From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time Critical Traffic

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 3

Abstract

"In emerging network systems, such as e-healthcare and smart grids, have been drawing increasing attention in both industry and academia. The broadcast nature of wireless channels unavoidably exposes such applications to jamming attacks. However, existing methods to characterize and detect jamming attacks cannot be applied directly to time-critical networks, whose communication traffic model differs from conventional models. In this paper, we aim at modeling and detecting jamming attacks against time-critical traffic. We introduce a new metric, message invalidation ratio, to quantify the performance of time-critical applications. A key insight that leads to our modeling is that the behavior of a jammer who attempts to disrupt the delivery of a time-critical message can be exactly mapped to the behavior of a gambler who tends to win a gambling game. We show via the gambling-based modeling and real-time experiments that there in general exists a phase transition phenomenon for a time-critical application under jamming attacks: as the probability that a packet is jammed increases from 0 to 1, the message invalidation ratio first increases slightly (even negligibly), then increases dramatically to 1. Based on analytical and experimental results, we further design and implement the JADE (Jamming Attack Detection based on Estimation) system to achieve efficient and robust jamming detection for time-critical wireless networks. "

Authors and Affiliations

Keywords

Related Articles

Municipal Solid Waste Management (MSWM): A Case Study of Nagaon Town in Assam, India

"Abstract Municipal solid waste management (MSWM), mostly an urban phenomenon, is undoubtedly an important issue of global concern today that invites attention of engineers, activists, academicians, researchers, students...

Secured Digital Image Sharing by Using NVSS

Abstract:Conventional visual secret sharing schemes hide secret images in the form of shares that are printed on transparencies and stored in a digital form. The generated shares appear as noise-like pixels; but it will...

Review on MIMO System using Transmit Diversity and Relay Selection Algorithm

Review on MIMO System using Transmit Diversity and Relay Selection Algorithm

Technological Changes in Blast Furnace Iron Making in India since Last Few Decades

India as a 4th steel producer in the world, has resulted due to adaptation of new technologies in the field of iron and steel making since from the last few decades. Keeping in view for increasing quality of hot metal a...

Enhancement and Correction of Medical Images Using Multiscale Retinex

The Retinex is an image enrichment algorithm that improves the brightness, contrast and sharpness of an image. A new method for enhancing the contrast of inhomogeneous images by retinex algorithm is proposed. It can corr...

Download PDF file
  • EP ID EP357203
  • DOI -
  • Views 110
  • Downloads 0

How To Cite

(2015). From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time Critical Traffic. UNKNOWN, 4(3), -. https://europub.co.uk/articles/-A-357203