[go: up one dir, main page]

Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 414-416.

• Information Security • Previous Articles     Next Articles

Modeling of Jamming Attack and Performance Analysis in Multi-hop Wireless Network

LIANG Tao1, WANG Tong-xiang 2, LIU Jian-wei2, YANG Jing3   

  1. (The 63rd Research Institute,National University of Defense Technology,Nanjing 210007,China)1;
    (College School,Army Engineering University of the PLA,Nanjing 210007,China)2;
    (Automatic Station of 94860 Troops,Nanjing 210018,China)3
  • Online:2019-11-10 Published:2019-11-20

Abstract: Multi-hop Wireless Network (MHWN) can be easily attacked by adversaries due to its shared nature and open access to the wireless medium.In order to reveal the character of jamming attack and analyze its impact on the network performance,three typical jamming attacks were studied in this paper.According to the stochastic geometry and jamming strategies,the memoryless jammer random jammer,and reactive jammer are modeled at first.Then,the power of jamming signals is calculated based on the jamming model and theoretical results of collision probability and average access delay for the network nodes are derived.At last,a series of the numerical tests are conducted.

Key words: Access delay, Collision probability, Jamming attack, Multi-hop wireless network

CLC Number: 

  • TN918
[1]王雪霞,张泽琦,李明,等.一种基于入侵检测的空间网络安全路由技术[J].电子技术应用,2015,41(4):101-104.
[2]WEI X,WANG Q,WANG T,et al.Jammer localization inmulti-hop wireless network:A comprehensive survey[J].IEEE Communications Surveys & Tutorials,2016,19(2):765-799.
[3]FENG J E,PASILIAO L,DIXON W,et al.An optimal jamming strategy to partition a wireless network[C]∥Military Communications Conference.Milcom,2015.
[4]GEZICI S,GHOLAMI M,BAYRAM S,et al.Optimal jamming of wireless localization systems[C]∥IEEE International Confe-rence on Communication Workshop.2015:2660-2676.
[5]AMURU S,TEKIN C,VAN M,et al.Buehrer.A systematic learning method for optimal jamming[C]∥IEEE International Conference on Communications.2015:2822-2827.
[6]BAYRAKTAROGLU E,KING C,LIU X,et al.Performance of IEEE 802.11 under jamming[J].Mobile Networks & Applications,2013,18(5):678-696.
[7]BIANCHI G.Performance analysis of the IEEE 802.11 distributed coordination function[J].IEEE Journal on Selected Areas in Communications,2000,18:535-547.
[8]CARVALHO M,GARCIALUNAACEVES S J.Delay Analysis of IEEE 802.11 in Single-Hop Networks[C]∥Proceedings of 11th IEEE International Conference on Network Protocals.IEEE,2003:146-155.
[1] GUO Fei-yan, TANG Bing. Mobile Edge Server Placement Method Based on User Latency-aware [J]. Computer Science, 2021, 48(1): 103-110.
[2] . Per-flow Admission Control with Adaptive Reservation of Bandwidth and Multiple QoS [J]. Computer Science, 2012, 39(8): 130-135.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!