Self-healing wireless networks under insider jamming attacks

Longquan Li, Sencun Zhu, Don Torrieri, Sushil Jajodia

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Abstract

As jamming is a very serious threat to the normal operation of wireless networks, recently much research has been done to deal with it. Different from most existing research, In this work, we tackle the jamming attack problem in a systematic way. Specifically, we design a protocol that is capable of self-healing wireless networks under jamming attacks. The protocol identifies and excludes an insider jammer and then restores normal data communications among benign nodes despite the presence of jamming by an initially unknown compromised node. Our scheme integrates key management, jammer identification and jammer isolation in one system. We evaluated the protocol with USRP devices and GNURadio in the context of jammer localization. The experiments show that our protocol can identify and isolate the insider jammer with high accuracy.

Original languageEnglish (US)
Title of host publication2014 IEEE Conference on Communications and Network Security, CNS 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages220-228
Number of pages9
ISBN (Electronic)9781479958900
DOIs
StatePublished - Dec 23 2014
Event2014 IEEE Conference on Communications and Network Security, CNS 2014 - San Francisco, United States
Duration: Oct 29 2014Oct 31 2014

Publication series

Name2014 IEEE Conference on Communications and Network Security, CNS 2014

Other

Other2014 IEEE Conference on Communications and Network Security, CNS 2014
Country/TerritoryUnited States
CitySan Francisco
Period10/29/1410/31/14

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Self-healing wireless networks under insider jamming attacks'. Together they form a unique fingerprint.

Cite this