Detection of Jamming Attacks in Mobile Ad Hoc Networks using Statistical Process Control

被引:9
作者
El Houssaini, Mohammed-Alamine [1 ]
Aaroud, Abdessadek [1 ]
El Hore, Ali [1 ]
Ben-Othman, Jalel [2 ]
机构
[1] Chouaib Doukkali Univ, Fac Sci, Dept Comp Sci, El Jadida, Morocco
[2] Univ Paris 13, Galilee Inst, Dept Comp Sci, Paris, France
来源
7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS | 2016年 / 83卷
关键词
Mobile ad hoc network; IEEE; 802.11; Jamming attack; Statistical process control;
D O I
10.1016/j.procs.2016.04.095
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A mobile ad hoc network is a group of mobile hosts that depends on wireless network interfaces with no use of fixed infrastructure or centralized administration. The main equipments of a mobile station are wireless transmitters/ receivers. In this respect, the network can be seen as random chart because of the nodes 'movement. The change of network topology relies on time when nodes move or adjust their transmission and reception parameters. The design of these networks is characterized by its vulnerability to denial of service attacks ( DOS). Thus, it is very challenging. In this paper, the focus lies on a special kind of denial of service attacks called Jamming. Indeed, stations in a mobile ad hoc network share a wireless medium. Therefore, a radio signal can be jammed or interfered, which leads to the corruption and loss of the message. In this study, we suggest a new method of detection of that predictable attack by the application of the statistical process control (SPC). The SPC can be the key element of the detection of jamming attack, applied on the packet drop ratio (PDR) which refers as the number of dropped packets to the total of packets sent. The assimilation of this metric shows the nonconforming fraction. As we evaluated the performance, we substantiate that the control chart for fraction nonconforming based on the PDR detects the jamming attack in a real time by a visual graph. (C) 2016 The Authors. Published by Elsevier B.V.
引用
收藏
页码:26 / 33
页数:8
相关论文
共 12 条
[1]  
Aad I., 2004, PROC 10 ANN INT C MO
[2]  
Bai F., 2004, WIRELESS AD HOC SENS
[3]   A tool for automating network simulation and processing tracing data files [J].
Bouras, Christos ;
Charalambides, Savvas ;
Drakoulelis, Michalis ;
Kioumourtzis, Georgios ;
Stamos, Kostas .
SIMULATION MODELLING PRACTICE AND THEORY, 2013, 30 :90-110
[4]  
Douglas Montgomery C., 2008, INTRO STAT QUALITY C
[5]  
Hamieh A., 2009, IEEE INT C COMMUNICA, P1
[6]  
IEEE Standards Association, 2012, 80211 IEEE, P818
[7]  
Information Sciences Institute, 1995, NETWORK SIMULATOR NS
[8]  
Ju KS, 2012, INT J SECUR APPL, V6, P149
[9]  
Pillet M., APPLIQUER MAITRISE S
[10]  
Salleh Aliff Umair, 2006, 4 STUD C RES DEV SCO