skip to main content
10.1145/1400751.1400759acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
research-article

A jamming-resistant MAC protocol for single-hop wireless networks

Published:18 August 2008Publication History

ABSTRACT

In this paper we consider the problem of designing a medium access control (MAC) protocol for single-hop wireless networks that is provably robust against adaptive adversarial jamming. The wireless network consists of a set of honest and reliable nodes that are within the transmission range of each other. In addition to these nodes there is an adversary. The adversary may know the protocol and its entire history and use this knowledge to jam the wireless channel at will at any time. It is allowed to jam a (1-epsilon)-fraction of the time steps, for an arbitrary constant epsilon>0, but it has to make a jamming decision before it knows the actions of the nodes at the current step. The nodes cannot distinguish between the adversarial jamming or a collision of two or more messages that are sent at the same time. We demonstrate, for the first time, that there is a local-control MAC protocol requiring only very limited knowledge about the adversary and the network that achieves a constant throughput for the non-jammed time steps under any adversarial strategy above. We also show that our protocol is very energy efficient and that it can be extended to obtain a robust and efficient protocol for leader election and the fair use of the wireless channel.

References

  1. G. Alnifie and R. Simon. A multi-channel defense against jamming attacks in wireless sensor networks. In Proc. of Q2SWinet '07, pages 95--104, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. E. Bayraktaroglu, C. King, X. Liu, G. Noubir, R. Rajaraman, and B. Thapa. On the performance of ieee 802.11 under jamming. In Proc. of IEEE Infocom '08, page 1265, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  3. Michael A. Bender, Martin Farach-Colton, Simai He, Bradley C. Kuszmaul, and Charles E. Leiserson. Adversarial contention resolution for simple channels. In Proc. of SPAA '05, pages 325--332, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. T. Brown, J. James, and A. Sethi. Jamming and sensing of encrypted wireless ad hoc networks. In Proc. of MobiHoc '06, pages 120--130, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J.T. Chiang and Y.-C. Hu. Cross-layer jamming detection and mitigation in wireless broadcast networks. In Proc. of MobiCom '07, pages 346--349, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Bogdan S. Chlebus, Dariusz R. Kowalski, and Mariusz A. Rokicki. Adversarial queuing on the multiple-access channel. In Proc. of PODC '06, pages 92--101, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. A. Czumaj and W. Rytter. Broadcasting algorithms in radio networks with unknown topology. Journal of Algorithms, 60(2):115 -- 143, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Gilbert, R. Guerraoui, and C. Newport. Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks. In Proc. of OPODIS '06, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Leslie Ann Goldberg, Philip D. Mackenzie, Mike Paterson, and Aravind Srinivasan. Contention resolution with constant expected delay. Journal of the ACM, 47(6):1048--1096, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Johan Hastad, Tom Leighton, and Brian Rogoff. Analysis of backoff protocols for mulitiple accesschannels. SIAM Journal on Computing, 25(4):740--774, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. IEEE. Medium access control (MAC) and physical specifications. In IEEE P802.11/D10, 1999.Google ScholarGoogle Scholar
  12. C.Y. Koo, V. Bhandari, J. Katz, and N.H. Vaidya. Reliable broadcast in radio networks: The bounded collision case. In Proc. of PODC '06, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. K. Kothapalli, C. Scheideler, M. Onus, and A. Richa. Constant density spanners for wireless ad hoc networks. In Proc. of SPAA '05, pages 116--125, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Fabian Kuhn, Thomas Moscibroda, and Roger Wattenhofer. Radio Network Clustering from Scratch. In Proc. of ESA '04, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  15. Byung-Jae Kwak, Nah-Oak Song, and Leonard E. Miller. Performance analysis of exponential backoff. IEEE/ACM Transactions on Networking, 13(2):343--355, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Y.W. Law, L. van Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy-efficient link-layer jamming attacks against wireless sensor network mac protocols. In Proc. of SASN '05, pages 76--88, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Li, I. Koutsopoulos, and R. Poovendran. Optimal jamming attacks and network defense policies in wireless sensor networks. In Proc. of Infocom '07, pages 1307--1315, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Xin Liu, Guevara Noubir, Ravi Sundaram, and San Tan. Spread: Foiling smart jammers using multi-layer agility. In Proc. of Infocom '07, pages 2536--2540, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Vishnu Navda, Aniruddha Bohra, Samrat Ganguly, and Dan Rubenstein. Using channel hopping to increase 802.11 resilience to jamming attacks. In Proc. of Infocom '07, pages 2526--2530, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. R. Negi and A. Perrig. Jamming analysis of MAC protocols. Technical report, Carnegie Mellon University, 2003.Google ScholarGoogle Scholar
  21. A. Pelc and D. Peleg. Feasibility and complexity of broadcasting with random transmission failures. In Proc. of PODC '05, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Prabhakar Raghavan and Eli Upfal. Stochastic contention resolution with short delays. SIAM Journal on Computing, 28(2):709--719, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. J. Schmidt, A. Siegel, and A. Srinivasan. Chernoff-Hoeffding bounds for applications with limited independence. SIAM Journal on Discrete Mathematics, 8(2):223--250, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. M. K. Simon, J. K. Omura, R. A. Schultz, and B. K. Levin. Spread Spectrum Communications Handbook. McGraw-Hill, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. David Thuente and Mithun Acharya. Intelligent jamming in wireless networks with applications to 802.11b and other networks. In Proc. of MILCOM '06, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. A.D. Wood, J.A. Stankovic, and G. Zhou. DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In Proc. of SECON '07, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  27. W. Xu, K. Ma, W. Trappe, and Y. Zhang. Jamming sensor networks: attack and defense strategies. IEEE Network, 20(3):41--47, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In Proc. of MobiHoc '05, pages 46--57, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. W. Xu, T. Wood, and Y. Zhang. Channel surfing and spatial retreats: defenses against wireless denial of service. In Proc. of Workshop on Wireless Security, page 80--89, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. A jamming-resistant MAC protocol for single-hop wireless networks

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            PODC '08: Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
            August 2008
            474 pages
            ISBN:9781595939890
            DOI:10.1145/1400751

            Copyright © 2008 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 18 August 2008

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate740of2,477submissions,30%

            Upcoming Conference

            PODC '24

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader