The Community for Technology Leaders
RSS Icon
Issue No.06 - Nov.-Dec. (2012 vol.9)
pp: 852-864
Hossen Mustafa , University of South Carolina, Columbia
Xin Zhang , Carnegie Mellon University, Pittsburgh
Zhenhua Liu , University of South Carolina, Columbia
Wenyuan Xu , University of South Carolina, Columbia
Adrian Perrig , Carnegie Mellon University, Pittsburgh
Jamming attacks are especially harmful to the reliability of wireless communication, as they can effectively disrupt communication between any node pairs. Existing jamming defenses primarily focus on repairing connectivity between adjacent nodes. In this paper, we address jamming at the network level and focus on restoring the end-to-end data delivery through multipath routing. As long as all paths do not fail concurrently, the end-to-end path availability is maintained. Prior work in multipath selection improves routing availability by choosing node-disjoint paths or link-disjoint paths. However, through our experiments on jamming effects using MicaZ nodes, we show that disjointness is insufficient for selecting fault-independent paths. Thus, we address multipath selection based on the knowledge of a path's availability history. Using Availability History Vectors (AHVs) of paths, we present a centralized AHV-based algorithm to select fault-independent paths, and a distributed AHV-based routing protocol built on top of a classic routing algorithm in ad hoc networks. Our extensive simulation results validate that both AHV-based algorithms are effective in overcoming the jamming impact by maximizing the end-to-end availability of the selected paths.
Jamming, Wireless networks, Routing algorithms, Correlation, Wireless communication, Ad hoc networks, jamming, Wireless networks, routing algorithms
Hossen Mustafa, Xin Zhang, Zhenhua Liu, Wenyuan Xu, Adrian Perrig, "Jamming-Resilient Multipath Routing", IEEE Transactions on Dependable and Secure Computing, vol.9, no. 6, pp. 852-864, Nov.-Dec. 2012, doi:10.1109/TDSC.2012.69
[1] N. Kushman, S. Kandula, D. Katabi, and B.M. Maggs, "R-BGP: Staying Connected in a Connected World," Proc. Fourth USENIX Conf. Networked Systems Design and Implementation, 2007.
[2] M. Cagalj, S. Capkun, and J. Hubaux, "Wormhole-Based Anti-Jamming Techniques in Sensor Networks," IEEE Trans. Mobile Computing, vol. 6, no. 1, pp. 100-114, June 2007.
[3] Y. Cao, Z. Liu, and Y. Yang, "A Centralized Scheduling Algorithm Based on Multi-Path Routing in Wimax Mesh Network," Proc. Int'l Conf. Wireless Comm., Networking and Mobile Computing (WiCOM), 2006.
[4] M. Çakiroĝlu and A.T. Özcerit, "Jamming Detection Mechanisms for Wireless Sensor Networks," Proc. Int'l Conf. Scalable Information Systems (InfoScale), 2008.
[5] J.T. Chiang and Y.-C. Hu, "Dynamic Jamming Mitigation for Wireless Broadcast Networks," Proc. IEEE INFOCOM, 2008.
[6] A. Goldsmith, Wireless Communications. Cambridge Univ. Press, 2005.
[7] Z. Liu, H. Liu, W. Xu, and Y. Chen, "Exploiting Jamming-Caused Neighbor Changes for Jammer Localization," IEEE Trans. Pattern and Distributed Systems, vol. 23, no. 3, pp. 547-555, Mar. 2012.
[8] W. Lou, W. Liu, and Y. Fang, "Spread: Enhancing Data Confidentiality in Mobile Ad Hoc Networks," Proc. IEEE INFOCOM, 2004.
[9] K. Ma, Y. Zhang, and W. Trappe, "Mobile Network Management and Robust Spatial Retreats via Network Dynamics," Proc. First Int'l Workshop Resource Provisioning and Management in Sensor Networks (RPMSN), 2005.
[10] M. Marina and S. Das, "On-Demand Multipath Distance Vector Routing in Ad Hoc Networks," Proc. IEEE Int'l Conf. Network Protocols (ICNP), 2001.
[11] S. Mueller, R. Tsang, and D. Ghosal, "Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges," Performance Tools and Applications to Networked Systems, Springer, 2004.
[12] H. Mustafa, X. Zhang, Z. Liu, W. Xu, and A. Perrig, "Short Paper: Jamming-Resilient Multipath Routing Leveraging Availability-Based Correlation," Proc. Fourth ACM Conf. Wireless Network Security (WiSec), 2011.
[13] A. Nasipuri and S.R. Das, "On-Demand Multipath Routing for Mobile Ad Hoc Networks," Proc. Int'l Conf. Computer Comm. and Networks (ICCCN), 1999.
[14] U. o. W. Network Security Lab, "Jamming Framework for ns-3," Jamming Framework, Univ. of Washington, 2010.
[15] G. Noubir and G. Lin, "Low-Power DoS Attacks in Data Wireless Lans and Countermeasures," SIGMOBILE Mobile Computing and Comm. Rev., vol. 7, no. 3, pp. 29-30, 2003.
[16] V. Park and M. Corson, "A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks," Proc. IEEE INFOCOM, 1997.
[17] M. Pascoal and E. Martins, "A New Implementation of Yen's Ranking Loopless Paths Algorithm," 4OR: Quarterly J. Operations Research, vol. 1, pp. 121-133, 2003.
[18] C. Perkins, E. Belding-Royer, and S. Das, "Ad Hoc On-Demand Distance Vector (Aodv) Routing," IETF RFC 3561, 2003.
[19] A. Perrig, R. Canetti, D. Song, and D. Tygar, "The Tesla Broadcast Authentication Protocol," RSA Cryptobytes, 2002.
[20] J. Proakis, Digital Communications. McGraw-Hill, 2000.
[21] E. Setton, X. Zhu, and B. Girod, "Congestion-Optimized Multi-Path Streaming of Video over Ad Hoc Wireless Networks," Proc. IEEE Int'l Conf. Multimedia and Expo (ICME), June 2004.
[22] P. Tague, S. Nabar, J. Ritcey, and R. Poovendran, "Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection," IEEE Trans. Networking, vol. 19, no. 1, pp. 184-194, Feb. 2011.
[23] P. Tague, S. Nabar, J. Ritcey, D. Slater, and R. Poovendran, "Throughput Optimization for Multipath Unicast Routing under Probabilistic Jamming," Proc. IEEE Int'l Symp. Personal, Indoor and Mobile Radio Comm. (IPIMRC), 2008.
[24] A. Tsirigos and Z. Haas, "Analysis of Multipath Routingpart I: The Effect on the Packet Delivery Ratio," Proc. IEEE Trans. Wireless Comm., vol. 3, no. 1, pp. 136-146, Jan. 2004.
[25] A. Valera, W.K.G. Seah, and S. Rao, "Cooperative Packet Caching and Shortest Multipath Routing in Mobile Ad Hoc Networks," Proc. IEEE INFOCOM, 2003.
[26] A.D. Wood, J.A. Stankovic, and G. Zhou, "DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-Based Wireless Networks," Proc. Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON), 2007.
[27] K. Wu and J. Harms, "On-Demand Multipath Routing for Mobile Ad Hoc Networks," Proc. European Personal Mobile Comm. Conf. (EPMCC), 2001.
[28] K. Wu and J. Harms, "Performance Study of a Multipath Routing Method for Wireless Mobile Ad Hoc Networks," Proc. Ninth Int'l Symp. Modeling, Analysis and Simulation of Computer and Telecomm. Systems (MASCOTS), 2001.
[29] W. Xu, W. Trappe, and Y. Zhang, "Channel Surfing: Defending Wireless Sensor Networks from Interference," Proc. Int'l Conf. Information Processing in Sensor Networks (IPSN), 2007.
[30] W. Xu, W. Trappe, and Y. Zhang, "Anti-Jamming Timing Channels for Wireless Networks," Proc. First ACM Conf. Wireless Network Security (WiSec), pp. 203-213, 2008.
[31] W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," Proc. MobiHoc, 2005.
[32] X. Yang and D. Wetherall, "Source Selectable Path Diversity via Routing Deflections," Proc. ACM SIGCOMM, 2006.
[33] Z. Ye, S. Krishnamurthy, and S. Tripathi, "A Framework for Reliable Routing in Mobile Ad Hoc Networks," Proc. IEEE INFOCOM, 2003.
[34] L. Zhang, Z. Zhao, Y. Shu, L. Wang, and O. Yang, "Load Balancing of Multipath Source Routing in Ad Hoc Networks," Proc. IEEE Int'l Conf. Comm. (ICC), 2002.
[35] X. Zhang, H.-C. Hsiao, G. Hasker, H. Chan, A. Perrig, and D.G. Andersen, "SCION: Scalability Control, and Isolation on Next-Generation Networks," Proc. IEEE Symp. Security and Privacy, 2011.
[36] X. Zhang and A. Perrig, "Correlation-Resilient Path Selection for Multi-Path Routing," Proc. IEEE Globecom, 2010.
42 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool