Energy and Distance evaluation for Jamming Attacks in wireless networks

Emilie Bout, V. Loscrí, A. Gallais
{"title":"Energy and Distance evaluation for Jamming Attacks in wireless networks","authors":"Emilie Bout, V. Loscrí, A. Gallais","doi":"10.1109/DS-RT50469.2020.9213652","DOIUrl":null,"url":null,"abstract":"Wireless networks are prone to jamming-type attacks due to their shared medium. An attacker node can send a radio frequency signal and if this signal interferes with the “normal” signals of two communicating nodes, the communication can be severely impacted. In this paper, we examine radio interference attacks from the jamming node perspective. In particular, we assume a “greedy” jamming node, whose main twofold objectives are to attack and interfere the communication of a transmitter and a receiver node, by minimizing its energy consumption and maximizing the detection time. The two communication nodes are static during the attack window time, while the attacker node can adapt its distance from the transmitter in order to select the most suitable range for a successful interference. In order to take into account the distance factor for the effectiveness of the attack, we derive an optimization model for representing the attack and we will study the key factors that allow effective and efficient implementation of a jamming attack, namely a) the energy b) the detection time and c) the impact on the transmission in terms of lowering the PDR. Three different types of attacks will be analyzed, 1) Constant Jamming, 2) Random Jamming and 3) Reactive Jamming. Simulation results show that the effectiveness of a jamming attack in respect to the others not only depends on the position of the jamming node but also on the distance between the transmitter and receiver nodes.","PeriodicalId":149260,"journal":{"name":"2020 IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications (DS-RT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications (DS-RT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DS-RT50469.2020.9213652","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

Wireless networks are prone to jamming-type attacks due to their shared medium. An attacker node can send a radio frequency signal and if this signal interferes with the “normal” signals of two communicating nodes, the communication can be severely impacted. In this paper, we examine radio interference attacks from the jamming node perspective. In particular, we assume a “greedy” jamming node, whose main twofold objectives are to attack and interfere the communication of a transmitter and a receiver node, by minimizing its energy consumption and maximizing the detection time. The two communication nodes are static during the attack window time, while the attacker node can adapt its distance from the transmitter in order to select the most suitable range for a successful interference. In order to take into account the distance factor for the effectiveness of the attack, we derive an optimization model for representing the attack and we will study the key factors that allow effective and efficient implementation of a jamming attack, namely a) the energy b) the detection time and c) the impact on the transmission in terms of lowering the PDR. Three different types of attacks will be analyzed, 1) Constant Jamming, 2) Random Jamming and 3) Reactive Jamming. Simulation results show that the effectiveness of a jamming attack in respect to the others not only depends on the position of the jamming node but also on the distance between the transmitter and receiver nodes.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
无线网络干扰攻击的能量和距离评估
无线网络由于其共享介质,容易受到干扰型攻击。攻击者节点可以发送射频信号,如果该信号干扰了两个通信节点的“正常”信号,则通信可能受到严重影响。在本文中,我们从干扰节点的角度来研究无线电干扰攻击。特别是,我们假设一个“贪婪”干扰节点,其主要目标是通过最小化其能量消耗和最大化检测时间来攻击和干扰发送端和接收端节点的通信。在攻击窗口时间内,两个通信节点是静态的,而攻击节点可以调整与发射机的距离,以选择最合适的距离进行成功的干扰。为了考虑攻击有效性的距离因素,我们推导了一个表示攻击的优化模型,我们将研究允许有效和高效实施干扰攻击的关键因素,即a)能量b)检测时间c)降低PDR对传输的影响。将分析三种不同类型的攻击,1)持续干扰,2)随机干扰和3)被动干扰。仿真结果表明,干扰攻击的有效性不仅与干扰节点的位置有关,还与收发节点之间的距离有关。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Collision Avoidance Proposal in a MEC based VANET environment Session-level Adversary Intent-Driven Cyberattack Simulator Pitfalls and Remedies in Modeling and Simulation of Cyber Physical Systems Real-Time Simulation of Robot Swarms with Restricted Communication Skills Laying the path to consumer-level immersive simulation environments
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1