Jamming Attack on In-band Full-duplex Communications: Detection and Countermeasures

被引:22
作者
Hanawal, Manjesh K. [1 ]
Nguyen, Diep N. [2 ]
Krunz, Marwan [3 ]
机构
[1] Indian Inst Technol, IEOR Grp, Bombay 460076, Maharashtra, India
[2] UTS, FEIT, Sydney, NSW, Australia
[3] Univ Arizona, Dept ECE, Tucson, AZ 85721 USA
来源
IEEE INFOCOM 2016 - THE 35TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS | 2016年
关键词
GAMES;
D O I
10.1109/INFOCOM.2016.7524449
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent advances in the design of in-band full-duplex (IBFD) radios promise to double the throughput of a wireless link. However, IBFD-capable nodes are more vulnerable to jamming attacks than their out-of-band full-duplex (OBFD) counterparts, and any advantages offered by them over the OBFD nodes can be jeopardized by such attacks. A jammer needs to attack both the uplink and the downlink channels to completely break the communication link between two OBFD nodes. In contrast, he only needs to jam one channel (used for both uplink and downlink) in the case of two IBFD nodes. Even worse, a jammer with the IBFD capability can learn the transmitters' activity while injecting interference, allowing it to react instantly with the transmitter's strategies. In this paper, we investigate frequency hopping (FH) technique for countering jamming attacks in the context of IBFD wireless radios. Specifically, we develop an optimal strategy for IBFD radios to combat an "IBFD reactive sweep jammer". First, we introduce two operational modes for IBFD radios: transmission-reception and transmission-detection. These modes are intended to boost the anti-jamming capability of IBFD radios. We then jointly optimize the decision of when to switch between the modes and when to hop to a new channel using Markov decision processes. Numerical investigations show that our policy significantly improves the throughput of IBFD nodes under jamming attacks.
引用
收藏
页数:9
相关论文
共 20 条
[1]  
[Anonymous], [No title captured]
[2]  
[Anonymous], 2005, P 6 ACM INT S MOB AD, DOI DOI 10.1145/1062689.1062697
[3]  
Bayraktaroglu E, 2008, IEEE INFOCOM SER, P1939
[4]  
Bharadia D., 2013, P ACM SIGCOM 13 C HO
[5]  
Elliot E. O., 1977, BELL SYSTEM TECHNICA, V42
[6]  
Filar J., 1997, Competitive Markov Decision Processes
[7]  
Gollakota S., 2011, P ACM SIGCOMM 11 TOR
[8]   Understanding and mitigating the impact of RF interference on 802.11 networks [J].
Gummadi, Ramakrishna ;
Wetherall, David ;
Greenstein, Ben ;
Seshan, Srinivasan .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2007, 37 (04) :385-396
[9]  
Hanawal M. K., 2015, JAMMING ATTACK BAND
[10]  
Khattab S., 2008, P ACM SECURECOMM C I