SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 955
A Survey Paper on Jamming Attacks and its Countermeasures in
Wireless Networks
Chaithra H S1, Rashmi B2, Johnpaul C I3
1B.E. in Information Science and Engineering, NIE, Mysuru, Karnataka, India
2B.E. in Information Science and ENGINNERING, NIE, Mysuru, Karnataka, India
3Assistant Professor, Department of Science and Engineering, NIE, Mysuru, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In a wireless networks communication between
events uses logical communication channels i.e. the timing
channel in which the information is encodedintiming. Theuse
of timing channel has been proposed to defeat reactive
jamming attacks; timing information cannot be jammed even
though the attacker can destroy the contents of the packets.
Since the target node and the jammer have conflicting
interests, Game Theory is used to model the interactions
between them. In this paper we analyze the interactions
between the jammer and the target node using Game
Theoretic Model. In game theory, the Nash equilibrium is a
solution control of a non-cooperative game. In a network all
communication nodes will set their own strategies and the
reactions of the jammer will be according to the nodes
strategies. This is been analyzed and modeledasaStackelberg
Game. The numerical results obtained are presented, which
shows the system performance which is based on network
parameters like bandwidth, delay etc.
Key Words: Game Theoretic Model, Stackelberg Game,
Nash Equilibrium.
1. INTRODUCTION
In wireless networks transferring of any kind ofinformation
between one or more nodes takes place that are not
physically connected. Because of its shared medium and
broadcast nature, wireless networks are prone to various
kinds of attacks. This leads to numerous security issues
which need to be dealt. The communication in the network
can be disturbed by many attacks strategies. Denial of
service attack is one of the effective attacks on wireless
network. Jamming attack comes under DOS attack [1].
Fundamental way of degrading network performance is by
using jamming. Jamming is one of many exploits used to
compromise the wireless environment.Itsworksbydenying
service to authorize users as legitimate traffic is jammed by
the overwhelming frequencies of illegitimatetraffic[2].Two
forms of jamming exist, they are
ď‚· External threat model: Jammer is not part of the
network.
ď‚· Internal threat model: Jammer is the part of
network.
Wireless transmission can bedisruptedbyjammingeitherin
the form of interference noise or collision at the receiving
node. It lowers the signal–to- noise ratio by injecting high
level of noise to the transmitted signals. An ideal jamming
attack should have less chance of being detected, energy
efficient, resistant to anti jamming techniques and also it
should disrupt the communication to maximum possible
extent.
2. ANALYSIS OF JAMMING ATTACKS
Communication security is associated with two features,
reliability of the system. Secret message transmission to a
valid receiver under certain conditions is called as message
secrecy. If the intended message is reliably received by that
receiver node is known as system reliability. Jammer is the
threat to system reliability. Categories of Jamming attacks
are:
2.1. Active and Passive attacks
Passive attackers do not transmit any message; it just
monitors the channel and tries to steal the packetcontaining
IP addresses and other node related information. It doesnot
cause any direct damage to the communication network it
just steals the information which can be misused which
causes a threat to network confidentiality. Active attackers
make the network to malfunction which affects the normal
operation of the specific node. Active attacker performs
dropping of packets, deleting packets to wrong destination
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 956
which violate non-repudiation, integrity, availability and
authentication.
2.2. Internal and External attacks
In internal attacks jammer is part of the network to disrupt
the network communication.
In external attacks jammer is not part of the network [6].
Fig 1. Jamming attack in wireless network
3. DIFFERENT ANTI-JAMMING TECHNIQUES
In order to recover from jamming attack efficient prevention
mechanism is required. Prevention approaches are more
important in wireless network because they provide an
efficient approach to increase the network performance.
Existing jamming prevention techniques are wavelength
assignment, Channel surfing, Game theory approach,
Zonalization, Trigger identification, Frequency hopping,
Threshold based technique, Cryptographic key distribution,
Multi path routing, Packet hiding
3.1. Wavelength assignment
Network performanceisdegraded byhighpoweredjamming
attack which must be dealt efficiently. Most ofthechallenges
that exist in preventing jamming attack are successfully
solved using routing and wavelength assignment. Different
techniques of wavelength assignment are:
ď‚· Attack aware routing and wavelength assignment
ď‚· Attack-Aware Wavelength Assignment
ď‚· Maximum Light Path Attack Radius
3.2. Channel surfing
It is an effective method to prevent jamming attack in
wireless network. Negotiation takes place between two
parties as a result to agree upon the channel switching
sequence beforehand. Different techniques of channel
surfing’s are:
ď‚· Neighbour based proactive channel hopping
ď‚· Channel surfing without prior Negotiation
ď‚· Defence using Honey nodes and channel surfing
algorithms
ď‚· Adaptive rapid channel hopping
3.3. Game theory approach
Zero sum stochastic game is modelled between secondary
use SU and attackers. For transmitting control messages
from time to time multiple channels are reserved according
to attacker's strategy. For maximising the payoff function
secondary users avoid jamming attack by proactively
hopping among accessible channels. Different techniques of
game theory approach are:
ď‚· Stochastic Anti-Jamming Game Formulation
ď‚· Anti-Jamming Channel Hopping Game
ď‚· To Hop Or Not To Hop
ď‚· Game-theoretical Anti-Jamming
3.4. Frequency hopping
The frequency bands on which the signals are transmitted
are changed by the transmitter. The spectrum for the
communication system is divided into a number of
frequency band and time slots are obtained by dividing the
time. Spreading code is got by assigning each user with a
frequency hopping pattern. Different techniques of
frequency hopping are:
ď‚· Code tree based system
ď‚· Time-Delayed Broadcast
ď‚· Uncoordinated Spread Spectrum
3.5. Multipath routing
The source and the destination are provided with end-to-
end availability for multi paths which is known as multipath
availability. It identifies the reliable path for data
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 957
transmission. Different techniques of multipath routing are:
ď‚· Jamming-Aware Source Routing
ď‚· Availability History Vectors Algorithm Based on
Multipath Routing
3.6. Threshold based
Jamming caused by jamming signal canbemitigated byusing
threshold based schemes. The data aretransmittedbased on
the threshold value maintained by eachnodeinthenetwork.
Different techniques of threshold based are:
ď‚· Multi-packet transmission(MPT) and Multi-packet
reception(MPR)
ď‚· ANTIJAM MAC protocol
3.7. Cryptographic key distribution
Security is provided against jamming attack by providing
cryptographic keys to nodes. Encrypting every packet is the
solution, so that the jammer will not be able to figure out the
packet. The number of keys depends on the number of
nodes. Secret key assignment to all pair of node is difficult.
The solution is to assign the keysrandomlyandconnecteach
other. Different techniques ofcryptographic keydistribution
are:
ď‚· Hybrid key pre-distribution
ď‚· Greedy user IDEntification Algorithm
3.8. Hiding scheme
Contextual information such as traffic data are hid from
attackers using hiding schemes. Hiding can be done using
fake data source or between layers. Different techniques of
hiding schemes are:
ď‚· Packet hiding scheme
ď‚· Hiding Traffic with camouflage
ď‚· Resource-efficient hiding
4. GAME THEORETIC APPROACH
The objective of the wireless networks is to safely transfer
the packets received from the source to the destination. The
objective of the jammer will be, to cause significant network
disruption using sophisticated strategies to avoid detection
which would otherwise truncate the attack duration.
Similarly the wireless network may choose to modify the
communication system in order to avoid interference from
the jamming transmission and to improve overall
performance in the presence of jamming. Since there is a
conflict between the interest of the jammer and the nodes
under attack. So we model this conflict using Game Theory.
4.1. Game Formulation
To model the interaction between the wireless network and
the jamming node, we set up a two player jamming game. At
a given instant, the jamming node and the node under the
attack choose a strategy to execute and obtain certainpayoff
based on the chosen strategies. The strategies chosen by the
jamming node and the network is given by the pair rij = (ri, rj
) in the set R=RiĂ—Rj. Each pair rij has its own associated pros
and cons. Payoff function combines the benefits associated
with strategy chosen and the effectsofthestrategyproposed
by the opponent i.e Pj( rij ) for the network and Pj (rij) for the
jammer. For Example the jammer chooses the strategyi.eno
jamming activity (rj) and the network choosesthestrategyto
mitigate jamming attack (ri). In this case, Pj (rij)=0 because
no resource are used and there is no chances of detection,
while Pi (rij)<0 because resources are used with no benefit.
The dynamic nature of the interaction between the jammer
and the network makes it possible for both players to
continually modify their strategies. So a repeated game is
considered which consists of number of sub games
corresponding to the strategies ri and rj. In a given sub game,
each player’s aim is to choose the strategy ri
* or rj
* which
maximises the payoff Pj (rij ) or Pi (rij). For a specific sub
game a strategy r*=(ri
*, rj
*) is said to be a Nash
Equilibrium[8] for that sub gameifneitheroneoftheplayers
can increment their payoff by goingamissfromtheirpresent
strategy. For example, if Pj (r*) =4 and Pi (r*) =2 is a Nash
Equilibrium for the sub game, then Pj (rj,ri
*)<=4 for all rj € Rj
and Pj (rj
*, ri )<=2 for all ri € Ri. At the end of the day, NE
relates to every player’s best reaction to their opponent’s
moves. Furthermore, the presence of NE is ensured for any
game, potentially including probabilistic strategies [7].
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 958
Fig 2. Interaction between network and jammers
[5] In the above diagram we have used sn and sj as ri and
rj (strategies of network and jammer) respectively. The
communication between the network and jammers is
illustrated as a block diagram, demonstrating that each
of the network’s and jammer’s techniques is picked in
view of the opponent’s already used strategies.
5. CONCLUSION
In this paper we have studied about the timing channel,
jamming, and the security issues that arise because of
jamming in wireless network. We have mentioned about
different jamming methods, in which Reactive jamming
appears to be the effectivejammingmethodwhichisdifficult
to detect. In this paper we have also given an outline about
different anti- jamming techniques. We have proposed a
game theoretic framework to resolve the conflicting
interests between the network and the jammer.
REFERENCES
[1] www.spamlaws.com
[2] S. Raja Ratna, R. Ravi- Survey on jamming Wireless
networks: Attacks and prevention strategies worldacademy
of science.
[3] Engineering and Technology, International journal of
computer, Electrical, Automation, Control and Information
Engineering, vol: 9, NO: 2, 2015
[4] Neha Takur and Arun Sankaralingam introduction to
jamming attacks andpreventiontechniquesusinghoneypots
in wireless networks, ORACST-International journal of
computer science [IJCSITS], ISSN:2249-9555, vol:3, NO:2,
April 2013
[5] David Slater, Patrick Tague, Radha Poovendran, A Game
Theoretic framework for jamming attacks and Mitigation in
commercial aircraft wireless networks.
[6] Mobile, embedded and wireless security.
[7] C.Gowdham1, E.Praveen2, B.Gari Gabreil, A Game
Theoretical Analysis of Exploiting Timing Channels to
overcome Jamming.
[8] Fudenberg, D. and Tirole, J.,Game Theory, MIT Press,
1991.

More Related Content

What's hot

Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
eSAT Journals
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
A comparative study of black hole attack in manet 2
A comparative study of black hole attack in manet 2A comparative study of black hole attack in manet 2
A comparative study of black hole attack in manet 2
IAEME Publication
 
Iaetsd baack better adaptive
Iaetsd baack better adaptiveIaetsd baack better adaptive
Iaetsd baack better adaptive
Iaetsd Iaetsd
 

What's hot (19)

Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...Improvement of quality of service parameters using reinvented fsmac protocol ...
Improvement of quality of service parameters using reinvented fsmac protocol ...
 
Improvement of quality of service parameters using
Improvement of quality of service parameters usingImprovement of quality of service parameters using
Improvement of quality of service parameters using
 
50120140507012
5012014050701250120140507012
50120140507012
 
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
Region Based Time Varying Addressing Scheme For Improved Mitigating Various N...
 
D43021519
D43021519D43021519
D43021519
 
Securing voip communications in an open network
Securing voip communications in an open networkSecuring voip communications in an open network
Securing voip communications in an open network
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Study of Layering-Based Attacks in a Mobile Ad Hoc Networks
Study of Layering-Based Attacks in a Mobile Ad Hoc NetworksStudy of Layering-Based Attacks in a Mobile Ad Hoc Networks
Study of Layering-Based Attacks in a Mobile Ad Hoc Networks
 
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor...
 
Ad hoc secuirty-vemula
Ad hoc secuirty-vemulaAd hoc secuirty-vemula
Ad hoc secuirty-vemula
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
 
Review of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor NetworksReview of Security Issues in Mobile Wireless Sensor Networks
Review of Security Issues in Mobile Wireless Sensor Networks
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
A comparative study of black hole attack in manet 2
A comparative study of black hole attack in manet 2A comparative study of black hole attack in manet 2
A comparative study of black hole attack in manet 2
 
Paper id 2520141231
Paper id 2520141231Paper id 2520141231
Paper id 2520141231
 
Iaetsd baack better adaptive
Iaetsd baack better adaptiveIaetsd baack better adaptive
Iaetsd baack better adaptive
 
Sunilkumar2017
Sunilkumar2017Sunilkumar2017
Sunilkumar2017
 
Source based Security Issues in WDM Systems
Source based Security Issues in WDM Systems Source based Security Issues in WDM Systems
Source based Security Issues in WDM Systems
 
433 438
433 438433 438
433 438
 

Similar to A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks

Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modification
iaemedu
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
IJTET Journal
 

Similar to A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks (20)

To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
 
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
Wireless Sensor Network: Internet Model Layer Based Security Attacks and thei...
 
50120140507012
5012014050701250120140507012
50120140507012
 
Revisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modificationRevisiting the experiment on detecting of replay and message modification
Revisiting the experiment on detecting of replay and message modification
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKA-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
A-SURVEY SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORK
 
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
Detecting Identity Based Attack In MIMO System Using Link Signature In Wirele...
 
Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...IRJET-  	  Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
 
A Review on various Security Attacks in Mobile Adhoc Network
A Review on various Security Attacks in Mobile Adhoc NetworkA Review on various Security Attacks in Mobile Adhoc Network
A Review on various Security Attacks in Mobile Adhoc Network
 
7215nsa05
7215nsa057215nsa05
7215nsa05
 
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKSCOMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
COMPREHENSIVE SURVEY OF POSSIBLE SECURITY ISSUES ON 4G NETWORKS
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative StudyAsymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
Asymmetrical Encryption for Wireless Sensor Networks: A Comparative Study
 
IRJET- Coordinates based Keying Scheme for WSN Security
IRJET- Coordinates based Keying Scheme for WSN SecurityIRJET- Coordinates based Keying Scheme for WSN Security
IRJET- Coordinates based Keying Scheme for WSN Security
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddv
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
pritamlangde
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (20)

Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Ghuma $ Russian Call Girls Ahmedabad â‚ą7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad â‚ą7.5k Pick Up & Drop With Cash Payment 8...Ghuma $ Russian Call Girls Ahmedabad â‚ą7.5k Pick Up & Drop With Cash Payment 8...
Ghuma $ Russian Call Girls Ahmedabad â‚ą7.5k Pick Up & Drop With Cash Payment 8...
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 

A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 955 A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks Chaithra H S1, Rashmi B2, Johnpaul C I3 1B.E. in Information Science and Engineering, NIE, Mysuru, Karnataka, India 2B.E. in Information Science and ENGINNERING, NIE, Mysuru, Karnataka, India 3Assistant Professor, Department of Science and Engineering, NIE, Mysuru, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - In a wireless networks communication between events uses logical communication channels i.e. the timing channel in which the information is encodedintiming. Theuse of timing channel has been proposed to defeat reactive jamming attacks; timing information cannot be jammed even though the attacker can destroy the contents of the packets. Since the target node and the jammer have conflicting interests, Game Theory is used to model the interactions between them. In this paper we analyze the interactions between the jammer and the target node using Game Theoretic Model. In game theory, the Nash equilibrium is a solution control of a non-cooperative game. In a network all communication nodes will set their own strategies and the reactions of the jammer will be according to the nodes strategies. This is been analyzed and modeledasaStackelberg Game. The numerical results obtained are presented, which shows the system performance which is based on network parameters like bandwidth, delay etc. Key Words: Game Theoretic Model, Stackelberg Game, Nash Equilibrium. 1. INTRODUCTION In wireless networks transferring of any kind ofinformation between one or more nodes takes place that are not physically connected. Because of its shared medium and broadcast nature, wireless networks are prone to various kinds of attacks. This leads to numerous security issues which need to be dealt. The communication in the network can be disturbed by many attacks strategies. Denial of service attack is one of the effective attacks on wireless network. Jamming attack comes under DOS attack [1]. Fundamental way of degrading network performance is by using jamming. Jamming is one of many exploits used to compromise the wireless environment.Itsworksbydenying service to authorize users as legitimate traffic is jammed by the overwhelming frequencies of illegitimatetraffic[2].Two forms of jamming exist, they are ď‚· External threat model: Jammer is not part of the network. ď‚· Internal threat model: Jammer is the part of network. Wireless transmission can bedisruptedbyjammingeitherin the form of interference noise or collision at the receiving node. It lowers the signal–to- noise ratio by injecting high level of noise to the transmitted signals. An ideal jamming attack should have less chance of being detected, energy efficient, resistant to anti jamming techniques and also it should disrupt the communication to maximum possible extent. 2. ANALYSIS OF JAMMING ATTACKS Communication security is associated with two features, reliability of the system. Secret message transmission to a valid receiver under certain conditions is called as message secrecy. If the intended message is reliably received by that receiver node is known as system reliability. Jammer is the threat to system reliability. Categories of Jamming attacks are: 2.1. Active and Passive attacks Passive attackers do not transmit any message; it just monitors the channel and tries to steal the packetcontaining IP addresses and other node related information. It doesnot cause any direct damage to the communication network it just steals the information which can be misused which causes a threat to network confidentiality. Active attackers make the network to malfunction which affects the normal operation of the specific node. Active attacker performs dropping of packets, deleting packets to wrong destination
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 956 which violate non-repudiation, integrity, availability and authentication. 2.2. Internal and External attacks In internal attacks jammer is part of the network to disrupt the network communication. In external attacks jammer is not part of the network [6]. Fig 1. Jamming attack in wireless network 3. DIFFERENT ANTI-JAMMING TECHNIQUES In order to recover from jamming attack efficient prevention mechanism is required. Prevention approaches are more important in wireless network because they provide an efficient approach to increase the network performance. Existing jamming prevention techniques are wavelength assignment, Channel surfing, Game theory approach, Zonalization, Trigger identification, Frequency hopping, Threshold based technique, Cryptographic key distribution, Multi path routing, Packet hiding 3.1. Wavelength assignment Network performanceisdegraded byhighpoweredjamming attack which must be dealt efficiently. Most ofthechallenges that exist in preventing jamming attack are successfully solved using routing and wavelength assignment. Different techniques of wavelength assignment are: ď‚· Attack aware routing and wavelength assignment ď‚· Attack-Aware Wavelength Assignment ď‚· Maximum Light Path Attack Radius 3.2. Channel surfing It is an effective method to prevent jamming attack in wireless network. Negotiation takes place between two parties as a result to agree upon the channel switching sequence beforehand. Different techniques of channel surfing’s are: ď‚· Neighbour based proactive channel hopping ď‚· Channel surfing without prior Negotiation ď‚· Defence using Honey nodes and channel surfing algorithms ď‚· Adaptive rapid channel hopping 3.3. Game theory approach Zero sum stochastic game is modelled between secondary use SU and attackers. For transmitting control messages from time to time multiple channels are reserved according to attacker's strategy. For maximising the payoff function secondary users avoid jamming attack by proactively hopping among accessible channels. Different techniques of game theory approach are: ď‚· Stochastic Anti-Jamming Game Formulation ď‚· Anti-Jamming Channel Hopping Game ď‚· To Hop Or Not To Hop ď‚· Game-theoretical Anti-Jamming 3.4. Frequency hopping The frequency bands on which the signals are transmitted are changed by the transmitter. The spectrum for the communication system is divided into a number of frequency band and time slots are obtained by dividing the time. Spreading code is got by assigning each user with a frequency hopping pattern. Different techniques of frequency hopping are: ď‚· Code tree based system ď‚· Time-Delayed Broadcast ď‚· Uncoordinated Spread Spectrum 3.5. Multipath routing The source and the destination are provided with end-to- end availability for multi paths which is known as multipath availability. It identifies the reliable path for data
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 957 transmission. Different techniques of multipath routing are: ď‚· Jamming-Aware Source Routing ď‚· Availability History Vectors Algorithm Based on Multipath Routing 3.6. Threshold based Jamming caused by jamming signal canbemitigated byusing threshold based schemes. The data aretransmittedbased on the threshold value maintained by eachnodeinthenetwork. Different techniques of threshold based are: ď‚· Multi-packet transmission(MPT) and Multi-packet reception(MPR) ď‚· ANTIJAM MAC protocol 3.7. Cryptographic key distribution Security is provided against jamming attack by providing cryptographic keys to nodes. Encrypting every packet is the solution, so that the jammer will not be able to figure out the packet. The number of keys depends on the number of nodes. Secret key assignment to all pair of node is difficult. The solution is to assign the keysrandomlyandconnecteach other. Different techniques ofcryptographic keydistribution are: ď‚· Hybrid key pre-distribution ď‚· Greedy user IDEntification Algorithm 3.8. Hiding scheme Contextual information such as traffic data are hid from attackers using hiding schemes. Hiding can be done using fake data source or between layers. Different techniques of hiding schemes are: ď‚· Packet hiding scheme ď‚· Hiding Traffic with camouflage ď‚· Resource-efficient hiding 4. GAME THEORETIC APPROACH The objective of the wireless networks is to safely transfer the packets received from the source to the destination. The objective of the jammer will be, to cause significant network disruption using sophisticated strategies to avoid detection which would otherwise truncate the attack duration. Similarly the wireless network may choose to modify the communication system in order to avoid interference from the jamming transmission and to improve overall performance in the presence of jamming. Since there is a conflict between the interest of the jammer and the nodes under attack. So we model this conflict using Game Theory. 4.1. Game Formulation To model the interaction between the wireless network and the jamming node, we set up a two player jamming game. At a given instant, the jamming node and the node under the attack choose a strategy to execute and obtain certainpayoff based on the chosen strategies. The strategies chosen by the jamming node and the network is given by the pair rij = (ri, rj ) in the set R=RiĂ—Rj. Each pair rij has its own associated pros and cons. Payoff function combines the benefits associated with strategy chosen and the effectsofthestrategyproposed by the opponent i.e Pj( rij ) for the network and Pj (rij) for the jammer. For Example the jammer chooses the strategyi.eno jamming activity (rj) and the network choosesthestrategyto mitigate jamming attack (ri). In this case, Pj (rij)=0 because no resource are used and there is no chances of detection, while Pi (rij)<0 because resources are used with no benefit. The dynamic nature of the interaction between the jammer and the network makes it possible for both players to continually modify their strategies. So a repeated game is considered which consists of number of sub games corresponding to the strategies ri and rj. In a given sub game, each player’s aim is to choose the strategy ri * or rj * which maximises the payoff Pj (rij ) or Pi (rij). For a specific sub game a strategy r*=(ri *, rj *) is said to be a Nash Equilibrium[8] for that sub gameifneitheroneoftheplayers can increment their payoff by goingamissfromtheirpresent strategy. For example, if Pj (r*) =4 and Pi (r*) =2 is a Nash Equilibrium for the sub game, then Pj (rj,ri *)<=4 for all rj € Rj and Pj (rj *, ri )<=2 for all ri € Ri. At the end of the day, NE relates to every player’s best reaction to their opponent’s moves. Furthermore, the presence of NE is ensured for any game, potentially including probabilistic strategies [7].
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 958 Fig 2. Interaction between network and jammers [5] In the above diagram we have used sn and sj as ri and rj (strategies of network and jammer) respectively. The communication between the network and jammers is illustrated as a block diagram, demonstrating that each of the network’s and jammer’s techniques is picked in view of the opponent’s already used strategies. 5. CONCLUSION In this paper we have studied about the timing channel, jamming, and the security issues that arise because of jamming in wireless network. We have mentioned about different jamming methods, in which Reactive jamming appears to be the effectivejammingmethodwhichisdifficult to detect. In this paper we have also given an outline about different anti- jamming techniques. We have proposed a game theoretic framework to resolve the conflicting interests between the network and the jammer. REFERENCES [1] www.spamlaws.com [2] S. Raja Ratna, R. Ravi- Survey on jamming Wireless networks: Attacks and prevention strategies worldacademy of science. [3] Engineering and Technology, International journal of computer, Electrical, Automation, Control and Information Engineering, vol: 9, NO: 2, 2015 [4] Neha Takur and Arun Sankaralingam introduction to jamming attacks andpreventiontechniquesusinghoneypots in wireless networks, ORACST-International journal of computer science [IJCSITS], ISSN:2249-9555, vol:3, NO:2, April 2013 [5] David Slater, Patrick Tague, Radha Poovendran, A Game Theoretic framework for jamming attacks and Mitigation in commercial aircraft wireless networks. [6] Mobile, embedded and wireless security. [7] C.Gowdham1, E.Praveen2, B.Gari Gabreil, A Game Theoretical Analysis of Exploiting Timing Channels to overcome Jamming. [8] Fudenberg, D. and Tirole, J.,Game Theory, MIT Press, 1991.