THE EFFECT OF JAMMING ATTACK DETECTION AND MITIGATION ON ENERGY POWER CONSUMPTION (CASE STUDY IEEE 802.11 WIRELESS AD HOC NETWORK)
DOI:
https://doi.org/10.11113/jt.v77.6660Keywords:
Quality of Service, jamming, energy consumption, channel hoppingAbstract
Quality of Service for data traffic is an important facet of a network, which in the case of a wireless network can easily be disrupted by applying a device to broadcast signals. The authors believe that the increased of the energy consumption, when a jamming attack occurs, can be used as a guiding indicator in order to mitigate the attack. The authors show that when a reactive jamming attack occurs on a wireless network unmitigated, it can easily block the entire data traffic to the point there is no data can be delivered. The authors also show that, using NS3 simulation, in an event where a reactive jamming attack to the network happened, the source of the attack can be identified through the increased of energy consumption , and successfully mitigated by avoiding sending data traffic through the same channel used by the attacker, by executing channel hopping. Â
References
Houle, K. J. and Weaver, G. M. 2001. Trends in Denial of Service Attack Technology. CERT Coordination Centre, Carnegie Melon University.
Benslimane, A., El Yakoubi, A. and Bouhourma, M. 2011. Analysis of Jamming effects on IEEE 802.11 Wireless Networks. IEEE International Conference on Communications Proceedings. 1-5.
Tague. P, Nabar, S, Ritcey. A. J, and Povendran, R. 2011. Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection. IEEE/ACM Transactions On Networking. (19)1: 184-194.
Wu, H., Nabar, S. and Poovendran, R. 201. An Energy Framework for the Network Simulator 3 (ns-3). Proceedings of the 4th International ICST Conference on Simulation Tools and Techniques. 222-230.
Misra, S., Dhurandher, S. K., Rayankula, A., Agrawal, D. 2010. Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks. Journal Computers and Electrical Engineering. 36(2): 367–382.
Heusse, M., Rousseau, F., Berger-Sabbatel, G. and Duda, Andrzej. 2003. Performance Anomaly of 802.11b. 22nd Annual Joint Conference of the IEEE Computer and Communications, IEEE Societes. 2: 836-843.
Bandyopadhyay, A., Vuppala, S. and Choudhury, P. 2011. A Simulation Analysis of Flooding Attack in MANET using NS-3. International Conference on Wireless VITAE, IEEE. 1-5.
Hamieh. A. 2012. POWJAM: A Power Reaction System against Jamming Attacks in Wireless Ad Hoc Networks. 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS). 9-11.
Xu, W., Ma, K., Trappe, W. and Zhang, Y. 2006. Jamming Sensor Networks: Attack and Defense Strategies. IEEE Network. 41–47.
Muraleedharan, R. and Osadciw, L. A. 2006. Jamming Attack Detection and Countermeasures In Wireless Sensor Network Using Ant System. Wireless Sensing And Processing, Proceedings Of the SPIE. 6248.
Network Security Lab, University of Washington (2012, May 10). NS-3 wireless jamming model [Online]. Available: http://www.nsnam.org/wiki/index.php/NS3_wireless_jamming_model.
Ikeda, M., Hiyama, M., Kulla, E., Barolli, L. and Takizawa, M. 2011. Multi-hop Wireless Networks Performance Evaluation via NS-3 Simulator. International Conference on Broadband and Wireless Computing, Communication and Applications, IEEE. 243-249.
Bayraktaroglu,E., King, C,. Liu,X., Noubir, G., Rajaraman, R. and Thapa, B. 2008. On The Performance of IEEE 802.11 under Jamming. The 27th Conference on Computer Communications. IEEE.
Qureshi, M. I., Khan, N. U., Rasli, A. M., & Zaman, K. 2015. The battle of health with environmental evils of Asian countries: promises to keep. Environmental Science and Pollution Research, 1-8.
Qureshi, M. I., Rasli, A. M., Awan, U., Ma, J., Ali, G., Alam, A.. & Zaman, K. 2014. Environment and air pollution: health services bequeath to grotesque menace. Enviromental Science and Pollution Research. 22(5): 3467-3476.
Downloads
Published
Issue
Section
License
Copyright of articles that appear in Jurnal Teknologi belongs exclusively to Penerbit Universiti Teknologi Malaysia (Penerbit UTM Press). This copyright covers the rights to reproduce the article, including reprints, electronic reproductions, or any other reproductions of similar nature.