Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1998412.1998421acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
short-paper

Short paper: Jamming-resilient multipath routing leveraging availability-based correlation

Published: 14 June 2011 Publication History

Abstract

Jamming attacks are especially harmful to the reliability of wireless communication, as they can effectively disrupt communication. Existing jamming defenses primarily focus on repairing connectivity between adjacent nodes. In this paper, we address jamming at the network level and focus on restoring the end-to-end data delivery through multipath routing. As long as all paths do not fail concurrently, the end-to-end path availability is maintained. Prior work in multipath selection improves routing by choosing node-disjoint paths or link-disjoint paths. However, through our experiments on jamming effects using MicaZ nodes, we show that topological disjointness is insufficient for selecting fault-independent paths. Thus, we address multipath selection based on the knowledge of a path's availability history. Using Availability History Vectors (AHVs) of paths, we present an AHV-based Link-State (ALS) algorithm to select fault-independent paths. Our extensive simulation results validate that the ALS algorithm is effective in overcoming the jamming impact by maximizing the end-to-end availability of the selected paths.

References

[1]
A. Goldsmith. Wireless Communications. Cambridge University Press, New York, USA, 2005.
[2]
Z. Liu, H. Liu, W. Xu, and Y. Chen. Exploiting jamming-caused neighbor changes for jammer localization. Accepted to IEEE Transactions on Parallel and Distributed Systems (TPDS).
[3]
K. Ma, Y. Zhang, and W. Trappe. Mobile network management and robust spatial retreats via network dynamics. In Proceedings of workshop on Resource Provisioning and Management in Sensor Networks (RPMSN05), 2005.
[4]
S. Mueller, R. Tsang, and D. Ghosal. Multipath routing in mobile ad hoc networks: Issues and challenges. In Performance Tools and Applications to Networked Systems, 2004.
[5]
G. Noubir and G. Lin. Low-power DoS attacks in data wireless lans and countermeasures. SIGMOBILE Mob. Comput. Commun. Rev., 7(3):29--30, 2003.
[6]
M. Pascoal and E. Martins. A new implementation of yen's ranking loopless paths algorithm. 4OR: A Quarterly Journal of Operations Research, 1(2):121--133, 2003.
[7]
J. Proakis. Digital Communications. McGraw-Hill, Columbus, OH, 2000.
[8]
A. Tachibana, S. Ano, T. Hasegawa, M. Tsuru, and Y. Oie. Locating congested segments on the internet by multiple paths' delay performance clustering. In IEEE International Conference on Communications. IEEE, 2007.
[9]
K. Wu and J. Harms. On-demand multipath routing for mobile ad hoc networks. In Networks EPMCC, pages 1--7, 2001.
[10]
W. Xu, W. Trappe, and Y. Zhang. Channel surfing: defending wireless sensor networks from interference. In Proceedings of conference on Information Processing in Sensor Networks (IPSN), pages 499--508, 2007.
[11]
X. Zhang and A. Perrig. Correlation-resilient path selection for multi-path routing. In IEEE Globecom, 2010.

Cited By

View all
  • (2017)Future military mobile radio communication systems from electronic warfare perspective2017 International Conference on Military Communications and Information Systems (ICMCIS)10.1109/ICMCIS.2017.7956494(1-8)Online publication date: May-2017
  • (2014)JADE: Jamming-averse routing on cognitive radio mesh networks2014 IEEE Conference on Communications and Network Security10.1109/CNS.2014.6997461(21-28)Online publication date: Oct-2014
  • (2013)MeshJamProceedings of the 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems10.1109/MASS.2013.59(560-564)Online publication date: 14-Oct-2013
  • Show More Cited By
  1. Short paper: Jamming-resilient multipath routing leveraging availability-based correlation

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    WiSec '11: Proceedings of the fourth ACM conference on Wireless network security
    June 2011
    186 pages
    ISBN:9781450306928
    DOI:10.1145/1998412
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 14 June 2011

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. jamming
    2. routing algorithms
    3. wireless networks

    Qualifiers

    • Short-paper

    Conference

    WISEC'11
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 98 of 338 submissions, 29%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)4
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 25 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2017)Future military mobile radio communication systems from electronic warfare perspective2017 International Conference on Military Communications and Information Systems (ICMCIS)10.1109/ICMCIS.2017.7956494(1-8)Online publication date: May-2017
    • (2014)JADE: Jamming-averse routing on cognitive radio mesh networks2014 IEEE Conference on Communications and Network Security10.1109/CNS.2014.6997461(21-28)Online publication date: Oct-2014
    • (2013)MeshJamProceedings of the 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems10.1109/MASS.2013.59(560-564)Online publication date: 14-Oct-2013
    • (2012)Jamming-Resilient Multipath RoutingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2012.699:6(852-864)Online publication date: 1-Nov-2012

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media