[1]魏祥麟,胡永扬,王晓波,等.基于度分布的多跳无线网络干扰节点部署方法[J].南京理工大学学报(自然科学版),2015,39(05):590.
 Wei Xianglin,Hu Yongyang,Wang Xiaobo,et al.Jammer deployment in multi-hop wireless network based on degree distribution[J].Journal of Nanjing University of Science and Technology,2015,39(05):590.
点击复制

基于度分布的多跳无线网络干扰节点部署方法
分享到:

《南京理工大学学报》(自然科学版)[ISSN:1005-9830/CN:32-1397/N]

卷:
39卷
期数:
2015年05期
页码:
590
栏目:
出版日期:
2015-10-31

文章信息/Info

Title:
Jammer deployment in multi-hop wireless network based on degree distribution
作者:
魏祥麟胡永扬王晓波阚保强范建华
南京电讯技术研究所,江苏 南京 210007
Author(s):
Wei XianglinHu YongyangWang XiaoboKan BaoqiangFan Jianhua
Nanjing Telecommunication Technology Research Institute,Nanjing 210007,China
关键词:
多跳无线网络 干扰节点 度分布
Keywords:
multi-hop wireless network jammers degree distribution
分类号:
TP393
摘要:
针对多跳无线网络的干扰攻击大多从时域或频域角度展开,而对干扰节点的空域部署关注不足的问题,该文给出了干扰节点部署问题的通用描述。并针对以分组投递成功率为干扰对象的场景,提出了基于度分布的多跳无线网络干扰节点部署方法。该方法基于被动监听推断多跳无线网络节点的度分布,选择度较大的节点作为干扰对象,从而最大程度降低了网络的分组投递成功率。仿真试验结果表明,与现有随机方法相比,所提出的部署方法可以显著降低多跳无线网络的分组投递成功率,满足设计目标。
Abstract:
Existing jamming attacks on the multi-hop wireless network(MHWN)are mostly initiated in time or frequency area,and pay little attention on the jammer spatial deployment.In order to bridge this gap,a general description of the jammer deployment problem is firstly formalized here.Secondly,a jammer deployment method based on the network degree distribution theory is used for the situation where the jamming goal is to minimize the packet delivery ratio(PDR)of MHWN.The proposed method infers the nodes' degree based on passive network monitoring and chooses those nodes with the highest degree as the jamming targets which will make it efficiently decrease the PDR of the network.Simulation results show that,in comparison with the existing random deployment method,the proposed method can efficiently drop the PDR of MHWN and fulfill the design goal.

参考文献/References:

[1] 廖俊,刘耀宗,姜海涛,等.基于人工免疫的MANET,不端行为检测模型[J].南京理工大学学报,2011,35(5):652-658.
Liao Jun,Liu Yaozong,Jiang Haitao,et al.Artificial immunity-based misbehavior detection architecture for mobile ad hoc networks[J].Journal of Nanjing University of Science and Technology,2011,35(5):652-658.
[2]Xu Wenyuan,Trappe Wade,Zhang Yanyong,et al.The feasibility of launching and detecting jamming attacks in wireless networks[A].Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing(MobiHoc05)[C].Urbana-Cham-paign,US:ACM,2005:46-57.
[3]孙言强.无线传感器网络中干扰攻击关键技术研究[D].长沙:国防科技大学计算机学院,2012.
[4]姚富强.通信抗干扰工程与实践[M].北京:电子工业出版社,2008.
[5]Timothy X Brown,Jesse E James,Amita Sethi.Jamming and sensing of encrypted wireless ad hoc networks[A].Proc of the 7th ACM International Symp on Mobile Ad Hoc Networking and Computing(MobiHoc 2006)[C].New York,US:ACM Press,2006:120-130.
[6]Li Mingyan,Iordanis Koutsopoulos,Radha Poovendran.Optimal jamming attacks and network defense policies in wireless sensor networks[A].The 26th IEEE International Conference on Computer Communications(Infocom 2007)[C].Achorage,US:IEEE,2007:1307-1315.
[7]Devi L,Suganthi A.Denial of service attacks in wireless networks:The case of jammers[J].International Journal of Computer Science and Mobile Computing,2014,3(1):548-558.
[8]阚保强,范建华,卢紫毅,等.基于干扰动态性建模的 MHWN 多路径路由协议[J].中国科学(信息科学),2013,43:1483-1495.
Kan Baoqiang,Fan Jianhua,Lu Ziyi,et al.MHWN multipath routing protocol based on dynamic interference modeling[J].Scientia Sinica Informa-tionis,2013,43:1483-1495.
[9]Hinrich J H,Willkomm D.An empirical study of urban 2.4 GHz RF noise from the perspective of a body sensor network[A].Proceedings of the 2012 Ninth International Conference on Wearable and Implantable Body Sensor Networks(BSN)[C].London,UK:IEEE Computer Society,2012:73-78.
[10]Zhang Zhiguo,Wu Jingqi,Deng Jing,et al.Jamming ACK attack to wireless networks and a mitigation approach[A].Proceedings of the 2008 Global Telecommunications of Conference[C].New Orleans,US:IEEE,2008:1-5.

[11]Thuente D J,Acharya M.Intelligent jamming in wireless networks with applications to 802.11B and other Networks[A].Proc of 2006 IEEE Conference on Military Communications[C].Washing DC,US:IEEE,2006:1075-1081.

[12]孙言强,王晓东,周兴铭.无线网络中的干扰攻击[J].软件学报,2012,23(5):1207-1221.
Sun Yanqiang,Wang Xiaodong,Zhou Xingming.Jamming attacks in wireless network[J].Journal of Software,2012,23(5):1207-1221.

[13]陈林星,曾曦,曹毅.移动Ad Hoc网络——自组织分组无线网络技术[M].北京:电子工业出版社,2012.

备注/Memo

备注/Memo:
收稿日期:2014-09-16 修回日期:2014-12-01
基金项目:国家自然科学基金(61402521; 61201216); 江苏省自然科学基金(BK 20140068; BK2010133)
作者简介:魏祥麟(1985-),男,博士,工程师,主要研究方向:数据中心网络、多跳无线网络、移动云计算和软件定义网络,E-mail:wei_xianglin@163.com。
引文格式:魏祥麟,胡永扬,王晓波,等.基于度分布的多跳无线网络干扰节点部署方法[J].南京理工大学学报,2015,39(5):590-595.
投稿网址:http://zrxuebao.njust.edu.cn
DOI:10.14177/j.cnki.32-1397n.2015.39.05.013
更新日期/Last Update: 2015-10-31