Self-healing wireless networks under insider jamming attacks

Longquan Li, Sencun Zhu, Don Torrieri, Sushil Jajodia

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

As jamming is a very serious threat to the normal operation of wireless networks, recently much research has been done to deal with it. Different from most existing research, In this work, we tackle the jamming attack problem in a systematic way. Specifically, we design a protocol that is capable of self-healing wireless networks under jamming attacks. The protocol identifies and excludes an insider jammer and then restores normal data communications among benign nodes despite the presence of jamming by an initially unknown compromised node. Our scheme integrates key management, jammer identification and jammer isolation in one system. We evaluated the protocol with USRP devices and GNURadio in the context of jammer localization. The experiments show that our protocol can identify and isolate the insider jammer with high accuracy.

Original languageEnglish (US)
Title of host publication2014 IEEE Conference on Communications and Network Security, CNS 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages220-228
Number of pages9
ISBN (Electronic)9781479958900
DOIs
StatePublished - Dec 23 2014
Event2014 IEEE Conference on Communications and Network Security, CNS 2014 - San Francisco, United States
Duration: Oct 29 2014Oct 31 2014

Publication series

Name2014 IEEE Conference on Communications and Network Security, CNS 2014

Other

Other2014 IEEE Conference on Communications and Network Security, CNS 2014
CountryUnited States
CitySan Francisco
Period10/29/1410/31/14

Fingerprint

Jamming
Wireless networks
Network protocols
Communication
Experiments

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Cite this

Li, L., Zhu, S., Torrieri, D., & Jajodia, S. (2014). Self-healing wireless networks under insider jamming attacks. In 2014 IEEE Conference on Communications and Network Security, CNS 2014 (pp. 220-228). [6997489] (2014 IEEE Conference on Communications and Network Security, CNS 2014). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/CNS.2014.6997489
Li, Longquan ; Zhu, Sencun ; Torrieri, Don ; Jajodia, Sushil. / Self-healing wireless networks under insider jamming attacks. 2014 IEEE Conference on Communications and Network Security, CNS 2014. Institute of Electrical and Electronics Engineers Inc., 2014. pp. 220-228 (2014 IEEE Conference on Communications and Network Security, CNS 2014).
@inproceedings{2cf5ebacc9794bd4957a7c6b37783c36,
title = "Self-healing wireless networks under insider jamming attacks",
abstract = "As jamming is a very serious threat to the normal operation of wireless networks, recently much research has been done to deal with it. Different from most existing research, In this work, we tackle the jamming attack problem in a systematic way. Specifically, we design a protocol that is capable of self-healing wireless networks under jamming attacks. The protocol identifies and excludes an insider jammer and then restores normal data communications among benign nodes despite the presence of jamming by an initially unknown compromised node. Our scheme integrates key management, jammer identification and jammer isolation in one system. We evaluated the protocol with USRP devices and GNURadio in the context of jammer localization. The experiments show that our protocol can identify and isolate the insider jammer with high accuracy.",
author = "Longquan Li and Sencun Zhu and Don Torrieri and Sushil Jajodia",
year = "2014",
month = "12",
day = "23",
doi = "10.1109/CNS.2014.6997489",
language = "English (US)",
series = "2014 IEEE Conference on Communications and Network Security, CNS 2014",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "220--228",
booktitle = "2014 IEEE Conference on Communications and Network Security, CNS 2014",
address = "United States",

}

Li, L, Zhu, S, Torrieri, D & Jajodia, S 2014, Self-healing wireless networks under insider jamming attacks. in 2014 IEEE Conference on Communications and Network Security, CNS 2014., 6997489, 2014 IEEE Conference on Communications and Network Security, CNS 2014, Institute of Electrical and Electronics Engineers Inc., pp. 220-228, 2014 IEEE Conference on Communications and Network Security, CNS 2014, San Francisco, United States, 10/29/14. https://doi.org/10.1109/CNS.2014.6997489

Self-healing wireless networks under insider jamming attacks. / Li, Longquan; Zhu, Sencun; Torrieri, Don; Jajodia, Sushil.

2014 IEEE Conference on Communications and Network Security, CNS 2014. Institute of Electrical and Electronics Engineers Inc., 2014. p. 220-228 6997489 (2014 IEEE Conference on Communications and Network Security, CNS 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Self-healing wireless networks under insider jamming attacks

AU - Li, Longquan

AU - Zhu, Sencun

AU - Torrieri, Don

AU - Jajodia, Sushil

PY - 2014/12/23

Y1 - 2014/12/23

N2 - As jamming is a very serious threat to the normal operation of wireless networks, recently much research has been done to deal with it. Different from most existing research, In this work, we tackle the jamming attack problem in a systematic way. Specifically, we design a protocol that is capable of self-healing wireless networks under jamming attacks. The protocol identifies and excludes an insider jammer and then restores normal data communications among benign nodes despite the presence of jamming by an initially unknown compromised node. Our scheme integrates key management, jammer identification and jammer isolation in one system. We evaluated the protocol with USRP devices and GNURadio in the context of jammer localization. The experiments show that our protocol can identify and isolate the insider jammer with high accuracy.

AB - As jamming is a very serious threat to the normal operation of wireless networks, recently much research has been done to deal with it. Different from most existing research, In this work, we tackle the jamming attack problem in a systematic way. Specifically, we design a protocol that is capable of self-healing wireless networks under jamming attacks. The protocol identifies and excludes an insider jammer and then restores normal data communications among benign nodes despite the presence of jamming by an initially unknown compromised node. Our scheme integrates key management, jammer identification and jammer isolation in one system. We evaluated the protocol with USRP devices and GNURadio in the context of jammer localization. The experiments show that our protocol can identify and isolate the insider jammer with high accuracy.

UR - http://www.scopus.com/inward/record.url?scp=84921475848&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84921475848&partnerID=8YFLogxK

U2 - 10.1109/CNS.2014.6997489

DO - 10.1109/CNS.2014.6997489

M3 - Conference contribution

T3 - 2014 IEEE Conference on Communications and Network Security, CNS 2014

SP - 220

EP - 228

BT - 2014 IEEE Conference on Communications and Network Security, CNS 2014

PB - Institute of Electrical and Electronics Engineers Inc.

ER -

Li L, Zhu S, Torrieri D, Jajodia S. Self-healing wireless networks under insider jamming attacks. In 2014 IEEE Conference on Communications and Network Security, CNS 2014. Institute of Electrical and Electronics Engineers Inc. 2014. p. 220-228. 6997489. (2014 IEEE Conference on Communications and Network Security, CNS 2014). https://doi.org/10.1109/CNS.2014.6997489