Downloads: 139 | Views: 347
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 11, November 2015 | Popularity: 6.9 / 10
A Survey on Detection of Jamming Attacks in Time-Critical Wireless Applications
Sheetal S Shete, N. D. Kale
Abstract: Time-critical wireless applications in emerging network systems, such as e-healthcare and smart grids, have been drawing increasing attention in both industry and academia. The broadcast nature of wireless channels unavoidably exposes such applications to jamming attacks. However, existing methods to characterize and detect jamming attacks cannot be applied directly to time-critical networks, whose communication traffic model differs from conventional models. In this paper, we aim at modeling and detecting jamming attacks against time-critical traffic. We introduce a new metric, message invalidation ratio, to quantify the performance of time-critical applications. A key insight that leads to our modeling is that the behavior of a jammer who attempts to disrupt the delivery of a time-critical message can be exactly mapped to the behavior of a gambler who tends to win a gambling game. We show via the gambling-based modeling and real-time experiments that there in general exists a phase transition phenomenon for a time-critical application under jamming attacks as the probability that a packet is jammed increases from 0 to 1, the message invalidation ratio first increases slightly (even negligibly), then increases dramatically to 1. Based on analytical and experimental results, we further design and implement the JADE (Jamming Attack Detection based on Estimation) system to achieve efficient and robust jamming detection for time-critical wireless networks.
Keywords: Performance modelling, wireless network, time-critical messaging, jamming attack detection, smart grid applications
Edition: Volume 4 Issue 11, November 2015
Pages: 51 - 53
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 695 - 698A Complete Guide to 5G
Saad Shah, Mukesh Patel
Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023
Pages: 734 - 741Enhanced Congestion Control in Wireless Networks: A Joint Random Early Detection and Drop Tail Mechanism
S. Mohanarangan, R. Kalaivani Sri, P. Nithya, M. Sowndharya, M. Hemamalini
Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, United States of America, Volume 12 Issue 12, December 2023
Pages: 1010 - 1016Enhancing Surveillance Capabilities: A Low-Cost, Mobile Phone-Based Solution with Moving Object Recognition
Dr. Bhargav Gangadhara
Downloads: 3
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar