Master Thesis : “ Energy - Efficient Jamming and Countermeasures ”

نویسنده

  • Dominic Meier
چکیده

Since wireless networks use a shared medium they are exposed to jamming attacks. Such attacks are carried out by an adversary emitting radio frequency signals. They can severely interfere with the normal operation of wireless networks and, consequently, mechanisms are needed that can cope with jamming attacks. However, unless the adversary has unlimited capacities, it cannot jam all communication channels at once for a long time. In this thesis we want to study the influence of a jammer that disposes of a limited source of energy and can choose when and where to use it for disrupting communication on certain channels. The thesis involves the construction and analysis of algorithms for jammers as well as for wireless nodes, both parties seeking to accomplish an orthogonal task. The aim of the thesis is to gain insights on adversarial jamming in multi-channel radio networks. You will start by reading “Gossiping in a Multi-Channel Radio Network” by Dolev et al. In their paper, an adversary can jam at most t of c channels of a complete graph per round. For a simplified version of the problem, e.g., for ǫ = 0, You will analyze alternative models for the adversarial dynamics, for instance, a dynamic model where more channels can be jammed after quiet times. Both deterministic and randomized algorithms for efficient gossiping are of interest. Depending on your findings, we seek to generalize the results for multi-hop networks and other applications, e.g., time synchronization or leader election.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Activity Modelling and Countermeasures on Jamming Attack

In last few decades, there has been a wide demand of wireless sensor networks (WSNs) in extensive mission critical applications such as monitoring, industrial control, military, health and many more. The larger demand of WSN in mission critical applications makes it more prone towards malicious users who are trying to invade. These security assaults worsen the performance of WSN in large extent...

متن کامل

Attacks and Countermeasures in Sensor Networks: A Survey

2 Physical Layer 3 2.1 Attacks in the Physical Layer . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.1 Device Tampering . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.2 Eavesdropping . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.3 Jamming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.2 Countermeasures in the Physical Layer . . . . . . . . . . . . ....

متن کامل

Master of Science in Telecommunications

Ad-hoc Networks are one of the most important achievements of current technology; they can provide communication without needing a fixed infrastructure, which makes them suitable for communication in disaster areas or when quick deployment is needed. However, since this kind of network uses the wireless medium for communication, it is susceptible to malicious exploitation at different layers. O...

متن کامل

Mitigating jamming attacks in mobile cognitive networks through time hopping

5G wireless networks will support massive connectivity mainly due to device-to-device communications. An enabling technology for device-to-device links is the dynamical spectrum access. The devices, which are equipped with cognitive radios, are to be allowed to reuse spectrum occupied by cellular links. The dynamical spectrum availability makes cognitive users switch between channels. Switching...

متن کامل

Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks

Multi-radio (multi-interface, multi-channel) 802.11 and sensor networks have been proposed to increase network capacity and to reduce energy consumption, to name only a few of their applications. They are vulnerable, however, to jamming attacks, in which attackers block communication by radio interference or MAC-protocol violation. Two jamming countermeasures have been proposed, namely software...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008