|Table of Contents|

Jammer deployment in multi-hop wireless network based on degree distribution


Research Field:
Publishing date:


Jammer deployment in multi-hop wireless network based on degree distribution
Wei XianglinHu YongyangWang XiaoboKan BaoqiangFan Jianhua
Nanjing Telecommunication Technology Research Institute,Nanjing 210007,China
multi-hop wireless network jammers degree distribution
Existing jamming attacks on the multi-hop wireless network(MHWN)are mostly initiated in time or frequency area,and pay little attention on the jammer spatial deployment.In order to bridge this gap,a general description of the jammer deployment problem is firstly formalized here.Secondly,a jammer deployment method based on the network degree distribution theory is used for the situation where the jamming goal is to minimize the packet delivery ratio(PDR)of MHWN.The proposed method infers the nodes' degree based on passive network monitoring and chooses those nodes with the highest degree as the jamming targets which will make it efficiently decrease the PDR of the network.Simulation results show that,in comparison with the existing random deployment method,the proposed method can efficiently drop the PDR of MHWN and fulfill the design goal.


[1] 廖俊,刘耀宗,姜海涛,等.基于人工免疫的MANET,不端行为检测模型[J].南京理工大学学报,2011,35(5):652-658.
Liao Jun,Liu Yaozong,Jiang Haitao,et al.Artificial immunity-based misbehavior detection architecture for mobile ad hoc networks[J].Journal of Nanjing University of Science and Technology,2011,35(5):652-658.
[2]Xu Wenyuan,Trappe Wade,Zhang Yanyong,et al.The feasibility of launching and detecting jamming attacks in wireless networks[A].Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing(MobiHoc05)[C].Urbana-Cham-paign,US:ACM,2005:46-57.
[5]Timothy X Brown,Jesse E James,Amita Sethi.Jamming and sensing of encrypted wireless ad hoc networks[A].Proc of the 7th ACM International Symp on Mobile Ad Hoc Networking and Computing(MobiHoc 2006)[C].New York,US:ACM Press,2006:120-130.
[6]Li Mingyan,Iordanis Koutsopoulos,Radha Poovendran.Optimal jamming attacks and network defense policies in wireless sensor networks[A].The 26th IEEE International Conference on Computer Communications(Infocom 2007)[C].Achorage,US:IEEE,2007:1307-1315.
[7]Devi L,Suganthi A.Denial of service attacks in wireless networks:The case of jammers[J].International Journal of Computer Science and Mobile Computing,2014,3(1):548-558.
[8]阚保强,范建华,卢紫毅,等.基于干扰动态性建模的 MHWN 多路径路由协议[J].中国科学(信息科学),2013,43:1483-1495.
Kan Baoqiang,Fan Jianhua,Lu Ziyi,et al.MHWN multipath routing protocol based on dynamic interference modeling[J].Scientia Sinica Informa-tionis,2013,43:1483-1495.
[9]Hinrich J H,Willkomm D.An empirical study of urban 2.4 GHz RF noise from the perspective of a body sensor network[A].Proceedings of the 2012 Ninth International Conference on Wearable and Implantable Body Sensor Networks(BSN)[C].London,UK:IEEE Computer Society,2012:73-78.
[10]Zhang Zhiguo,Wu Jingqi,Deng Jing,et al.Jamming ACK attack to wireless networks and a mitigation approach[A].Proceedings of the 2008 Global Telecommunications of Conference[C].New Orleans,US:IEEE,2008:1-5.

[11]Thuente D J,Acharya M.Intelligent jamming in wireless networks with applications to 802.11B and other Networks[A].Proc of 2006 IEEE Conference on Military Communications[C].Washing DC,US:IEEE,2006:1075-1081.

Sun Yanqiang,Wang Xiaodong,Zhou Xingming.Jamming attacks in wireless network[J].Journal of Software,2012,23(5):1207-1221.

[13]陈林星,曾曦,曹毅.移动Ad Hoc网络——自组织分组无线网络技术[M].北京:电子工业出版社,2012.


Last Update: 2015-10-31