无线网络干扰攻击的能量和距离评估

Emilie Bout, V. Loscrí, A. Gallais
{"title":"无线网络干扰攻击的能量和距离评估","authors":"Emilie Bout, V. Loscrí, A. Gallais","doi":"10.1109/DS-RT50469.2020.9213652","DOIUrl":null,"url":null,"abstract":"Wireless networks are prone to jamming-type attacks due to their shared medium. An attacker node can send a radio frequency signal and if this signal interferes with the “normal” signals of two communicating nodes, the communication can be severely impacted. In this paper, we examine radio interference attacks from the jamming node perspective. In particular, we assume a “greedy” jamming node, whose main twofold objectives are to attack and interfere the communication of a transmitter and a receiver node, by minimizing its energy consumption and maximizing the detection time. The two communication nodes are static during the attack window time, while the attacker node can adapt its distance from the transmitter in order to select the most suitable range for a successful interference. In order to take into account the distance factor for the effectiveness of the attack, we derive an optimization model for representing the attack and we will study the key factors that allow effective and efficient implementation of a jamming attack, namely a) the energy b) the detection time and c) the impact on the transmission in terms of lowering the PDR. Three different types of attacks will be analyzed, 1) Constant Jamming, 2) Random Jamming and 3) Reactive Jamming. Simulation results show that the effectiveness of a jamming attack in respect to the others not only depends on the position of the jamming node but also on the distance between the transmitter and receiver nodes.","PeriodicalId":149260,"journal":{"name":"2020 IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications (DS-RT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Energy and Distance evaluation for Jamming Attacks in wireless networks\",\"authors\":\"Emilie Bout, V. Loscrí, A. Gallais\",\"doi\":\"10.1109/DS-RT50469.2020.9213652\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless networks are prone to jamming-type attacks due to their shared medium. An attacker node can send a radio frequency signal and if this signal interferes with the “normal” signals of two communicating nodes, the communication can be severely impacted. In this paper, we examine radio interference attacks from the jamming node perspective. In particular, we assume a “greedy” jamming node, whose main twofold objectives are to attack and interfere the communication of a transmitter and a receiver node, by minimizing its energy consumption and maximizing the detection time. The two communication nodes are static during the attack window time, while the attacker node can adapt its distance from the transmitter in order to select the most suitable range for a successful interference. In order to take into account the distance factor for the effectiveness of the attack, we derive an optimization model for representing the attack and we will study the key factors that allow effective and efficient implementation of a jamming attack, namely a) the energy b) the detection time and c) the impact on the transmission in terms of lowering the PDR. Three different types of attacks will be analyzed, 1) Constant Jamming, 2) Random Jamming and 3) Reactive Jamming. Simulation results show that the effectiveness of a jamming attack in respect to the others not only depends on the position of the jamming node but also on the distance between the transmitter and receiver nodes.\",\"PeriodicalId\":149260,\"journal\":{\"name\":\"2020 IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications (DS-RT)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications (DS-RT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/DS-RT50469.2020.9213652\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE/ACM 24th International Symposium on Distributed Simulation and Real Time Applications (DS-RT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/DS-RT50469.2020.9213652","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

摘要

无线网络由于其共享介质,容易受到干扰型攻击。攻击者节点可以发送射频信号,如果该信号干扰了两个通信节点的“正常”信号,则通信可能受到严重影响。在本文中,我们从干扰节点的角度来研究无线电干扰攻击。特别是,我们假设一个“贪婪”干扰节点,其主要目标是通过最小化其能量消耗和最大化检测时间来攻击和干扰发送端和接收端节点的通信。在攻击窗口时间内,两个通信节点是静态的,而攻击节点可以调整与发射机的距离,以选择最合适的距离进行成功的干扰。为了考虑攻击有效性的距离因素,我们推导了一个表示攻击的优化模型,我们将研究允许有效和高效实施干扰攻击的关键因素,即a)能量b)检测时间c)降低PDR对传输的影响。将分析三种不同类型的攻击,1)持续干扰,2)随机干扰和3)被动干扰。仿真结果表明,干扰攻击的有效性不仅与干扰节点的位置有关,还与收发节点之间的距离有关。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Energy and Distance evaluation for Jamming Attacks in wireless networks
Wireless networks are prone to jamming-type attacks due to their shared medium. An attacker node can send a radio frequency signal and if this signal interferes with the “normal” signals of two communicating nodes, the communication can be severely impacted. In this paper, we examine radio interference attacks from the jamming node perspective. In particular, we assume a “greedy” jamming node, whose main twofold objectives are to attack and interfere the communication of a transmitter and a receiver node, by minimizing its energy consumption and maximizing the detection time. The two communication nodes are static during the attack window time, while the attacker node can adapt its distance from the transmitter in order to select the most suitable range for a successful interference. In order to take into account the distance factor for the effectiveness of the attack, we derive an optimization model for representing the attack and we will study the key factors that allow effective and efficient implementation of a jamming attack, namely a) the energy b) the detection time and c) the impact on the transmission in terms of lowering the PDR. Three different types of attacks will be analyzed, 1) Constant Jamming, 2) Random Jamming and 3) Reactive Jamming. Simulation results show that the effectiveness of a jamming attack in respect to the others not only depends on the position of the jamming node but also on the distance between the transmitter and receiver nodes.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信