BloodHound: Early Detection and Identification of Jamming at the PHY-layer

被引:7
作者
Alhazbi, Saeif [1 ]
Sciancalepore, Savio [2 ]
Oligeri, Gabriele [1 ]
机构
[1] Hamad Bin Khalifa Univ HBKU, Coll Sci & Engn CSE, Div Informat & Comp Technol ICT, Doha, Qatar
[2] Eindhoven Univ Technol, Eindhoven, Netherlands
来源
2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC | 2023年
关键词
Jamming Detection; Machine Learning for Security; Mobile Security; WIRELESS; NETWORKS; ATTACKS;
D O I
10.1109/CCNC51644.2023.10059878
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Traditional jamming detection techniques, adopted in static networks, require the receiver (under jamming) to infer the presence of the jammer by measuring the effects of the jamming activity (packet loss and received signal strength), thus resulting only in a-posteriori analysis. However, in mobile scenarios, receivers (e.g., drones, vehicles, etc.) typically experience an increasing jamming effect while moving toward the jamming source. This phenomenon allows, in principle, an early detection of the jamming activity-being the communication not yet affected by the jamming (no packet loss). Under such an assumption, the mobile receiver can take an informed decision before losing the radio connection with the other party. To the best of our knowledge, this paper represents the first attempt toward the detection of a jammer before the radio link is fully affected by its activity. The proposed solution, namely, BloodHound, can early detect the approach to a jammer in a mobile scenario, i.e., before losing the capability of communicating, thus enhancing situational awareness and robustness. We performed an extensive measurement campaign, and we proved our solution to be able to detect the presence of a jammer with an accuracy higher than 0.99 even when the bit error rate is less than 0.01 (early detection), by varying several configuration parameters of the scenario.
引用
收藏
页数:9
相关论文
共 26 条
[1]  
Alhazbi Saeif, 2022, Zenodo
[2]  
Arjoune Y, 2020, 2020 34TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2020), P459, DOI [10.1109/icoin48656.2020.9016462, 10.1109/ICOIN48656.2020.9016462]
[3]  
Cakiroglu Murat., 2008, InfoScale '08: Proceedings of the 3rd international conference on Scalable information systems, P1
[4]   Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks [J].
Chiang, Jerry T. ;
Hu, Yih-Chun .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2011, 19 (01) :286-298
[5]   GopJam: Key-less jamming mitigation via gossiping [J].
Di Pietro, Roberto ;
Oligeri, Gabriele .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 123 :57-68
[6]  
Ettus Research, 2020, USRP X310
[7]   Jammer Classification in GNSS Bands Via Machine Learning Algorithms [J].
Ferre, Ruben Morales ;
de la Fuente, Alberto ;
Lohan, Elena Simona .
SENSORS, 2019, 19 (22)
[8]   Jammer Detection based on Artificial Neural Networks: A Measurement Study [J].
Gecgel, Selen ;
Goztepe, Caner ;
Kurt, Gunes Karabulut .
PROCEEDINGS OF THE 2019 ACM WORKSHOP ON WIRELESS SECURITY AND MACHINE LEARNING (WISEML '19), 2019, :43-48
[9]   Jamming and anti-jamming techniques in wireless networks: a survey [J].
Grover, Kanika ;
Lim, Alvin ;
Yang, Qing .
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2014, 17 (04) :197-215
[10]  
Liu DG, 2012, IEEE INT CONF MOB, P335, DOI 10.1109/MASS.2012.6502533