Optimal jamming attack strategies and network defense policies in wireless sensor networks
Fecha
2010Materia
Resumen
We consider a scenario where a sophisticated jammer jams an area in which a single-channel random-access-based wireless sensor network operates. The jammer controls the probability of jamming and the transmission range in order to cause maximal damage to the network in terms of corrupted communication links. The jammer action ceases when it is detected by the network (namely by a monitoring node), and a notification message is transferred out of the jammed region. The jammer is detected by employing an optimal detection test based on the percentage of incurred collisions. On the other hand, the network defends itself by computing the channel access probability to minimize the jamming detection plus notification time. The necessary knowledge of the jammer in order to optimize its benefit consists of knowledge about the network channel access probability and the number of neighbors of the monitor node. Accordingly, the network needs to know the jamming probability of the jammer. We study the idealized case of perfect knowledge by both the jammer and the network about the strategy of each other and the case where the jammer and the network lack this knowledge. The latter is captured by formulating and solving optimization problems where the attacker and the network respond optimally to the worst-case or the average-case strategies of the other party. We also take into account potential energy constraints of the jammer and the network. We extend the problem to the case of multiple observers and adaptable jamming transmission range and propose a meaningful heuristic algorithm for an efficient jamming strategy. Our results provide valuable insights about the structure of the jamming problem and associated defense mechanisms and demonstrate the impact of knowledge as well as adoption of sophisticated strategies on achieving desirable performance. © 2010 IEEE.
Colecciones
Ítems relacionados
Mostrando ítems relacionados por Título, autor o materia.
-
CONTENT project: Considerations towards a cloud-based internetworking paradigm
Katsalis, K.; Korakis, T.; Landi, G.; Bernini, G.; Rofoee, B. R.; Peng, S.; Anastasopoulos, M.; Tzanakaki, A.; Christofi, D.; Georgiades, M.; Larsen, R.; Riera, J. F.; Escalona, E.; Garcia-Espin, J. A. (2013)Although cloud computing and the Software Defined Network (SDN) framework are fundamentally changing the way we think about network services, multi-domain and multitechnology problems are not sufficiently investigated. ... -
Backbone formation in military multi-layer ad hoc networks using complex network concepts
Papakostas D., Basaras P., Katsaros D., Tassiulas L. (2016)Modern battlefields are characterized by increasing deployment of ad hoc communications among allied entities. These networks can be seen as a complex multi-layer ad hoc network, where each layer may be an independently ... -
Query sensitive storage for wireless sensor networks
Papadimitriou, A.; Katsaros, D.; Manolopoulos, Y. (2009)Storage management in wireless sensor networks is an area that has started to attract significant attention, and several methods have been proposed, such as Local Storage (LS), Data-Centric Storage (DCS) and more recently ...