This Article 
 Bibliographic References 
 Add to: 
Thwarting Control-Channel Jamming Attacks from Inside Jammers
Sept. 2012 (vol. 11 no. 9)
pp. 1545-1558
Sisi Liu, University of Arizona, Tucson
Loukas Lazos, University of Arizona, Tucson
Marwan Krunz, University of Arizona, Tucson
Coordination of network functions in wireless networks requires frequent exchange of control messages among participating nodes. Typically, such messages are transmitted over a universally known communication channel referred to as the control channel. Due to its critical role, this channel can become a prime target of Denial-of-Service (DoS) attacks. In this paper, we address the problem of preventing control-channel DoS attacks manifested in the form of jamming. We consider a sophisticated adversary who has knowledge of the protocol specifics and of the cryptographic quantities used to secure network operations. This type of adversary cannot be prevented by antijamming techniques that rely on shared secrets, such as spread spectrum. We propose new security metrics to quantify the ability of the adversary to deny access to the control channel, and introduce a randomized distributed scheme that allows nodes to establish and maintain the control channel in the presence of the jammer. Our method is applicable to networks with static or dynamically allocated spectrum. Furthermore, we propose two algorithms for unique identification of the set of compromised nodes, one for independently acting nodes and one for colluding nodes. Detailed theoretical evaluation of the security metrics and extensive simulation results are provided to demonstrate the efficiency of our methods in mitigating jamming and identifying compromised nodes.

[1] D. Adamy, EW 101: A First Course in Electronic Warfare. Artech House, 2001.
[2] I. Akyildiz, W. Lee, M. Vuran, and S. Mohanty, "Next Generation Dynamic Spectrum Access Cognitive Radio Wireless Networks: A Survey," Computer Networks, vol. 50, no. 132 pp. 2127-2159, 2006.
[3] L.C. Baird, W.L. Bahn, M.D. Collins, M.C. Carlisle, and S.C. Butler., "Keyless Jam Resistance," Proc. IEEE Workshop Information Assurance US Military Academy, 2007.
[4] T.X. Brown, J.E. James, and A. Sethi, "Jamming and Sensing of Encrypted Wireless Ad Hoc Networks," Proc. ACM MobiHoc, pp. 120-130, 2006.
[5] M. Cagalj, S. Capkun, and J.-P. Hubaux, "Wormhole-Based Anti-Jamming Techniques in Sensor Networks," IEEE Trans. Mobile Computing, vol. 6, no. 1 pp. 100-114, Jan. 2007.
[6] A. Chan, X. Liu, G. Noubir, and B. Thapa, "Control Channel Jamming: Resilience and Identification of Traitors," Proc. IEEE Int'l Symp. Information Theory (ISIT), 2007.
[7] J.T. Chiang and Y.-C. Hu, "Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks," Proc. ACM MobiCom, pp. 346-349, 2007.
[8] Y.W. Law, L.V. Hoesel, J. Doumen, P. Hartel, and P. Havinga., "Energy Efficient Link-Layer Jamming Attacks Against Wireless Sensor Network MAC Protocols," Proc. Third ACM Workshop Security of Ad Hoc and Sensor Networks (SASN), 2005.
[9] L. Lazos, S. Liu, and M. Krunz, "Mitigating Control-Channel Jamming Attacks in Multi-Channel Ad Hoc Networks," Proc. Second ACM Conf. Wireless Network Security, pp. 169-180, 2009.
[10] L. Lazos, S. Liu, and M. Krunz, "Spectrum Opportunity-Based Control Channel Assignment In Cognitive Radio Networks," Proc. IEEE Sixth Ann. CS Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON), pp. 135-143, 2009.
[11] M. Li, I. Koutsopoulos, and R. Poovendran, "Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks," Proc. IEEE INFOCOM, 2007.
[12] G. Lin and G. Noubir, "On Link-Layer Denial of Service in Data Wireless LANs," J. Wireless Comm. and Mobile Computing, vol. 5, pp. 273-284, 2004.
[13] X. Liu, G. Noubir, R. Sundaram, and S. Tan., "SPREAD: Foiling Smart Jammers Using Multi-Layer Agility," Proc. IEEE INFOCOM, 2007.
[14] Y. Liu, P. Ning, H. Dai, and A. Liu, "Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication," Proc. IEEE INFOCOM, 2010.
[15] J.M. McCune, E. Shi, A. Perrig, and M.K. Reiter, "Detection of Denial of Message Attacks on Sensor Network Broadcasts," Proc. IEEE Symp. Security and Privacy, 2005.
[16] G. Noubir and G. Lin, "Low Power Dos Attacks in Data Wireless Lans and Countermeasures," Proc. ACM MobiCom, 2003.
[17] C. Popper, M. Strasser, and S. Čapkun, "Anti-Jamming Broadcast Communication Using Uncoordinated Spread Spectrum Techniques," IEEE J. Selected Areas in Comm., vol. 28, no. 5 pp. 703-715, June 2010.
[18] A. Proaño and L. Lazos, "Selective Jamming Attacks in Wireless Networks," Proc. IEEE Int'l Conf. Comm. (ICC), 2010.
[19] M.K. Simon, J.K. Omura, R.A. Scholtz, and B.K. Levitt, Spread Spectrum Communications Handbook. McGraw-Hill, 2001.
[20] B. Sklar, Digital Communications, Fundamentals and Applications. Prentice-Hall, 2001.
[21] D. Slater, P. Tague, R. Poovendran, and B. Matt, "A Coding-Theoretic Approach for Efficient Message Verification over Unsecure Channels," Proc. ACM Conf. Wireless Security, 2009.
[22] J. So and N.H. Vaidya, "Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using a Single Transceiver," Proc. ACM MobiHoc, pp. 222-233, 2004.
[23] M. Strasser, C. Popper, and S. Capkun, "Efficient Uncoordinated FHSS Anti-Jamming Communication," Proc. ACM MobiHoc, 2009.
[24] M. Strasser, C. Popper, S. Capkun, and M. Cagalj, "Jamming-Resistant Key Establishment Using Uncoordinated Frequency Hopping," Proc. IEEE Symp. Security and Privacy, 2008.
[25] P. Tague, M. Li, and R. Poovendran, "Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution," Proc. IEEE 18th Int'l Symp. Personal, Indoor, and Mobile Radio Comm. (PIRMC), 2007.
[26] P. Tague, M. Li, and R. Poovendran, "Mitigation of Control Channel Jamming under Node Capture Attacks," IEEE Trans. Mobile Computing, vol. 8, no. 9 pp. 1221-1234, Sept. 2009.
[27] Y. Tseng, S. Ni, Y. Chen, and J. Sheu, "The Broadcast Storm Problem in a Mobile Ad Hoc Network," Wireless Networks, vol. 8, nos. 2/3 pp. 153-167, 2002.
[28] W. Xu, W. Trappe, and Y. Zhang, "Anti-Jamming Timing Channels for Wireless Networks," Proc. First ACM Conf. Wireless Security, 2008.
[29] W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," Proc. ACM MobiHoc, pp. 46-57, 2005.
[30] W. Xu, T. Wood, W. Trappe, and Y. Zhang, "Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service," Proc. Wireless Security Workshop, 2004.
[31] J. Yu and P. Chong, "A Survey of Clustering Schemes for Mobile Ad Hoc Networks," IEEE Comm. Surveys & Tutorials, vol. 7, no. 1 pp. 32-48, Jan.-Mar. 2005.

Index Terms:
Jamming,Channel allocation,Frequency control,Protocols,Cognitive radio,Telecommunication services,cognitive radio networks.,Jamming,denial-of-service,control channel,ad hoc networks
Sisi Liu, Loukas Lazos, Marwan Krunz, "Thwarting Control-Channel Jamming Attacks from Inside Jammers," IEEE Transactions on Mobile Computing, vol. 11, no. 9, pp. 1545-1558, Sept. 2012, doi:10.1109/TMC.2011.165
Usage of this product signifies your acceptance of the Terms of Use.