Mitigating jamming attacks in mobile cognitive networks through time hopping

被引:7
|
作者
Adem, Nadia [1 ]
Hamdaoui, Bechir [1 ]
Yavuz, Attila [1 ]
机构
[1] Oregon State Univ, Sch Elect Engn & Comp Sci, Corvallis, OR 97331 USA
来源
基金
美国国家科学基金会;
关键词
jamming attacks; time hopping; frequency hopping; mobile cognitive networks; GAME;
D O I
10.1002/wcm.2745
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
5G wireless networks will support massive connectivity mainly due to device-to-device communications. An enabling technology for device-to-device links is the dynamical spectrum access. The devices, which are equipped with cognitive radios, are to be allowed to reuse spectrum occupied by cellular links. The dynamical spectrum availability makes cognitive users switch between channels. Switching leads to energy consumption, latency, and communication overhead in general. The performance degrades even more when the network is under jamming attack. This type of attack is one of the most detrimental attacks. Addressing jamming while maintaining a desired quality of service is a challenge. While existing anti-jamming mechanisms assume stationary users, in this paper, we propose and evaluate countermeasures for mobile cognitive users. We propose two time-based techniques, which, unlike other existing frequency-based techniques, do not assume accessibility to multiple channels and hence do not rely on switching to countermeasure jamming. We achieve analytical solutions of jamming, switching, and error probabilities. Based on our findings, the proposed techniques out perform other existing frequency-based techniques. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:3004 / 3014
页数:11
相关论文
共 50 条
  • [31] Mitigating Wormhole Attacks using Passive Monitoring in Mobile Ad Hoc Networks
    Su, Xu
    Boppana, Rajendra V.
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [32] A crowd cooperative defense model for mitigating DDoS attacks in Mobile Crowdsensing networks
    Zhao, Guosheng
    Gao, Ming
    Wang, Jian
    COMPUTER COMMUNICATIONS, 2023, 207 : 150 - 163
  • [33] Mitigating DDoS Attacks using Protection Nodes in Mobile Ad Hoc Networks
    Xiang, Minda
    Chen, Yu
    Ku, Wei-Shinn
    Su, Zhou
    2011 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE (GLOBECOM 2011), 2011,
  • [34] Mitigating Jamming and Meaconing Attacks Using Direct GPS Positioning
    Ng, Yuting
    Gao, Grace Xingxin
    PROCEEDINGS OF THE 2016 IEEE/ION POSITION, LOCATION AND NAVIGATION SYMPOSIUM (PLANS), 2016, : 1021 - 1026
  • [35] Mitigating RF jamming attacks at the physical layer with machine learning
    Jacovic, Marko
    Rey, Xaime Rivas
    Mainland, Geoffrey
    Dandekar, Kapil R.
    IET COMMUNICATIONS, 2023, 17 (01) : 12 - 28
  • [36] Detecting Data Tampering Attacks in Synchrophasor Networks using Time Hopping
    Aman, Muhammad Naveed
    Javed, Kashif
    Sikdar, Biplab
    Chua, Kee Chaing
    2016 IEEE PES INNOVATIVE SMART GRID TECHNOLOGIES CONFERENCE EUROPE (ISGT-EUROPE), 2016,
  • [37] Selective Jamming Attacks in Wireless Networks
    Proano, Alejandro
    Lazos, Loukas
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [38] MITIGATION OF JAMMING ATTACKS IN WIRELESS NETWORKS
    Dorus, R.
    Vinoth, P.
    2013 IEEE INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN COMPUTING, COMMUNICATION AND NANOTECHNOLOGY (ICE-CCN'13), 2013, : 168 - 171
  • [39] Detection of Jamming Attacks in Mobile Ad Hoc Networks using Statistical Process Control
    El Houssaini, Mohammed-Alamine
    Aaroud, Abdessadek
    El Hore, Ali
    Ben-Othman, Jalel
    7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 : 26 - 33
  • [40] Application of the Learning Set for the Detection of Jamming Attacks in 5G Mobile Networks
    Kouassi, Brou Medard
    Monsan, Vincent
    Ballo, Abou Bakary
    Ayikpa, Kacoutchy Jean
    Mamadou, Diarra
    Adou, Kablan Jerome
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 715 - 723