Providing survivability against jamming attack via joint dynamic routing and channel assignment

Shanshan Jiang, Yuan Xue
{"title":"Providing survivability against jamming attack via joint dynamic routing and channel assignment","authors":"Shanshan Jiang, Yuan Xue","doi":"10.1109/DRCN.2009.5340005","DOIUrl":null,"url":null,"abstract":"Built upon a shared wireless medium, wireless network is particularly vulnerable to jamming attacks. The ability to recover from attacks and maintain an acceptable level of service degradation is a crucial aspect in the design of a wireless network. To address this issue, this paper investigates the network restoration solutions via the joint design of traffic rerouting, channel re-assignment, and scheduling. Efficient routing and channel assignment schemes can relieve the interference caused by both the normal network nodes and the jamming nodes. Therefore, based on the necessary conditions of schedulability, we first formulate the optimal network restoration problem as linear programming problem, which gives an upper bound on the achievable network throughput. After we solve the LP problems, we have a set of flows assigned to edges that have been assigned to different channels. And based on the LP solutions, we provide a greedy scheduling algorithm using dynamic channel assignment, which schedules both the network traffic and the jamming traffic. In particular, we consider two strategies, namely global restoration and local restoration, which can support a range of tradeoffs between the restoration latency and network throughput after restoration. To quantitatively evaluate the impact of jamming attacks during and after restoration, we define two performance degradation indices, transient disruption index (TDI) and throughput degradation index (THI). Finally, extensive performance evaluations are performed to study the impact of various jamming scenarios in a multi-hop multi-channel wireless network.","PeriodicalId":227820,"journal":{"name":"2009 7th International Workshop on Design of Reliable Communication Networks","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 7th International Workshop on Design of Reliable Communication Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DRCN.2009.5340005","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

Built upon a shared wireless medium, wireless network is particularly vulnerable to jamming attacks. The ability to recover from attacks and maintain an acceptable level of service degradation is a crucial aspect in the design of a wireless network. To address this issue, this paper investigates the network restoration solutions via the joint design of traffic rerouting, channel re-assignment, and scheduling. Efficient routing and channel assignment schemes can relieve the interference caused by both the normal network nodes and the jamming nodes. Therefore, based on the necessary conditions of schedulability, we first formulate the optimal network restoration problem as linear programming problem, which gives an upper bound on the achievable network throughput. After we solve the LP problems, we have a set of flows assigned to edges that have been assigned to different channels. And based on the LP solutions, we provide a greedy scheduling algorithm using dynamic channel assignment, which schedules both the network traffic and the jamming traffic. In particular, we consider two strategies, namely global restoration and local restoration, which can support a range of tradeoffs between the restoration latency and network throughput after restoration. To quantitatively evaluate the impact of jamming attacks during and after restoration, we define two performance degradation indices, transient disruption index (TDI) and throughput degradation index (THI). Finally, extensive performance evaluations are performed to study the impact of various jamming scenarios in a multi-hop multi-channel wireless network.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
通过联合动态路由和信道分配提供抗干扰攻击的生存能力
无线网络建立在共享的无线介质上,特别容易受到干扰攻击。从攻击中恢复并保持可接受的服务降级水平的能力是无线网络设计中的一个关键方面。为了解决这一问题,本文通过流量重路由、通道重新分配和调度的联合设计来研究网络恢复方案。有效的路由和信道分配方案可以减轻正常网络节点和干扰节点造成的干扰。因此,基于可调度性的必要条件,我们首先将最优网络恢复问题表述为线性规划问题,给出了可实现网络吞吐量的上界。在我们解决了LP问题之后,我们有一组分配给边缘的流,这些边缘已经分配给了不同的通道。在此基础上,提出了一种基于动态信道分配的贪婪调度算法,对网络流量和干扰流量都进行了调度。我们特别考虑了两种策略,即全局恢复和本地恢复,这两种策略可以在恢复后的恢复延迟和网络吞吐量之间进行一系列权衡。为了定量评价恢复期间和恢复后干扰攻击的影响,我们定义了两个性能退化指标:瞬态中断指数(TDI)和吞吐量退化指数(THI)。最后,进行了广泛的性能评估,以研究在多跳多通道无线网络中各种干扰情况的影响。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Improving the topological resilience of mobile ad hoc networks Robust routing vs dynamic load-balancing a comprehensive study and new directions Survivability of P2P multicasting Performance of a cognitive radio network with tolerable service degradation Providing survivability against jamming attack via joint dynamic routing and channel assignment
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1