ABSTRACT
In this paper we consider the problem of designing a medium access control (MAC) protocol for single-hop wireless networks that is provably robust against adaptive adversarial jamming. The wireless network consists of a set of honest and reliable nodes that are within the transmission range of each other. In addition to these nodes there is an adversary. The adversary may know the protocol and its entire history and use this knowledge to jam the wireless channel at will at any time. It is allowed to jam a (1-epsilon)-fraction of the time steps, for an arbitrary constant epsilon>0, but it has to make a jamming decision before it knows the actions of the nodes at the current step. The nodes cannot distinguish between the adversarial jamming or a collision of two or more messages that are sent at the same time. We demonstrate, for the first time, that there is a local-control MAC protocol requiring only very limited knowledge about the adversary and the network that achieves a constant throughput for the non-jammed time steps under any adversarial strategy above. We also show that our protocol is very energy efficient and that it can be extended to obtain a robust and efficient protocol for leader election and the fair use of the wireless channel.
- G. Alnifie and R. Simon. A multi-channel defense against jamming attacks in wireless sensor networks. In Proc. of Q2SWinet '07, pages 95--104, 2007. Google ScholarDigital Library
- E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, and B. Thapa. On the performance of ieee 802.11 under jamming. In Proc. of IEEE Infocom '08, page 1265, 2008.Google ScholarCross Ref
- Michael A. Bender, Martin Farach-Colton, Simai He, Bradley C. Kuszmaul, and Charles E. Leiserson. Adversarial contention resolution for simple channels. In Proc. of SPAA '05, pages 325--332, 2005. Google ScholarDigital Library
- T. Brown, J. James, and A. Sethi. Jamming and sensing of encrypted wireless ad hoc networks. In Proc. of MobiHoc '06, pages 120--130, 2006. Google ScholarDigital Library
- J.T. Chiang and Y.-C. Hu. Cross-layer jamming detection and mitigation in wireless broadcast networks. In Proc. of MobiCom '07, pages 346--349, 2007. Google ScholarDigital Library
- Bogdan S. Chlebus, Dariusz R. Kowalski, and Mariusz A. Rokicki. Adversarial queuing on the multiple-access channel. In Proc. of PODC '06, pages 92--101, 2006. Google ScholarDigital Library
- A. Czumaj and W. Rytter. Broadcasting algorithms in radio networks with unknown topology. Journal of Algorithms, 60(2):115 -- 143, 2006. Google ScholarDigital Library
- S. Gilbert, R. Guerraoui, and C. Newport. Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks. In Proc. of OPODIS '06, 2006. Google ScholarDigital Library
- Leslie Ann Goldberg, Philip D. Mackenzie, Mike Paterson, and Aravind Srinivasan. Contention resolution with constant expected delay. Journal of the ACM, 47(6):1048--1096, 2000. Google ScholarDigital Library
- Johan Hastad, Tom Leighton, and Brian Rogoff. Analysis of backoff protocols for mulitiple accesschannels. SIAM Journal on Computing, 25(4):740--774, 1996. Google ScholarDigital Library
- IEEE. Medium access control (MAC) and physical specifications. In IEEE P802.11/D10, 1999.Google Scholar
- C.Y. Koo, V. Bhandari, J. Katz, and N.H. Vaidya. Reliable broadcast in radio networks: The bounded collision case. In Proc. of PODC '06, 2006. Google ScholarDigital Library
- K. Kothapalli, C. Scheideler, M. Onus, and A. Richa. Constant density spanners for wireless ad hoc networks. In Proc. of SPAA '05, pages 116--125, 2005. Google ScholarDigital Library
- Fabian Kuhn, Thomas Moscibroda, and Roger Wattenhofer. Radio Network Clustering from Scratch. In Proc. of ESA '04, 2004.Google ScholarCross Ref
- Byung-Jae Kwak, Nah-Oak Song, and Leonard E. Miller. Performance analysis of exponential backoff. IEEE/ACM Transactions on Networking, 13(2):343--355, 2005. Google ScholarDigital Library
- Y.W. Law, L. van Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols. In Proc. of SASN '05, pages 76--88, 2005. Google ScholarDigital Library
- M. Li, I. Koutsopoulos, and R. Poovendran. Optimal jamming attacks and network defense policies in wireless sensor networks. In Proc. of Infocom '07, pages 1307--1315, 2007.Google ScholarDigital Library
- Xin Liu, Guevara Noubir, Ravi Sundaram, and San Tan. Spread: Foiling smart jammers using multi-layer agility. In Proc. of Infocom '07, pages 2536--2540, 2007.Google ScholarDigital Library
- Vishnu Navda, Aniruddha Bohra, Samrat Ganguly, and Dan Rubenstein. Using channel hopping to increase 802.11 resilience to jamming attacks. In Proc. of Infocom '07, pages 2526--2530, 2007.Google ScholarDigital Library
- R. Negi and A. Perrig. Jamming analysis of MAC protocols. Technical report, Carnegie Mellon University, 2003.Google Scholar
- A. Pelc and D. Peleg. Feasibility and complexity of broadcasting with random transmission failures. In Proc. of PODC '05, 2005. Google ScholarDigital Library
- Prabhakar Raghavan and Eli Upfal. Stochastic contention resolution with short delays. SIAM Journal on Computing, 28(2):709--719, 1999. Google ScholarDigital Library
- J. Schmidt, A. Siegel, and A. Srinivasan. Chernoff-Hoeffding bounds for applications with limited independence. SIAM Journal on Discrete Mathematics, 8(2):223--250, 1995. Google ScholarDigital Library
- M. K. Simon, J. K. Omura, R. A. Schultz, and B. K. Levin. Spread Spectrum Communications Handbook. McGraw-Hill, 2001. Google ScholarDigital Library
- David Thuente and Mithun Acharya. Intelligent jamming in wireless networks with applications to 802.11b and other networks. In Proc. of MILCOM '06, 2006. Google ScholarDigital Library
- A.D. Wood, J.A. Stankovic, and G. Zhou. DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In Proc. of SECON '07, 2007.Google ScholarCross Ref
- W. Xu, K. Ma, W. Trappe, and Y. Zhang. Jamming sensor networks: attack and defense strategies. IEEE Network, 20(3):41--47, 2006. Google ScholarDigital Library
- W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In Proc. of MobiHoc '05, pages 46--57, 2005. Google ScholarDigital Library
- W. Xu, T. Wood, and Y. Zhang. Channel surfing and spatial retreats: defenses against wireless denial of service. In Proc. of Workshop on Wireless Security, page 80--89, 2004. Google ScholarDigital Library
Index Terms
- A jamming-resistant MAC protocol for single-hop wireless networks
Recommendations
Competitive and fair throughput for co-existing networks under adversarial interference
PODC '12: Proceedings of the 2012 ACM symposium on Principles of distributed computingThis paper initiates the formal study of a fundamental problem: How to efficiently allocate a shared communication medium among a set of K co-existing networks in the presence of arbitrary external interference? While most literature on medium access ...
Self-stabilizing leader election for single-hop wireless networks despite jamming
MobiHoc '11: Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and ComputingElecting a leader is a fundamental task in distributed computations. Many coordination problems, such as the access to a shared resource, and the resulting inefficiencies, can be avoided by relying on a leader. This paper presents Select, a leader ...
Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols
SASN '05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networksA typical wireless sensor node has little protection against radio jamming. The situation becomes worse if energy-efficient jamming can be achieved by exploiting knowledge of the data link layer. Encrypting the packets may help prevent the jammer from ...
Comments