trends and Technology (IJPTT), vol. 3, no. 2, pp. 16-19, 2013. Crossref, https://doi.org/10.14445/22492615/IJPTT-V3I2P405

Abstract

Wireless medium provides high speed wireless connectivity so, it is more vulnerable to interference attacks, called as jamming attack. This jamming interference in wireless transmissions of data can generate a DoS attacks on wireless networks. With the protocol specification knowledge and network secrets knowledge, one can reduce the efforts of jamming, so that jamming is difficult to detect and counter. Here, the addressed problem is jamming of signals in wireless transmission. Advantages of selective jamming can result in the performance degradation of system and adversary. These results are depicted by two case studies; the foremost is selective attack on routing followed by TCP attack. Security of these methods and computational overhead are also examined.

Keywords

Jamming, Routing attack, TCP attack, Adversary, DoS attack

References

[1] M. Cagalj, S. Capkun, and J.-P. Hubaux, “Wormhole-Based Anti- Jamming Techniques in Sensor Networks,” IEEE Trans. MobileComputing, vol. 6, no. 1, pp. 100-114, Jan. 2007.
[2] Tague, M. Li, and R. Poovendran, “Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution,” Proc. IEEE Int’l Symp. Personal, Indoor and Mobile Radio Comm. (PIMRC), 2007.
[3] C. Popper, M. Strasser, and S. Capkun, “Jamming-Resistant Broadcast Communication without Shared Keys,” Proc. USENIX Security Symp., 2009.
[4] M. Strasser, C. Popper, S. Capkun, and M. Cagalj, “JammingResistant Key Establishment Using Uncoordinated Frequency Hopping,” Proc. IEEE Symp. Security and Privacy, 2008.
[5] P. Tague, M. Li, and R. Poovendran, “Mitigation of Control Channel Jamming under Node Capture Attacks,” IEEE Trans. Mobile Computing, vol. 8, no. 9, pp. 1221-1234, Sept. 2009.
[6] Y.W. Law, M. Palaniswami, L.V. Hoesel, J. Doumen, P. Hartel, and P. Havinga, “Energy-Efficient Link-Layer Jamming Attacks against WSN MAC Protocols,” ACM Trans. Sensor Networks, vol. 5, no. 1, pp. 1-38, 2009.
[7] G. Noubir and G. Lin, “Low-Power DoS Attacks in Data Wireless Lans and Countermeasures,” Mobile Computing and Comm. Rev., vol. 7, no. 3, pp. 29-30, 2003.