Integrated Combined Layer Algorithm (ICLA) for Jamming Detection in MANET

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    The nature of MANETs such as open medium, dynamic mobility and lack of security makes it susceptible to a range of attacks. Jamming attacks is recorded as the highest occurring attacks that exist at physical and MAC layers in MANET. Therefore, an integrated combined layer algorithm (ICLA) is proposed using reverse engineering and anomaly detection technique. The methodology begins by collecting data through OPNET. Analysis and evaluation of the data produces three jammers detection Metrics which are used detect jammers. The performance of the outcome are then tested against other jammers’ model at MAC and physical layer to evaluate the detection performance. This enables identification of jamming attack at both lower layers in MANET. It is combination of three tested metrics such as SNR, BER and throughput that able to detect jamming attack using combined layer approach. The combination of these three metrics across layers shows improvement in identification performance.

     

     


  • Keywords


    MANET; identify jamming; NAV; RTS/CTS; layer

  • References


      [1] A. Sharma and J. K. Singh,(2017) “Detection of Jamming Attack in MANET Using Watchdog Technique,” Int. J. Futur. Gener. Commun. Netw., vol. 10, no. 3, pp. 11–20.

      [2] D. C. Schleher(1999) “Electronic Warfare in the Information Age,” in Artech House Radar Library, 1999, pp. 240–246.

      [3] J. Deng, Z. Zhang, S. Pagadala, P. K. Varshney, N. Orleans, and C. Science, (2008)“Protecting MANETs from Spurious CTS Attacks with Randomized Carrier Sensing,” in Proceedings of IEEE Sarnoff Symposium ’08 Princeton, NJ, USA April 28-30, 2008, 2008, pp. 1–5.

      [4] W. Xu, W. Trappe, Y. Zhang, and T. Wood,(2005) “The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks,” in Proceedings of the 6th ACM International Symposium on Mobile ad hoc Networking and Computing {(MobiHoc 05), 2005, p. 46.

      [5] Y. W. Law, M. Palaniswami, L. Van Hoesel, J. Doumen, P. Hartel, and P. Havinga, (2009) “Energy-Efficient Link-Layer Jamming Attacks Against Wireless Sensor Network MAC Protocols,” ACM Trans. Sens. Networks, vol. 5, no. 1, pp. 1–38, 2009.

      [6] G. Z. Anthony D. Wood, John A. Stankovic,(2007) “DEEJAM : Defeating Energy-Efficient Jamming inIEEE 802.15.4-based Wireless Networks,” in The 4th Annual IEEE Communication Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2007), San Diego, CA, USA, June 2007., 2007, pp. 60–69.

      [7] R. Muraleedharan and L. a. Osadciw,(2006) “Jamming Attack Detection and Countermeasures In Wireless Sensor Network Using Ant System,” in Proc. Wireless Sensing and Processing, 2006, 2006, p. 62480G–62480G–12.

      [8] H. Jadidoleslamy, (2011) “A Comparison of Physical Attacks on Wireless Sensor Networks,” Int. J. Peer to Peer Networks Vol.2, No.2, April 2011 A, vol. 2, no. 2, pp. 24–42, 2011.

      [9] G. Thamilarasu, S. Mishra, and R. Sridhar,(2006) “A Cross-layer Approach to Detect Jamming in Wireless Ad hoc Networks,” in IEEE Military Communications Conference 2006, Washington, D.C., October 2006, 2006.

      [10] G. Thamilarasu and R. Sridhar,(2007) “Exploring Cross-Layer Techniques for Security : Challenges and Opportunities in Wireless Networks,” in Military Communications Conference, MILCOM 2007, 2007.

      [11] G. Thamilarasu, S. Mishra, and R. Sridhar,(2011) “Improving Reliability of Jamming Attack Detection in Ad hoc Networks,” Int. J. Commun. Networks Inf. Secur. 2011, no. April 2011, pp. 57–66, 2011.

      [12] M.-A. El Houssaini, A. Aaroud, A. El Hore, and J. Ben-Othman,(2016) “Detection of Jamming Attacks in Mobile Ad Hoc Networks Using Statistical Process Control,” in The 7th International Conference on Ambient Systems, Networks and Technologies (ANT 2016), 2016, vol. 83, no. 83, pp. 26–33.

      [13] Le Wang Wyglinski,(2011) “A Combined Approach for Distinguishing Different Types of Jamming Attacks Against Wireless Networks,” in Proceedings of the 2011 IEEE Pacific Rim Conference on Communications, Computers, and Signal Processing (Victoria, BC, Canada), August 2011, 2011.

      [14] M. V. . and S. Kumar, (2012)“Detection of Jamming Style DoS attack in Wireless Sensor Network,” in 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, 2012, pp. 563–567.

      [15] R. Singh and J. Singh,(2012) “A Performance Metrics Scorecard Based Approach to Intrusion Detection System Evaluation for Wireless Network,” Glob. J. Comput. Sci. Technol. Network, Web Secur. V, vol. 12, no. 12, pp. 1–10, 2012.

      [16] N. Sufyan, N. A. Saqib, and M. Zia, “Detection of Jamming Attacks in 802 . 11b Wireless Networks,” J. Wirel. Commun. Netw., vol. 1, no. 208, pp. 1–18, 2013.

      [17] M. Zuba, Z. Shi, Z. Peng, and J. Cui,(2011) “Short Paper : Launching Denial-of-Service Jamming Attacks in Underwater Sensor Networks,” in Proceedings of the Sixth ACM International Workshop on Underwater Networks, 2011, pp. 10–14.

      [18] Sarkar, N. I. (2011). A Cross Layer Framework for WLANs : Joint Radio Propagation and MAC Protocol. 13th International Conference on Computer and Information Technology 2010 (ICCIT 2010) 23-25 December 2010.


 

View

Download

Article ID: 17400
 
DOI: 10.14419/ijet.v7i3.15.17400




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.