{"title":"Colluding Jamming Attack on a Grand Coalition by Aggrieved Nodes","authors":"A. Sharah, T. Oyedare, S. Shetty","doi":"10.4236/CN.2016.82007","DOIUrl":null,"url":null,"abstract":"Mobile Ad-Hoc Networks (MANETs) are highly vulnerable to insider jamming \nattacks. Several approaches to detect insider jammers in MANET have been \nproposed. However, once the insider jammer is detected and removed from the \nnetwork, it is possible for the insider jammer to leverage the knowledge of \ninsider information to launch a future attack. In this paper, we focus on collaborative \nsmart jamming attacks, where the attackers who have been detected as insider jammers \nin a MANET, return to attack the MANET based on the knowledge learned. The \nMANET uses a reputation-based coalition game to detect insider jammers. In the \ncollaborative smart jamming attack, two or more smart jammers will form a \ncoalition to attack the coalitions in the MANET. The smart jammers were \ndetected and then excluded from their initial coalition, they then regrouped to \nstart their own coalition and share previously gained knowledge about \nlegitimate nodes in their erstwhile coalition with the aim of achieving a \nhighly coordinated successful jamming attack on the legitimate coalition. The \nsuccess of the attack largely depends on the insider jammer’s collective \nknowledge about the MANET. We present a technique to appropriately represent \nknowledge gathered by insider jammers which would lead to a successful attack. \nSimulation results in NS2 depict that coalition of jammers can leverage past \nknowledge to successfully attack MANET.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"20 1","pages":"57-66"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4236/CN.2016.82007","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
Mobile Ad-Hoc Networks (MANETs) are highly vulnerable to insider jamming
attacks. Several approaches to detect insider jammers in MANET have been
proposed. However, once the insider jammer is detected and removed from the
network, it is possible for the insider jammer to leverage the knowledge of
insider information to launch a future attack. In this paper, we focus on collaborative
smart jamming attacks, where the attackers who have been detected as insider jammers
in a MANET, return to attack the MANET based on the knowledge learned. The
MANET uses a reputation-based coalition game to detect insider jammers. In the
collaborative smart jamming attack, two or more smart jammers will form a
coalition to attack the coalitions in the MANET. The smart jammers were
detected and then excluded from their initial coalition, they then regrouped to
start their own coalition and share previously gained knowledge about
legitimate nodes in their erstwhile coalition with the aim of achieving a
highly coordinated successful jamming attack on the legitimate coalition. The
success of the attack largely depends on the insider jammer’s collective
knowledge about the MANET. We present a technique to appropriately represent
knowledge gathered by insider jammers which would lead to a successful attack.
Simulation results in NS2 depict that coalition of jammers can leverage past
knowledge to successfully attack MANET.