• Title/Summary/Keyword: Jamming Attacks

Search Result 29, Processing Time 0.034 seconds

Multi-regional Anti-jamming Communication Scheme Based on Transfer Learning and Q Learning

  • Han, Chen;Niu, Yingtao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3333-3350
    • /
    • 2019
  • The smart jammer launches jamming attacks which degrade the transmission reliability. In this paper, smart jamming attacks based on the communication probability over different channels is considered, and an anti-jamming Q learning algorithm (AQLA) is developed to obtain anti-jamming knowledge for the local region. To accelerate the learning process across multiple regions, a multi-regional intelligent anti-jamming learning algorithm (MIALA) which utilizes transferred knowledge from neighboring regions is proposed. The MIALA algorithm is evaluated through simulations, and the results show that the it is capable of learning the jamming rules and effectively speed up the learning rate of the whole communication region when the jamming rules are similar in the neighboring regions.

Cognitive Radio Based Jamming Resilient Multi-channel MAC Protocol for Wireless Network

  • Htike, Zaw;Hong, Choong Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.679-680
    • /
    • 2009
  • Radio jamming attack is the most effective and easiest Denial-of-Service (DOS) attack in wireless network. In this paper, we proposed a multi-channel MAC protocol to mitigate the jamming attacks by using cognitive radio. The Cognitive Radio (CR) technology supports real-time spectrum sensing and fast channel switching. By using CR technologies, the legitimate nodes can perform periodic spectrum sensing to identify jamming free channels and when the jamming attack is detected, it can switch to un-jammed channel with minimum channel switching delay. In our proposed protocol, these two CR technologies are exploited for thwarting the jamming attacks.

A survey on Rendezvous Algorithms in Cognitive Radio Networks Under Jamming Attacks (재밍 공격 상황을 고려한 인지무선 네트워크에서의 랑데뷰 알고리즘들에 관한 분석)

  • Martin, Robin;Kim, Yongchul
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.209-219
    • /
    • 2021
  • The problem of congestion in the licensed radio channels spectrum can be solved by Cognitive Radio Networks (CRN). Several algorithms exist to ensure the rendezvous between Secondary Users (SUs), they are increasingly efficient, allowing faster rendezvous under multiple scenarios. In parallel, several jamming algorithms are developed to counter rendezvous which are also improving. The goal in CRN is to ensure the rendezvous by warding such jammers with robust algorithms. In this paper, we classify various jamming techniques and analyze the performance of various well-known rendezvous algorithms under jamming attacks.

Experimental Analysis of Physical Signal Jamming Attacks on Automotive LiDAR Sensors and Proposal of Countermeasures (차량용 LiDAR 센서 물리적 신호교란 공격 중심의 실험적 분석과 대응방안 제안)

  • Ji-ung Hwang;Yo-seob Yoon;In-su Oh;Kang-bin Yim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.217-228
    • /
    • 2024
  • LiDAR(Light Detection And Ranging) sensors, which play a pivotal role among cameras, RADAR(RAdio Detection And Ranging), and ultrasonic sensors for the safe operation of autonomous vehicles, can recognize and detect objects in 360 degrees. However, since LiDAR sensors use lasers to measure distance, they are vulnerable to attackers and face various security threats. In this paper, we examine several security threats against LiDAR sensors: relay, spoofing, and replay attacks, analyze the possibility and impact of physical jamming attacks, and analyze the risk these attacks pose to the reliability of autonomous driving systems. Through experiments, we show that jamming attacks can cause errors in the ranging ability of LiDAR sensors. With vehicle-to-vehicle (V2V) communication, multi-sensor fusion under development and LiDAR anomaly data detection, this work aims to provide a basic direction for countermeasures against these threats enhancing the security of autonomous vehicles, and verify the practical applicability and effectiveness of the proposed countermeasures in future research.

A Cooperative Smart Jamming Attack in Internet of Things Networks

  • Al Sharah, Ashraf;Owida, Hamza Abu;Edwan, Talal A.;Alnaimat, Feras
    • Journal of information and communication convergence engineering
    • /
    • v.20 no.4
    • /
    • pp.250-258
    • /
    • 2022
  • The emerging scope of the Internet-of-Things (IoT) has piqued the interest of industry and academia in recent times. Therefore, security becomes the main issue to prevent the possibility of cyberattacks. Jamming attacks are threads that can affect performance and cause significant problems for IoT device. This study explores a smart jamming attack (coalition attack) in which the attackers were previously a part of the legitimate network and are now back to attack it based on the gained knowledge. These attackers regroup into a coalition and begin exchanging information about the legitimate network to launch attacks based on the gained knowledge. Our system enables jammer nodes to select the optimal transmission rates for attacks based on the attack probability table, which contains the most probable link transmission rate between nodes in the legitimate network. The table is updated constantly throughout the life cycle of the coalition. The simulation results show that a coalition of jammers can cause highly successful attacks.

Detecting Jamming Attacks in MANET (MANET에서의 전파방해 공격 탐지)

  • Shrestha, Rakesh;Lee, Sang-Duk;Choi, Dong-You;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.482-488
    • /
    • 2009
  • Mobile Ad-hoc Networks provide communication without a centralized infrastructure, which makes them suitable for communication in disaster areas or when quick deployment is needed. On the other hand, they are susceptible to malicious exploitation and have to face different challenges at different layers due to its open Ad-hoc network structure which lacks previous security measures. Denial of service (DoS) attack is one that interferes with the radio transmission channel causing a jamming attack. In this kind of attack, an attacker emits a signal that interrupts the energy of the packets causing many errors in the packet currently being transmitted. In harsh environments where there is constant traffic, a jamming attack causes serious problems; therefore measures to prevent these types of attacks are required. The objective of this paper is to carry out the simulation of the jamming attack on the nodes and determine the DoS attacks in OPNET so as to obtain better results. We have used effective anomaly detection system to detect the malicious behaviour of the jammer node and analyzed the results that deny channel access by jamming in the mobile Ad-hoc networks.

Measurement-based Channel Hopping Scheme against Jamming Attacks in IEEE 802.11 Wireless Networks (IEEE 802.11 무선랜 재밍 환경에서의 측정 기반 채널 도약 기법)

  • Jeong, Seung-Myeong;Jeung, Jae-Min;Lim, Jae-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4A
    • /
    • pp.205-213
    • /
    • 2012
  • In this paper, we propose a new channel hopping scheme based on IEEE 802.11h as a good countermeasure against jamming attacks in IEEE 802.11 wireless networks. 802.11h Dynamic Frequency Selection (DFS) is a mechanism which enables hopping to a best channel with full channel measurement, not a randomly chosen channel, when the current link quality degradation occurs due to interferers such as military radars. However, under jammer attacks, this needs a time for full channel measurement before a new channel hopping and due to link disconnection during the time network performance degradation is inevitable. In contrast, our proposed schemes make an immediate response right after a jammer detection since every device is aware of next hopping channel in advance. To do this, a next hopping channel is announced by Beacon frames and the channel is selected by full channel measurement within Beacon intervals. Simulation results show that proposed scheme minimizes throughput degradation and keeps the advantages of DFS.

Malicious Attack Success Probability on the Change of Vulnerable Surfaces in MTD-SDR System (MTD-SDR 시스템의 취약요소 변경에 따른 악의적 공격 성공 확률)

  • Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.55-62
    • /
    • 2018
  • The MTD-based approach changes various operating parameters dynamically so that the vulnerability of the system can be protected from the malicious attack. In this paper, random/serial scanning/jamming attack success probabilities have been mathematically analyzed and verified through simulation to improve the security of the wireless communication systems in which the MTD-SDR technologies are applied. As a result, for random scanning attacks, attack success probability increases as the change period of transmission channel increases, while for random jamming attacks there is no change. The attack success probability patterns for serial attacks are similar to those of random attacks, but when the change period of transmission channel approaches to the total number of transmission channels, the success probability of serial attack is getting greater than that of random attack, up to twice in jamming attacks and up to 36% in scanning attacks.

Channel-Hopping Scheme for Enhancing Fairness Performance under Smart Jammer Attacks in Tactical WLANs (전술 무선랜 재밍 환경에서의 형평성 성능 향상을 위한 채널도약 기법)

  • Kim, Yongchul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.11
    • /
    • pp.2188-2195
    • /
    • 2015
  • In tactical wireless local area networks, jamming attack can easily occur by sending out continuous radio signals. The damage will be serious when the channel frequency is identical. Since wireless channel environment is open to everyone, the perfect solution for jamming attack does not exist. However, a channel-hopping scheme is well known for mitigating those jamming attacks. In this paper, I consider various channel-hopping schemes in order to analyze the throughput and fairness performance under smart jammer attack. Also an analytical model is introduced to evaluate the throughput performances of channel-hopping schemes. After analyzing well known channel-hopping schemes, I propose a simple channel-hopping scheme that can enhance fairness significantly at minimal throughput degradation expense.