From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time Critical Traffic

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 3

Abstract

"In emerging network systems, such as e-healthcare and smart grids, have been drawing increasing attention in both industry and academia. The broadcast nature of wireless channels unavoidably exposes such applications to jamming attacks. However, existing methods to characterize and detect jamming attacks cannot be applied directly to time-critical networks, whose communication traffic model differs from conventional models. In this paper, we aim at modeling and detecting jamming attacks against time-critical traffic. We introduce a new metric, message invalidation ratio, to quantify the performance of time-critical applications. A key insight that leads to our modeling is that the behavior of a jammer who attempts to disrupt the delivery of a time-critical message can be exactly mapped to the behavior of a gambler who tends to win a gambling game. We show via the gambling-based modeling and real-time experiments that there in general exists a phase transition phenomenon for a time-critical application under jamming attacks: as the probability that a packet is jammed increases from 0 to 1, the message invalidation ratio first increases slightly (even negligibly), then increases dramatically to 1. Based on analytical and experimental results, we further design and implement the JADE (Jamming Attack Detection based on Estimation) system to achieve efficient and robust jamming detection for time-critical wireless networks. "

Authors and Affiliations

Keywords

Related Articles

Fixed Point Theorem of the Iterated Function Systems Consisting of - Contraction Type Mappings

In this paper we present some fixed point theorem of iterated function system consisting of α -φ-contraction type mappings in complete metric space.

Awareness of Sitting Posture in Patients Having Chronic Low Back Pain

This cross sectional survey was conducted to find out the level of awareness about correct sitting posture & association between the poor posture and chronic low back pain. A sample of 93 patients was taken from February...

Secondary Development of Solid works for Standard Components Based on Database

This work employs Visual Basic, SolidWorks and Access to develop a database management system for standard components. Two technologies namely coding and parameter design have been used. The database management system fo...

Digitally Mediated Learning and Pre-Service Teachers in Less Resourced Regions

Digital technologies of today have challenged the traditional systems of education and have created potential new ways of delivery of knowledge and skills that require a critical look at learning and how it might be deli...

Study of Knowledge, Attitude and Practices Regarding Hygiene among Abattoir Workers in Kano State Metropolitan, Nigeria

"ABSTRACT Background: The most important issue in all meat-processing plants is maintenance of proper hygiene and an abattoir has been defined as a premise approved and registered by the controlling authority for hygieni...

Download PDF file
  • EP ID EP357203
  • DOI -
  • Views 111
  • Downloads 0

How To Cite

(2015). From Jammer to Gambler: Modeling and Detection of Jamming Attacks against Time Critical Traffic. UNKNOWN, 4(3), -. https://europub.co.uk/articles/-A-357203