Measures and Countermeasures for Null Frequency Jamming of On-Demand Routing Protocols in Wireless Ad Hoc Networks

被引:6
|
作者
Balakrishnan, M. [1 ]
Huang, H. [1 ]
Asorey-Cacheda, R. [2 ]
Misra, S. [3 ]
Pawar, S. [1 ]
Jaradat, Y. [1 ]
机构
[1] New Mexico State Univ, Dept Elect & Comp Engn, Klipsch Sch Elect & Comp Engn, Las Cruces, NM 88003 USA
[2] Univ Vigo, Escuela Naval Mil, Ctr Univ Def, Marin 36920, Spain
[3] New Mexico State Univ, Dept Comp Sci, Las Cruces, NM 88003 USA
基金
美国国家科学基金会;
关键词
Wireless ad hoc networks; routing protocols; radio jamming; denial of service (DoS); SERVICE ATTACKS;
D O I
10.1109/TWC.2012.092112.110678
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Distributed network protocols operate similar to periodic state machines, utilizing internal states and timers for network coordination, which creates opportunities for carefully engineered radio jamming to target the protocol operating periods and disrupt network communications. Such periodic attacks targeting specific protocol period/frequency of operation is referred to as Null Frequency Jamming (NFJ). Our hypothesis is that NFJ is a pervasive phenomenon in dynamic systems, including wireless ad-hoc networks. This paper aims to test the hypothesis by investigating NFJ targeted at the on-demand routing protocols for ad-hoc networks. Our mathematical analysis and simulation results show substantial degradation in end-to-end network throughput at certain null periods/frequencies, where the jamming periodicity self-synchronizes with the route-recovery cycle. We also study an effective countermeasure, randomized route-recovery periods, for eliminating the presence of predictable null frequencies and mitigating the impact of NFJ. Our analytical model and simulation results validate the effectiveness of randomized route recovery with appropriately chosen randomization ranges.
引用
收藏
页码:3860 / 3868
页数:9
相关论文
共 50 条
  • [31] A comparison of on-demand and table driven routing for ad-hoc wireless networks
    Raju, J
    Garcia-Luna-Aceves, JJ
    ICC 2000: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CONFERENCE RECORD, VOLS 1-3: GLOBAL CONVERGENCE THROUGH COMMUNICATIONS, 2000, : 1702 - 1706
  • [32] A High Throughput On-Demand Routing Protocol for Multirate Ad Hoc Wireless Networks
    Rahman, Md. Mustafizur
    Hong, Choong Seon
    Lee, Sungwon
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2010, E93B (01) : 29 - 39
  • [33] Reliable on-demand multicast routing with congestion control in wireless ad hoc networks
    Tang, K
    Gerla, M
    SCALABILITY AND TRAFFIC CONTROL IN IP NETWORKS, 2001, 4526 : 109 - 120
  • [34] A conditioned broadcasting approach for on-demand ad hoc routing protocols
    Xu, Jiuliang
    Wang, Hongyu
    2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 2250 - 2254
  • [35] A Comprehensive Performance Comparison of On-Demand Routing Protocols in Mobile Ad-Hoc Networks
    Khan, Jahangir
    Hayder, Syed Irfan
    COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 354 - 369
  • [36] Selective route-request scheme for on-demand routing protocols in ad hoc networks
    Lee, SJ
    Youn, JS
    Jung, SH
    Lee, J
    Kang, CH
    AD-HOC, MOBILE, AND WIRELESS NETWORKS, PROCEEDINGS, 2005, 3738 : 153 - 163
  • [37] Performance Analysis of DSR, AODV On-Demand Routing Protocols in Mobile Ad Hoc Networks
    Mohammed, Muamer N.
    Sulaiman, Norrozila
    ADVANCED SCIENCE LETTERS, 2014, 20 (02) : 359 - 363
  • [38] Associativity based clustering and query stride for on-demand routing protocols in ad hoc networks
    Choi, Y
    Park, D
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2002, 4 (01) : 4 - 13
  • [39] Efficient and highly scalable route discovey for on-demand routing protocols in ad hoc networks
    Abolhasan, M
    Lipman, J
    LCN 2005: 30th Conference on Local Computer Networks, Proceedings, 2005, : 358 - 365
  • [40] A performance comparison of on-demand routing protocols for application data in mobile ad hoc networks
    Lee, KS
    Lee, SJ
    Chung, YK
    Third ACIS International Conference on Software Engineering Research, Managment and Applications, Proceedings, 2005, : 331 - 337