Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

An Enhanced Jamming Attack Detection using Bittrickle Methodology


Affiliations
1 Department of ECE, Angel College of Engineering and Technology, Tirupur, India
     

   Subscribe/Renew Journal


When target devices are transmitting a reactive jammer jams the wireless channel; Reactive jamming is harder to track and compensate against the constant jamming methods. Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum DSSS) have been widely used against Jamming attacks. If high power transmitter or frequency channel is jammed then both these method will fail.  We use broad band and high power reactive jammer to avoid jamming attacks. In this proposed method we use bit trickle method to avoid jamming. Bit Trickle is a method which is used to find attackers when using broadband communication between transmitter and receiver. Users having secret key to access the data from anti jammer. Once the security key is correct then only the transmission occurs.


Keywords

Wireless Network, Jamming, Anti-Jamming, Bit Trickle Method.
User
Subscription Login to verify subscription
Notifications
Font Size

  • Reactive jamming technologies. http://www.ece.gatech.edu/academic/courses/ece4007/08fall/ece4007l02/lm5/jammer.doc.
  • Y. Liu and P. Ning. Bittrickle: Defending against broadband and highpower reactive jamming attacks. Technical Report TR-2011-17, NC State University, Computer Science Department, July 2011.
  • Y. Liu, P. Ning, H. Dai, and A. Liu. Randomized differential dsss: Jamming-resistant wireless broadcast communication. In Proceedings of the 2010 IEEE INFOCOM, 2010.
  • Robert A. Scholtz. Spread Spectrum Communications Handbook. McGraw-Hill, 2001.
  • W. Xu, W. Trappe, and Y. Zhang. Anti-jamming timing channels for wireless networks. In WiSec ’08: Proceedings of the first ACM conference on Wireless network security, pages 203–213, New York,NY, USA, 2008. ACM.
  • M. Wilhelm, I. Martinovic, J. B. Schmitt, and V. Lenders, “Short paper: Reactive jamming in wireless networks: How realistic is the threat?” in Proc. 4th ACM Conf. Wireless Netw. Secur., 2011, pp. 47–52.
  • W. Xu, K. Ma, W. Trappe, and Y. Zhang, “Jamming sensor networks: Attack and defense strategies,” IEEE Netw., vol. 20, no. 3, pp. 41–47, May/Jun. 2006
  • K. Grover, A. Lim, and Q. Yang, “Jamming and anti–jamming techniques in wireless networks: A survey,” Int. J. Ad Hoc Ubiquitous Comput., vol. 17, no. 4, pp. 197–215, 2014.
  • D. Giustiniano, V. Lenders, J. B. Schmitt, M. Spuhler, and M. Wilhelm, “Detection of reactive jamming DSSS-based wireless networks,” in Proc. 6th ACM Conf. Secur. Privacy Wireless Mobile Netw., 2013, pp. 43–48.
  • E.-K. Lee, S. Y. Oh, and M. Gerla, “Randomized channel hopping scheme for anti-jamming communication,” in Proc. IFIP Wireless Days (WD), Oct. 2010, pp. 1–5.
  • Y. Liu and P. Ning, “BitTrickle: Defending against broadband and highpower reactive jamming attacks,” in Proc. IEEE INFOCOM, Mar. 2012, pp. 909
  • W. Xu, W. Trappe, and Y. Zhang, “Anti-jamming timing channels for wireless networks,” in Proc. 1st ACM Conf. Wireless Netw. Secur., New York, NY, USA, 2008, pp. 203–213.

Abstract Views: 273

PDF Views: 0




  • An Enhanced Jamming Attack Detection using Bittrickle Methodology

Abstract Views: 273  |  PDF Views: 0

Authors

K. Gayathri
Department of ECE, Angel College of Engineering and Technology, Tirupur, India
L. Kiruthika
Department of ECE, Angel College of Engineering and Technology, Tirupur, India
J. Rathika
Department of ECE, Angel College of Engineering and Technology, Tirupur, India
K. Renugadevi
Department of ECE, Angel College of Engineering and Technology, Tirupur, India
D. Sreearthi
Department of ECE, Angel College of Engineering and Technology, Tirupur, India

Abstract


When target devices are transmitting a reactive jammer jams the wireless channel; Reactive jamming is harder to track and compensate against the constant jamming methods. Frequency Hopping Spread Spectrum (FHSS) and Direct Sequence Spread Spectrum DSSS) have been widely used against Jamming attacks. If high power transmitter or frequency channel is jammed then both these method will fail.  We use broad band and high power reactive jammer to avoid jamming attacks. In this proposed method we use bit trickle method to avoid jamming. Bit Trickle is a method which is used to find attackers when using broadband communication between transmitter and receiver. Users having secret key to access the data from anti jammer. Once the security key is correct then only the transmission occurs.


Keywords


Wireless Network, Jamming, Anti-Jamming, Bit Trickle Method.

References