scholarly journals Channel-Hopping-Based Jamming Mitigation in Wireless LAN Considering Throughput and Fairness

Electronics ◽  
2020 ◽  
Vol 9 (11) ◽  
pp. 1749
Author(s):  
Sirojiddin Djuraev ◽  
Seung Yeob Nam

Because of the popularity of wireless technology, jamming attack is one of the most critical issues in wireless networks. Wireless jamming attack is one type of denial-of-service attacks where attackers send malicious messages or signal on a legitimate channel by causing intentional interference in the network. In order to avoid jamming attacks, various jamming defense schemes have been proposed. One of the popular methods is a channel-hopping scheme. However, the main challenge of this method is generating a common channel number between the users and the access point without leaking that information to the jammer. We propose a new channel-hopping scheme where the access point shares a separate key with each user to isolate the damage on the network when a key has been compromised, while maintaining high throughput and fairness. We evaluate the proposed scheme through experiment on a test bed.

2019 ◽  
Vol 6 (2) ◽  
pp. 60
Author(s):  
Putu Dhiko Pradnyana ◽  
D.M. Wiharta ◽  
N.P. Sastra

The main changes in the telecommunication during these present days come mainly from wired technology to wireless technology. The Wireless LAN (WLAN) configuration consists of an access point, connected to users using air medium. The postgraduate building of Universitas Udayana has been equipped with a wireless network, supporting the study activities within the building. This research explains regarding the signal level quality and the Quality of Service (QoS) by analyzing the Wi-Fi coverage. The measurements were divided into two models, with and without barriers. The highest result comes to -42 dBm, conversely, the lowest is -82 dBm. Thus, the results show that the throughput value is 3.97 Mbps. Within the maximum bandwidth of 10 Mbps, the average packet-loss is not more than 3%. The delay measurement provides a result of not more than 100 ms, and the jitter obtained is 0.04. According to the digital floor plan, the calculation results of the coverage area match the signal level measurement.


Author(s):  
Sun Yan-qiang ◽  
Wang Xiao-dong

Guaranteeing security of the sensor network is a challenging job due to the open wireless medium and energy constrained hardware. Jamming style Denial-of-Service attacks is the transmission of radio signals that disrupt communications by decreasing the signal to noise ratio. These attacks can easily be launched by jammer through, either bypassing MAC-layer protocols or emitting a radio signal targeted at blocking a particular channel. In this chapter, we survey different jamming attack models and metrics, and figure out the difficulty of detecting and defending such attacks. We also illustrate the existed detecting strategies involving signal strength and packet delivery ratio and defending mechanisms such as channel surfing, mapping jammed region, and timing channel. After that, we explore methods to localize a jammer, and propose an algorithm Geometric-Covering based Localization. Later, we discuss the future research issues in jamming sensor networks and corresponding countermeasures.


2018 ◽  
Vol 2018 ◽  
pp. 1-9
Author(s):  
Yongchul Kim ◽  
Young-Hyun Oh ◽  
Jungho Kang

Cognitive radio networks (CRNs) are considered an attractive technology to mitigate inefficiency in the usage of licensed spectrum. CRNs allow the secondary users (SUs) to access the unused licensed spectrum and use a blind rendezvous process to establish communication links between SUs. In particular, quorum-based channel-hopping (CH) schemes have been studied recently to provide guaranteed blind rendezvous in decentralized CRNs without using global time synchronization. However, these schemes remain vulnerable to jamming attacks. In this paper, we first analyze the limitations of quorum-based rendezvous schemes called asynchronous channel hopping (ACH). Then, we introduce a novel sequence sensing jamming attack (SSJA) model in which a sophisticated jammer can dramatically reduce the rendezvous success rates of ACH schemes. In addition, we propose a fast and robust asynchronous rendezvous scheme (FRARS) that can significantly enhance robustness under jamming attacks. Our numerical results demonstrate that the performance of the proposed scheme vastly outperforms the ACH scheme when there are security concerns about a sequence sensing jammer.


2018 ◽  
Vol 3 (2) ◽  
pp. 1-9
Author(s):  
Ahmad Yusri Dak ◽  
Nurul Fazliana Samsudin ◽  
Noor Elaiza Abdul Khalid

Sharing nature of wireless medium provides various challenging features among various group of users. This is one of various services offered by Wireless Local Area Network (WLAN). In addition, due to popularity of WLANs, user experience suffer from various security threats especially jamming based Denial-of-Service (DoS) attack. The attacks are focused on radio channels where the transmission channel interfere with jamming attacks by sending high frequency signal to disturb the communication between the users in network. Most of attack exists at physical layer are detected randomly movable and less static attack are found.  Therefore, the objective of this research is to study the pattern of randomly movable node and performance of physical layer jamming attack using Waypoint Mobility Model.  To address these evaluation, a simulation model consists of constant and random jammer will be developed using OPNET. The performance involved physical layer attack that will be evaluated using three performance metrics such as Bit Error Rate (BER), Signal-to-Noise Ratio (SNR), and throughput by using Random Waypoint Point. Outcome concluded that these three-performance metrics can be shows as a significant impact to a detection mechanism that will enable offer insights and the level for future research based on DoS.


2011 ◽  
Vol 271-273 ◽  
pp. 991-994
Author(s):  
Qing Fu Huang ◽  
Jian Wu Yang ◽  
Zhi Cheng Chen

With the development of the technology and society, the resolution of the wireless LAN would be the direction which is leading the smart home LAN’s construction, the IR, RF, Bluetooth, Zigbee, GPRS, and others wireless methods have been applied in the smart home smoothly, like the control, security, data transmission, now it is time to specified the rules for the wireless technology in the smart home, this paper introduces a kind of the smart home wireless bus protocol that based on the Modbus protocol, and the hardware and PC software have been designed for it, the project achieved the operation and communication among the nodes, the test realizes that it has the better data transmission mechanism when adopting the wireless bus protocol, and make sure the reliability of the data transmission between the nodes in the smart home.


2012 ◽  
Vol 8 (4) ◽  
pp. 234029 ◽  
Author(s):  
Yujin Lim ◽  
Hak-Man Kim ◽  
Tetsuo Kinoshita

In a microgrid as an energy infrastructure, the vulnerability against jamming attacks is fatal. Thus, the ability to deal with jamming attacks and maintain an acceptable level of service degradation in presence of the attacks is needed. To solve the problem, we propose a traffic rerouting scheme in wireless communication infrastructure for islanded microgrid. We determine disjoint multiple paths as candidates of a detour path and then select the detour path among the candidates in order to reduce the effect of jamming attack and distribute traffic flows on different detour paths. Through performance comparison, we show that our scheme outperforms a conventional scheme in terms of packet delivery ratio and end-to-end delay.


2018 ◽  
Author(s):  
Kiramat

—Cooperative networking brings performance improvement to most of theissues in wireless networks, such as fading or delay due to slow stations. However, due tocooperation when data is relayed via other nodes, there network is more prone to attacks.Since, channel access is very important for cooperation, most of the attacks happens at MAC.One of the most critical attack is denial of service, which is reason of cooperation failure.Therefore, the cooperative network as well as simple wireless LAN must be defensive againstDOS attacks.In this article we analyzed all possible of DoS attacks that can happen at MAC layer ofWLAN. The cooperative protocols must consider defense against these attacks. This articlealso provided survey of available solutions to these attacks. At the end it described itsdamages and cost as well as how to handle these attacks while devising cooperative MAC.


2012 ◽  
Vol 6-7 ◽  
pp. 356-360
Author(s):  
Shao Yin Wang ◽  
Yi Yu ◽  
Guo Xin Zheng ◽  
Qing Feng Ding

We study the anti-interference performance of the 802.11 system when it works as Data Communication System (DCS) in Communication Based Train Control (CBTC). We first conduct extensive experiments on a 802.11b network to assess the ability on a lab test bed, then the outdoor experiments are also conducted. In the presence of jammer, we find that in each case of interference model, there exists a C/I threshold which determine the DCS-Access Point (DCS-AP) and DCS-Station Adapter (DCS-STA) communication performance. In the outdoor environment, different interference sources are adopted to investigate the data throughput value and other parameters of the DCS system under the critical state.


Sign in / Sign up

Export Citation Format

Share Document