Selfish Jammer Detection in Multiple P2P Communication Networks
Selfish Jammer Detection in Multiple P2P Communication Networks
Selfish Jammer Detection in Multiple P2P Communication Networks
Monitor Sensor
J
ammer Jamming Radio
Fig. 1 Illustration of jamming attacks
A. Constant
jammer
The constant jammer continually emits a radio signal,
and can be implemented using either a wave form generator
that continuously sends a radio signal [3] or a normal
wireless device that continuously sends out random bits to
the channel without following any MAC-layer etiquette [4].
Normally, the underlying MAC protocol allows legitimate
nodes to send out packets only if the channel is idle. Thus,
a constant jammer
can effectively prevent legitimate traffic sources from getting
hold of a channel and sending packets.
B. Deceptive
jammer
Instead of sending out random bits, the deceptive
jammer constantly injects regular packets to the channel
without any gap between subsequent packet transmissions.
As a result, a normal communicator will be deceived into
believing there is
a legitimate packet and be duped to remain in the receive
state. For example, in TinyOS, if a preamble is detected,
a node remains in the receive mode, regardless of whether
that node has a packet to send or not. Even if a node has
packets to send, it cannot switch to the send state because a
constant stream of incoming packets will be detected.
Instead of continuously sending out a radio signal, a incurred cost for the attacker. With regard to the machinery
random jammer alternates between sleeping and and impact
jamming. Specifically, after jamming for a while, it turns
off its radio and enters a “sleeping” mode. It will resume
jamming after sleeping for some time. During its jamming
phase, it can behave like either a constant jammer or a
deceptive jammer. This jammer model tries to take energy
conservation into consideration, which is especially
important for those jammers that do not have unlimited power
supply.
D. Reactive
jammer
The three models discussed above are active jammers in
the sense that they try to block the channel irrespective of the
traffic pattern on the channel. Active jammers are usually
effective because they keep the channel busy all the time. An
alternative approach to jamming wireless communication is
to employ a reactive strategy. The reactive jammer stays
quiet when the channel is idle, but starts transmitting a radio
signal as soon as it senses activity on the channel. One
advantage of a reactive jammer is that it is harder to detect.
B. Jamming
Model
Consider a multi-hop wireless network under
jamming attacks. It has a constant traffic generating rate and
a jamming range. Assume that they are smart jammers that
can totally occupy the channels when sending jamming
traffic. Each network node is equipped with multiple radios
and each jamming node is equipped with one radio, which
can transmit
jamming data at any of these n channels. The jammer may
use its sensing ability in order to sense ongoing activity in
the network. Clearly, sensing ongoing network activity prior
to jamming is beneficial for the attacker in the sense that its
energy resources are not aimlessly consumed and the jammer
is not needlessly exposed to the network. The jammer
transmits a small packet which collides with legitimate
transmitted packets at their intended receivers. The goal
of this paper is to investigate the network restoration
schemes that can minimize the performance degradation in
the event of jamming attacks.
C. Attack Detection
Model
The network employs a mechanism for monitoring
network status and detecting potential malicious activity.
The monitoring mechanism consists of: 1) determination
of a
subset of nodes M that act as monitors, and 2) employment of
a detection algorithm at each monitor node. The assignment
of the role of monitor to a node is affected by potential
existing energy consumption and node computational
complexity limitations, and by detection performance
specifications.
This paper fixes attention to a specific monitor node
and the detection scheme that it employs. First, it need to
define the quantity to be observed at each monitor. In this
case, the
readily available metric is the probability of collision that a
monitor node experiences, namely the percentage of packets
that are erroneously received. During normal network
operation and in the absence of a jammer, it consider a large
enough training period in which the monitor node learns the
percentage of collisions it experiences as the long-term limit
of the ratio of number of slots where there was collision over
total number of slots of the training period. Now let the
network operate in the open after the training period has
elapsed and fix attention to a time window much smaller than
the training period. An increased percentage of collisions in
the time window compared to the learned long-term ratio
may be an indication of an ongoing jamming attack that
causes additional collisions. However, it may happen as well
that the network operates normally and there is just a
temporary irregular increase in the percentage of collisions
compared to the learned ratio for that specific interval. A
detection algorithm is part of the detection module at a
monitor node; it takes as input observation samples obtained
be small enough, such that the attack is detected in a timely is quantified by the average sample number (ASN), needed
manner and appropriate countermeasures are initiated. On until a decision is reached, where the expectation is with
the other hand, this window should be sufficiently large, such respect to the distribution of the observations.
that the chance of a false alarm notification is reduced.
The sequential nature of observations at consecutive IV. PROPOSED SYSTEM
time slots motivates the use of sequential detection
techniques. A sequential decision rule consists of: 1) a The proposed work provides selfish cooperative jammer
stopping time, indicating when to stop taking observations, detection technique, called COOPON, which will detect the
and 2) a final decision rule that decides between the two attacks of selfish cooperative nodes by the cooperation of other
hypotheses (i.e., occurrence or not of jamming). A sequential legitimate neighboring nodes. The COOPON algorithm make
decision rule is efficient if it can provide reliable decision as use of the autonomous decision capability of an ad-hoc
fast as possible. The probability of false alarm PFA and communication network based on exchanged information among
probability of missed detection PM constitute inherent trade- neighboring nodes .Our proposed COOPON selfish jammer
offs in a detection scheme in the sense that a faster decision node detection method is very reliable since it is based on
unavoidably leads to higher values of these probabilities deterministic information. We focus on selfish jammer node of
while lower values are attained at the expense of detection neighboring nodes toward multiple p2p communication
delay. For given values of PFA and PM, the detection test networks.
that minimizes the average number of required observations
(and thus average delay) to reach a decision among all ADVANTAGE
sequential and non sequential tests for which PFA and PM do
not exceed the predefined values above is Wald’s Sequential • Autonomous and cooperative characteristics for better
Probability Ratio Test (SPRT) [18]. When SPRT is used for detection reliabilities.
sequential testing between two hypotheses concerning two
probability distributions, SPRT is optimal in that sense as • Reduce computational complexity of the power
well [19]. optimization.
SPRT collects observations until significant evidence
• Higher Reliability.
in favor of one of the two hypotheses is accumulated. After
each observation at the kth stage, choose between the • Lower Complexity.
following options: accept one or the other hypothesis
and stop Dijkstra’s algorithm
observing, or defer decision for the moment and obtain
another observation k + 1. In SPRT, there exist two One algorithm for finding the shortest path from a starting node
thresholds a and b that aid the decision. The computed figure to a target node in a weighted graph is Dijkstra’s algorithm.
of merit at each step is the logarithm of the likelihood ratio The algorithm creates a tree of shortest paths from the starting
of the accumulated sample vector until that step. In this case, vertex, the source, to all other points in the graph.
the test is between hypotheses H0 and H1 that involve
Bernoulli with probability mass functions (p.m.fs.) f0 and Dijkstra’s algorithm, published in 1959 and named after its
f1 defined by Pr(c=1) = θi=1 - Pr(C=0) where c = 1 denotes creator Dutch computer scientist Edsger Dijkstra, can be applied
the event of collision in a slot. That is, H0 concerns the on a weighted graph. The graph can either be directed or
hypothesis about absence of jamming with Bernoulli p.m.f. undirected. One stipulation to using the algorithm is that the
f0 with parameter θ0, while H1 corresponds to the hypothesis graph needs to have a nonnegative weight on every edge.
of jamming with a Bernoulli p.m.f. f1 with parameter θ1.
Dijkstra's algorithm in action on a non-directed graph Suppose a
Thus, the logarithm of likelihood ratio at stage k with student wants to go from home to school in the shortest possible
accumulated samples x1,…..,xk is:
way. She knows some roads are heavily congested and difficult
to use. In Dijkstra's algorithm, this means the edge has a large
weight--the shortest path tree found by the algorithm will try to
avoid edges with larger weights. If the student looks up
where f1(x1,….xk) is the joint probability mass function of directions using a map service, it is likely they may use
sequence (x1,….xk) based on hypothesis Hi, for I = 0,1. Dijkstra's algorithm, as well as others.
The decision is taken based on the following criteria: