Sie sind auf Seite 1von 6

Channel Surfing, Spatial Retreats, Temporal retreats:

Avoiding jammer in wireless network

Muhammad Faisal
Research seminar series,
School of Engineering Design and Technology, University of Bradford
M.F.Ismail@bradford.ac.uk

ABSTRACT security issue is the main technical barrier before


launching a new wireless network.
Wireless network consists of several nodes and
communicates through a shared medium making it The availability of the wireless devices makes the
vulnerable to attacks like Denial of Service (DoS). security issues more complicated. As these devices
DoS attacks are not easy to prevent due to lack of are cheaply available and are compatible with the
resources at the network nodes. Attackers can other technologies, the attackers can easily interfere
easily attack the network by either bypassing with the wireless devices by purchasing their own
MAC-layer protocol, or jamming the channel device. They can perform a variety of attacks like
through radio signal. This paper addresses the three launching false data into a wireless network, denial
techniques to prevent the network from DoS of service and even disturb the routing of the data.
attacks. The first technique, Channel Surfing, uses
There are a lot of mechanisms through which the
frequency hopping at the physical layer to escape
wireless network can be prevented from the
from the channel on which the network nodes are
attackers. Some mechanisms are basically
communicating. The second technique, Spatial
traditional techniques but in case of denial of
Retreats, involves isolating the network nodes
service attacks traditional mechanisms doesn’t
physically out of the DoS emitted area, and the
works. This paper basically focuses on the
only success to this technique is to decide where
techniques, talking in the wireless domain there are
the node should move and how to coordinate their
three techniques channel surfing, spatial retreats
movements. The third technique, jammed area
and temporal retreats. Each technique has its own
mapping, works on the strategy of copying, which
scenario to explain how to prevent DoS and what
finds and maps the jammed area. These techniques
are the measurements taken to secure the network.
help the nodes to communicate well in the
particular network and to protect the network from
the DoS attacks. This paper will put to test all these 2. Related Work
techniques in different scenarios and based on their
performance filters out the best. M Strasser [1] et al proposes in his work
uncoordinated Frequency Hopping (UFH) scheme
that breaks this dependency and develops major in
the presence of a communication jammer. . He
Key words discusses some problems about the jamming
resistant key establishment. This can be resolved by
Denial of Service (DoS), JAM, Mapping using some anti jamming techniques like
Frequency Hopping or Direct-Sequence Spread
Spectrum. It should support device communication
1. Introduction: during key organization and require that the device
With the evolution of technology, the world is now share a secret spreading key or code earlier to the
entered in to a wireless way of communication. In start of communication. This requirement creates a
the traditional wired networks there is less security circular dependency between anti-jamming spread-
and jamming issues. As wireless network devices spectrum communication and key establishment,
are made cheap and affordable for everyone, due to which has not been so far acknowledged.
which the security issues are increased. The Mishra[2] et al spotlight on the equality problem
for the uncoordinated deployments in his study et al explains the two defence strategies of jamming
“Distributed Channel Management in mitigation in the context of single and multi-radio
Uncoordinated Wireless Environments”. This wireless devices. They are proactive and reactive
problem is discussed from channel assignment channel hopping. In particular proactive or
outlook. His solution is based on the concept of periodic channel hopping has been studied more
channel-hopping technique temporal retreats, and extensively than reactive hopping. In the single-
meets all vital design considerations for control radio context, he created some theoretical models
methods in uncoordinated deployments. i.e is to examine the blocking probability for
disturbed in nature, nominal to zero coordination combinations of defence and assault strategies. In
among APs belonging to various hotspots, easy to multi-radio setting they devise jamming problem as
put into operation, and interoperable with existing max-min game and demonstrate by replication that
standards. In particular, we propose a specific the game result depend upon the payoff function.
algorithm called MAXchop, which functions Reactive defence provides better jamming
resourcefully when using only non over-lapping tolerance than proactive when considering
wireless channels, but is particularly effective in communication availability. Although when the
exploiting semi-overlapped channels. He also energy efficiency is measured both are almost
analyzes how this approach appreciates the equal. M.Li [6] et al adds by contemplating the
previously planned carrier sensing technique in energy efficiency by taking the idealized case of
providing future improved services. By wide accurate knowledge by both the jammer and the
spread simulations on real hotspot topologies and network about the strategy of one another, and the
evaluation for a complete implementation of this case where the jammer or the network lacks this
technique, illustration of the efficiency of this knowledge. The latent energy constraints of the
technique not only for equality but also for jammer and the network were also taken into
collective through put, metrics. Xu [3] et al consideration. It is extended over the problem of
explains escape strategy in her paper which is multiple observers and adaptable jamming
channel surfing. When radio device communicates transmission range and proposes an spontaneous
they work on one channel. When the opponent heuristic jamming strategy for that case. Woods et
comes in range and blocks the use of a certain al [7] also consider energy efficiency in his study
channel it is natural to move The idea of channel “DEEJAM: Defeating energy-efficient jamming in
surfing is motivated by a common physical layer IEEE 802.15. 4-based wireless Networks”. An
technique known as frequency hopping to another interrupt jamming attack is simple to perpetrate in
channel. Throughout this paper it is supposed that software using a MICAZ mote, is energy efficient
the opponent blasts a single channel at one time and stealthy for the jammer, and totally disorder the
and the opponent cannot play to be a valid member communication. Sheriff [8] et al In his study
of the network (i.e opponent does not hold any “Honeybees: Combining Replication and Evasion
right to use the keys used by the network device) for Mitigating Base-station jamming in Sensor
Alnifie [4] et al in his study presents a filtration Network “recommend Honey bees; an energy
protocol named MULEPRO (multi-channel aware defence structure against base-station
Exfiltration Protocol) a fully distributed network jamming attack in WSNs. Honeybees efficiently
based protocol designed to quickly ex-filtrate data combines imitation and avoidance to allow WSNs
from jammed area. MULEPRO aims at sensor to continue delivering data for a long time during a
network applications that require a fast response to jamming attack.
jamming denial of service (DoS) attacks. It works
automatically and at a fast pace assigning nodes to 3. Channel Surfing
different channels in the jammed area in order to
beat an attacker. MULEPRO is studied under The first technique that this paper presents is
various configurations and has the results that using channel surfing. As there is one common channel
channel hopping strategy, MULEPRO can ex- through which radio devices communicates the
filtrate data. attacker can easily block their communication, but
To increase the shortage of spectrum resources and to prevent the blockage another channel is use for
boost the anti-jamming performance a cognitive communication and is on the physical layer and is
frequency hopping mechanism is a solution of anti- known as frequency hopping. Our assumption is
jamming for multi jammers. Adaptive Frequency that the attacker can only attack a single channel at
hopping is not a good option because it cannot a time, and attacker cannot pretend to be a valid
distinguish between self-interference and member of the network (i.e. the adversary does not
interference from other wireless communication hold any authentication keys used by the network
system. Dynamic radio frequency interference is devices). [3, 11]
expected to occur in the situations related to
cognitive radio, where the networks and the devices
should reflect frequency agile operation. Sherif [5]
Ad Hoc Network

In the Ad hoc network, when attacker applies DoS,


as a result the part of the network to stop
communicating and can cause network partitioning.
Channel surfing then performs a special role and
will switch the network or a region of network to
the new clear channel and establish the
connectivity again. In order to use channel surfing
to address DoS for ad hoc networks, we assume
that each network device keeps a neighbour list. As
we are working in Ad hoc mode there is no
assumption that the device will going to inform its
neighbour. Also, during unhindered network
operation, we assume that no network partitions
arise due to network mobility. Figure 2 illustrates a
spatial retreat scenario in an ad hoc network)[3]

Figure 1: wireless Communication scenarios. (a) Two


party communication. (b) Infrastructured wireless
networks and (3) Ad hoc wireless networks. [3]

Two-Party Radio Communication

Taking in account the figure 1 (a) it is observed that


the opponents X1or X2 have broken the
communication between the parties A and B.
Requirement is that A and B adopt a new channel
for communication in order to avoid the intrusion
of X. For the sake of understanding the interference
or intrusion amid many channels so that A and B
can have a fresh channel. If the opponent is using
radio technology as the A and B then we need to Figure 2: Channel surfing for an ad hoc network
know how many orthogonal channels are there to consisting of dual radio devices
switch from. Another thing could be that the
opponent might not be using the same channel so 4. Spatial retreat:
then there a need to find how the other is
generating the jamming signals and then produce The second technique is spatial retreat, how it
fitting set of secure channel [3]. works is basically physically avoid the affected
area. What happens, when any network device
Infrastructured Network experiences interference it simply moves to the
clean area and is called spatial retreats.
Now contemplate infrastructure wireless network
as shown in the Figure 1 (b). In this case we have The main principle behind the spatial retreats is that
an access point APO with four wireless devices A, when ever any wireless devices are interfered with,
B, C and D connected with it. Two major situations they must move to a clear and fresh area. As most
for the turning down of the service against the of the wireless networks have the mobile users such
access points corresponding to opponents X1 and as mobile phones and laptops, spatial retreat is a
X0 are as follows: good technique to avoid interference. But the main
thing is that the users should know where to move
In the first case opponent Xo interferes with APO, and how will they communicate with their
A, B and C leaving the D due to the fact it is movement.[3]
outside the Xo’s radio range. In the second case
opponent X1 interferes with the A and B leaving
aside APO or any other nodes. The major
difference between the two cases one has blocked
the access point from the opponents while the other
does not. [3]
Ad Hoc Network

When discussing about the Ad hoc network in the


context of spatial retreats it’s not easy. If we apply
special retreat technique on the Ad hoc network
it’s very difficult to maintain the connectivity
between the nodes as they are not involved in
initiating communication but also involved in data
forwarding. In case of DoS attacks the nodes
should move away and go to the safe and clear
region and during this it is very difficult to maintain
Figure 3: The spatial retreat strategy for a two-party the network connectivity as it become more week
Communication scenario. The region depicted by the
as the node move away. Figure 4 illustrates a
dotted line is the interference range of the attacker. [3]
spatial retreat scenario in an ad hoc network. [3,11]
Two-Party Radio Communication

Consider the two party radio communications for


the case of spatial retreats. The Figure 3 describes
that the attacker X interfere with both A and B so
they cannot communicate. What spatial retreat is
basically when the nodes A and B detects the
interference they will simply try to move away
from the attacker. As A and B cannot communicate
with each other so far they are in attacker’s range,
so it is difficult to decide where to move and how
far they should move. Both parties must agree on
the direction of retreat and how far they should
retreat. Even if they leave the attacker’s region, it is
not a surety that the node A and B are within each
other’s range because of the synchronization error Figure 4: Scenarios for spatial retreat strategies in an ad
and the irregularity of interference region. [3] hoc network setting. The adversary is marked by X.

Infrastructured Network 5. Temporal retreat:


Temporal retreat is a mechanism in which it is
Let discuss about infrastructure wireless networks.
rationally changing the jamming area by changing
Consider there are many access points AP0, AP1.....
the channel order on which a node communicates.
APN and they are connected through each other.
It gives an impression to the opponent that the node
Wireless device A is connected to the access point
is no more present on the same channel and hence
and communicates with other devices and uses
moves back without any physical movement.
internet using the APs. As discussed before that the
Attacker can block the communication of the MULEPRO[4] short for Multi-channel Exfiltration
access point or can prevent the nodes to Protocol, a technique that gives an effective and
communicate with the access point or can do both healthy to a jamming based DoS attack.
at a time. Spatial retreat is basically a technique MULEPRO is designed to swiftly ex-filtrate sense
through which the mentioned three situations can or data from an attacked area to the areas or regions
be solved. What the nodes have to do, if they faces that are not under assault. This type of response is
any interference from the attacker they should suitable for many sense or network applications,
move away from that region and reconnect with the such as perimeter and infrastructure defence
other access point of the safe region. As we systems, battlefield sensing systems, or homeland
already know that the access points have the fixed security systems.
architecture so they do not participate in the spatial
retreat mechanism only nodes will move and MULEPRO’s starting point is to guess that network
connect. All of these three situations can only be nodes are operating in a standard mode. During
solved by an appropriate DoS technique, what regular operation each node does its customary
should be done is to assign each node with application unambiguous tasks, such as sensing the
emergency access point list and the nodes should environment, relaying multi-hop packets and
know where to move to get its emergency access supervising sleep cycles. Each node can separately
point. [3] determine that it is being subjected to a jamming
attack. Upon decisive that a jamming assault is in
progress, the node switches from regular operation
to exfiltration mode. The function of each boundary Note: how it is representing the scheduling
node is to pass along data from the exfiltration problem’s constraint and therefore will be used as
region. an input parameter in the paper suggested solution
in the next section. Ex, on the other hand,
Data Ex-filtration Framework: The MULEPRO represents the problem’s obligation and therefore
scheduling problem can be stated as follows: Let J will be the resulted output of the proposed
shows the set of jammed nodes (a finite subset of scheduling algorithm.
the set of network nodes N) and γ represents the
number of jammed channels, the development
problem is then to find an assignment A: J → ((Γ +
1) − γ) which maximizes the use of instantaneous 6. Conclusion
channels for the reason data ex-filtration from a The communication between the radio devices is
jammed area. To avoid intolerable interference through the shared medium so it is very easy for the
from hidden or exposed terminal problems
attackers to get in to their communication region
channels assigned to each couple of nodes must be
different over a two-hop distance. The crisis and block communication. This paper basically
constraints and needs can be represented by the described the three affective techniques to avoid
interference matrix and the channel assignment jamming attacks. The main reason for describing
matrix. These main parameters of the problem are these techniques is to aware wireless users to avoid
discussed in more detail below. interference as much as they can because there is
no cure for attackers. As the first technique
The Interference Matrix, In
describes how to get rid of the attackers by
It is defined as the Interference Matrix In as an N × changing your channel, where as the second
N binary matrix, which keeps a close check of all technique tell how to change your location out of
probable intrusion between nodes. The values in the attacker’s range without disturbing their
this matrix are considered constant with time since connectivity. Finally the last strategy is basically
we presume a stagnant network model. In deciding about the changing of the channel order on which
the interference range, we follow the two-hop the devices communicate that is a good trick as the
distance as explained in [9]. According to [9], the
two-hop distance is a good rough calculation of the attacker thinks that device is no longer on that
carrier sensing range in ad hoc networks, and node channel. In every technique there are special
activation scheduling usually requires all scenarios with special kind of network architecture.
neighbours of a node within two hops to be silent Where as in the case of temporal retreats there is a
when the node transmits. Therefore, in special algorithm to avoid interference.
construction, assign an element in ij the value 1
only if the two nodes i and node j are within two-
hop distance from each other. The problem of
creating is now equivalent to a distance-2 vertex
colouring problem [10].

The Exfiltration Matrix, Ex

This matrix contains the exfiltration protocol


channel assignment and is dynamically created
when the network switches to exfiltration mode. In
a network with J jammed nodes and Γ accessible
channels, the exfiltration matrix Ex is the J ×Γ
binary matrix which includes the existing channel
assignments to be used by a jammed node in
exfiltrating data to the un-jammed section. The
elements Exij of Ex are binary values according to
the rule:
Exti
j = 1, if channel i is assigned to node j
7. References:
in the current time slot t [1] M.Strasser “Jamming-Resistant key
Exti Establishment Using Uncoordinated Frequency
j = 0, if channel i is not assigned node Hopping”,2008
j in the current time slot t
[2] A Mishra,V.Shrivastava, D Agarwal, S
Banerjee, S Ganguly.”Distributed Channel
Management in Uncoordinated Wireless
Environment”

[3] W. Xu, T. Wood, W. Trappe, and Y. Zhang,


“Channel surfing and spatial retreats: defenses
against wireless denial of service,” in Proc. of
WiSe, 2004,
[4] G. Alnifie, R.Simon,”A multi-channel defence
against jamming attacks in wireless sensor
networks”

[5] S.Khattab, D Moss’e, R Melhem,”Jamming


mitigation in multi-radio wireless networks:
reactive or proactive?”, 2008

[6] M.Li, I. Koutsopoulos, and R.Pooverdran”


Opical Jamming Attacks and Network Defence”

[7] A.D.Wood, JA.Stankovic, and


G.Zhou,”DEEJAM:Defeating Energy-Efficient
Jamming in IEEE 802.15

[8] S.Khattab,D. Moss’e, and R Melhem.”I


Loneybees: Combining Relication and Evasion for
Mitigating Base-station Jamming in sensor
networks”,2006

[9] K.W Reese and A.Salem,”A Survey on


jamming avoidance in adhoc sensory networks”

[10] K.Mahadevan, S.Hong, and J Dullum”Anti-


Jamming A Study”,2005

[11] W. Xu, W. Trappe, and Y. Zhang , “Channel


Surfing: Defending Wireless Sensor Networks from
Interference

Das könnte Ihnen auch gefallen