Open Access Open Access  Restricted Access Subscription or Fee Access

An Enhanced Jamming Attack Detection Using Bittrickle Methodology

K. Gayathri, L. Kiruthika, J. Rathika, K. Renugadevi, D. Sreearthi

Abstract


When target devices are transmitting a reactive jammer jams the wireless channel; Reactive jamming is harder to track and compensate against the constant jamming methods. Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum DSSS) have been widely used against Jamming attacks. If high power transmitter or frequency channel is jammed then both these method will fail.  We use broad band and high power reactive jammer to avoid jamming attacks. In this proposed method we use bit trickle method to avoid jamming. Bit Trickle is a method which is used to find attackers when using broadband communication between transmitter and receiver. Users having secret key to access the data from anti jammer. Once the security key is correct then only the transmission occurs.


Keywords


Wireless Network; Jamming; Anti-Jamming; Bit Trickle Method

Full Text:

PDF

References


Reactive jamming technologies. http://www.ece.gatech.edu/academic/courses/ece4007/08fall/ece4007l02/lm5/jammer.doc.

Y. Liu and P. Ning. Bittrickle: Defending against broadband and highpower reactive jamming attacks. Technical Report TR-2011-17, NC State University, Computer Science Department, July 2011.

Y. Liu, P. Ning, H. Dai, and A. Liu. Randomized differential dsss: Jamming-resistant wireless broadcast communication. In Proceedings of the 2010 IEEE INFOCOM, 2010.

Robert A. Scholtz. Spread Spectrum Communications Handbook. McGraw-Hill, 2001.

W. Xu, W. Trappe, and Y. Zhang. Anti-jamming timing channels for wireless networks. In WiSec ’08: Proceedings of the first ACM conference on Wireless network security, pages 203–213, New York,NY, USA, 2008. ACM.

M. Wilhelm, I. Martinovic, J. B. Schmitt, and V. Lenders, “Short paper: Reactive jamming in wireless networks: How realistic is the threat?” in Proc. 4th ACM Conf. Wireless Netw. Secur., 2011, pp. 47–52.

W. Xu, K. Ma, W. Trappe, and Y. Zhang, “Jamming sensor networks: Attack and defense strategies,” IEEE Netw., vol. 20, no. 3, pp. 41–47, May/Jun. 2006

K. Grover, A. Lim, and Q. Yang, “Jamming and anti–jamming techniques in wireless networks: A survey,” Int. J. Ad Hoc Ubiquitous Comput., vol. 17, no. 4, pp. 197–215, 2014.

D. Giustiniano, V. Lenders, J. B. Schmitt, M. Spuhler, and M. Wilhelm, “Detection of reactive jamming DSSS-based wireless networks,” in Proc. 6th ACM Conf. Secur. Privacy Wireless Mobile Netw., 2013, pp. 43–48.

E.-K. Lee, S. Y. Oh, and M. Gerla, “Randomized channel hopping scheme for anti-jamming communication,” in Proc. IFIP Wireless Days (WD), Oct. 2010, pp. 1–5.

Y. Liu and P. Ning, “BitTrickle: Defending against broadband and highpower reactive jamming attacks,” in Proc. IEEE INFOCOM, Mar. 2012, pp. 909

W. Xu, W. Trappe, and Y. Zhang, “Anti-jamming timing channels for wireless networks,” in Proc. 1st ACM Conf. Wireless Netw. Secur., New York, NY, USA, 2008, pp. 203–213.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.