On Adjusting Power to Defend Wireless Networks from Jamming

  title={On Adjusting Power to Defend Wireless Networks from Jamming},
  author={W. Xu},
  journal={2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking \& Services (MobiQuitous)},
  • W. Xu
  • Published 2007
  • Computer Science
  • 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous)
Wireless networks are susceptible to accidental or intentional radio interference. One way to cope with this threat is to have the radios compete with the jammer, whereby the network nodes adapt their transmission power to improve the chance for successful communication. In this paper, we examine issues associated with using power control both theoretically and experimentally. We begin by examining the two-party, single-jammer scenario, where we explore the underlying communication theory… Expand
Determining the position of a jammer using a virtual-force iterative approach
This paper formulate the jamming effects using two jamming models: region-based and signal-to-noise-ratio(SNR)-based; and they categorize network nodes into three states based on the level of disturbance caused by the jammer. Expand
Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges
This paper solves the jammer location estimation by constructing a least-squares problem, which exploits the changes of the hearing ranges, and exhibits lower computational cost and higher localization accuracy than the previous iterative-search-based virtual force algorithm. Expand
Ståhlberg Fast Design of Wireless Mesh Networks to Defend Against Worst-Case Jamming
W ireless mesh networks (WMNs) are interconnected systems of wireless access points (APs) that provide untethered network connectivity for a groupof userswho require data, voice, and/or videoExpand
Designing Interference-Robust Wireless Mesh Networks Using a Defender-Attacker-Defender Model
Abstract : Wireless mesh networks (WMNs) are interconnected systems of wireless access points (APs) that provide untethered network connectivity for a group of users who require data, voice, and/orExpand
On limited-range strategic/random jamming attacks in wireless ad hoc networks
This paper considers the impact of the placement and range oflimited-range jammers on ad hoc networks and performs extensive simulations to show how significant such strategically placed attacks can be compared to random placement of limited-rangeJammers on both TCP and UDP traffic. Expand
On secure connectivity with adjusting power to cope with jamming in sensor networks
The impact of increasing transmission power to cope with jamming on secure connectivity (provided by different key predistribution schemes) in ad hoc and sensor networks is examined. Expand
Optimal anti-jamming strategy in sensor networks
By comprehensive simulation experiments, it is demonstrated that a sensor network using the derived anti-jamming strategy can well defense from radio jamming attacks and in the meanwhile retain high energy-efficiency. Expand
Adaptive topologies against jamming attacks in wireless networks: A game-theoretic approach
The presented numerical results show the effectiveness of the proposed defense approach against various attack policies and demonstrate the assignment strategies on a real wireless network deployed in a three-story building. Expand
Making Wireless Body Area Networks Robust Under Cross-Technology Interference
A practical protocol is proposed, in which it is shown that the protocol can assure the robustness of BAN even when the CTI sources are in very close vicinity, using a small amount of energy on commercial-off-the-shelf sensor devices. Expand
Secure connectivity through key predistribution with directional antennas to cope with jamming in sensor networks
The impact of jamming attacks on secure connectivity (provided by different key predistribution schemes) when the network uses directional antennas to cope with jamming is studied. Expand


The feasibility of launching and detecting jamming attacks in wireless networks
This paper proposes four different jamming attack models that can be used by an adversary to disable the operation of a wireless network, and evaluates their effectiveness in terms of how each method affects the ability of a Wireless node to send and receive packets. Expand
Channel Surfing: Defending Wireless Sensor Networks from Interference
  • W. Xu
  • Computer Science
  • 2007 6th International Symposium on Information Processing in Sensor Networks
  • 2007
This work explores channel surfing, whereby the sensor nodes adapt their channel assignments to restore network connectivity in the presence of interference, and devised both synchronous and asynchronous strategies to facilitate the spectral scheduling needed to improve network fidelity when sensor nodes operate on multiple channels. Expand
Low-power DoS attacks in data wireless LANs and countermeasures
It is argued that LDPC codes will be very suitable to prevent this type of jamming of data protocols, such as IP, over WLAN and the theoretical limits are investigated by analyzing the performance derived from upper bounds on binary error-control codes. Expand
Channel surfing and spatial retreats: defenses against wireless denial of service
This paper presents two strategies that may be employed by wireless devices to evade a MAC/PHY-layer jamming-style wireless denial of service attack, and studies both of these strategies for three broad wireless communication scenarios: two-party radio communication, an infrastructured wireless network, and an ad hoc wireless network. Expand
JAM: a jammed-area mapping service for sensor networks
A mapping protocol for nodes that surround a jammer which allows network applications to reason about the region as an entity, rather than as a collection of broken links and congested nodes is described. Expand
Link-layer jamming attacks on S-MAC
This paper investigates some jamming attacks on S-MAC, the level of effectiveness and efficiency the attacks can potentially achieve and a countermeasure that can be implemented against one of these attacks. Expand
DoS analysis of reservation based MAC protocols
  • R. Negi, A. Rajeswaran
  • Computer Science
  • IEEE International Conference on Communications, 2005. ICC 2005. 2005
  • 2005
A counter-measure based on modifying the MAC protocol is developed, and shown to limit the intelligent jammer's effect, and Protections against further attacks on the modified protocol are discussed. Expand
Mobile network management and robust spatial retreats via network dynamics
This paper argues that, in the context of moving communicating nodes, the equations of motion should be formulated as a steepest descent minimization of the system potential energy, and introduces distributed algorithms that yield more practical implementations of network dynamics. Expand
Digital communications
  • J. Mazo
  • Computer Science
  • Proceedings of the IEEE
  • 1985
This month's guest columnist, Steve Bible, N7HPR, is completing a master’s degree in computer science at the Naval Postgraduate School in Monterey, California, and his research area closely follows his interest in amateur radio. Expand
Electronic Warfare in the Information Age
From the Publisher: Here's an advanced practitioner's guide to the latest concepts and threats associated with modern electronic warfare (EW). This new book identifies and explains the newest radarExpand