THE EFFECT OF JAMMING ATTACK DETECTION AND MITIGATION ON ENERGY POWER CONSUMPTION (CASE STUDY IEEE 802.11 WIRELESS AD HOC NETWORK)

Authors

  • Nur Cahyono Kushardianto Department of Informatics Engineering, Politeknik Negeri Batam, Batam, Indonesia
  • Yudhi Kusnanto Department of Computer Engineering, STMIK AKAKOM, Yogyakarta, Indonesia
  • Elvian Syafrurizal Department of Electrical Engineering, Universitas Indonesia, Depok, Indonesia
  • Ahmad Hamim Tohari Department of Electrical Engineering, Universitas Indonesia, Depok, Indonesia

DOI:

https://doi.org/10.11113/jt.v77.6660

Keywords:

Quality of Service, jamming, energy consumption, channel hopping

Abstract

Quality of Service for data traffic is an important facet of a network, which in the case of a wireless network can easily be disrupted by applying a device to broadcast signals.  The authors believe that the increased of the energy consumption, when a jamming attack occurs, can be used as a guiding indicator in order to mitigate the attack. The authors show that when a reactive jamming attack occurs on a wireless network unmitigated, it can easily block the entire data traffic to the point there is no data can be delivered. The authors also show that, using NS3 simulation, in an event where a reactive jamming attack to the network happened, the source of the attack can be identified through the increased of energy consumption , and successfully mitigated by avoiding sending data traffic through the same channel used by the attacker, by executing channel hopping.  

References

Houle, K. J. and Weaver, G. M. 2001. Trends in Denial of Service Attack Technology. CERT Coordination Centre, Carnegie Melon University.

Benslimane, A., El Yakoubi, A. and Bouhourma, M. 2011. Analysis of Jamming effects on IEEE 802.11 Wireless Networks. IEEE International Conference on Communications Proceedings. 1-5.

Tague. P, Nabar, S, Ritcey. A. J, and Povendran, R. 2011. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection. IEEE/ACM Transactions On Networking. (19)1: 184-194.

Wu, H., Nabar, S. and Poovendran, R. 201. An Energy Framework for the Network Simulator 3 (ns-3). Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques. 222-230.

Misra, S., Dhurandher, S. K., Rayankula, A., Agrawal, D. 2010. Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks. Journal Computers and Electrical Engineering. 36(2): 367–382.

Heusse, M., Rousseau, F., Berger-Sabbatel, G. and Duda, Andrzej. 2003. Performance Anomaly of 802.11b. 22nd Annual Joint Conference of the IEEE Computer and Communications, IEEE Societes. 2: 836-843.

Bandyopadhyay, A., Vuppala, S. and Choudhury, P. 2011. A Simulation Analysis of Flooding Attack in MANET using NS-3. International Conference on Wireless VITAE, IEEE. 1-5.

Hamieh. A. 2012. POWJAM: A Power Reaction System against Jamming Attacks in Wireless Ad Hoc Networks. 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS). 9-11.

Xu, W., Ma, K., Trappe, W. and Zhang, Y. 2006. Jamming Sensor Networks: Attack and Defense Strategies. IEEE Network. 41–47.

Muraleedharan, R. and Osadciw, L. A. 2006. Jamming Attack Detection and Countermeasures In Wireless Sensor Network Using Ant System. Wireless Sensing And Processing, Proceedings Of the SPIE. 6248.

Network Security Lab, University of Washington (2012, May 10). NS-3 wireless jamming model [Online]. Available: http://www.nsnam.org/wiki/index.php/NS3_wireless_jamming_model.

Ikeda, M., Hiyama, M., Kulla, E., Barolli, L. and Takizawa, M. 2011. Multi-hop Wireless Networks Performance Evaluation via NS-3 Simulator. International Conference on Broadband and Wireless Computing, Communication and Applications, IEEE. 243-249.

Bayraktaroglu,E., King, C,. Liu,X., Noubir, G., Rajaraman, R. and Thapa, B. 2008. On The Performance of IEEE 802.11 under Jamming. The 27th Conference on Computer Communications. IEEE.

Qureshi, M. I., Khan, N. U., Rasli, A. M., & Zaman, K. 2015. The battle of health with environmental evils of Asian countries: promises to keep. Environmental Science and Pollution Research, 1-8.

Qureshi, M. I., Rasli, A. M., Awan, U., Ma, J., Ali, G., Alam, A.. & Zaman, K. 2014. Environment and air pollution: health services bequeath to grotesque menace. Enviromental Science and Pollution Research. 22(5): 3467-3476.

Downloads

Published

2015-12-11

How to Cite

THE EFFECT OF JAMMING ATTACK DETECTION AND MITIGATION ON ENERGY POWER CONSUMPTION (CASE STUDY IEEE 802.11 WIRELESS AD HOC NETWORK). (2015). Jurnal Teknologi, 77(22). https://doi.org/10.11113/jt.v77.6660