Adaptive beam nulling in multihop ad hoc networks against a jammer in motion

نویسندگان

  • Suman Bhunia
  • Vahid Behzadan
  • Paulo Alexandre Regis
  • Shamik Sengupta
چکیده

In multihop ad hoc networks, a jammer can drastically disrupt the flow of information by intentionally interfering with links between a subset of nodes. The impact of such attacks can escalate when the jammer is moving. As a countermeasure for such attacks, adaptive beamforming techniques can be employed for spatial filtering of the jamming signal. This paper investigates the performance of adaptive beam nulling as a mitigation technique against jamming attacks in multihop ad hoc networks. Considering a moving jammer, a distributed beam nulling framework is proposed. The framework uses periodic measurements of the RF environment to detect direction of arrival (DoA) of jamming signal and suppresses the signals arriving from the current and predicted locations of the jammer. Also, in the calculation of nulled region, this framework considers and counters the effects of randomness in the mobility of the jammer, as well as errors in beam nulling and DoA measurements. Survivability of links and connectivity in such scenarios are studied by simulating various node distributions and different mobility patterns of the attacker. Also, the impact of errors in the estimation of DoA and beamforming on the overall network performance is also examined. In comparison with omnidirectional configuration, results indicate a 57.27% improvement in connectivity under jamming when the proposed framework is applied. A preliminary version of this paper appeared in the IEEE International Symposium on Cyberspace Safety and Security (CSS) 2015 [1]. This research was supported by NSF CAREER grant CNS #1346600 and and CAPES Brazil #13184/13-0. Email addresses: [email protected] (Suman Bhunia), [email protected] (Vahid Behzadan), [email protected] (Paulo Alexandre Regis) URL: http://www.cse.unr.edu/~shamik (Shamik Sengupta) Preprint submitted to Elsevier Computer Networks (COMNET) July 1, 2016

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intuitionistic fuzzy logic for adaptive energy efficient routing in mobile ad-hoc networks

In recent years, mobile ad-hoc networks have been used widely due to advances in wireless technology. These networks are formed in any environment that is needed without a fixed infrastructure or centralized management. Mobile ad-hoc networks have some characteristics and advantages such as wireless medium access, multi-hop routing, low cost development, dynamic topology and etc. In these netwo...

متن کامل

ADAPTIVE ORDERED WEIGHTED AVERAGING FOR ANOMALY DETECTION IN CLUSTER-BASED MOBILE AD HOC NETWORKS

In this paper, an anomaly detection method in cluster-based mobile ad hoc networks with ad hoc on demand distance vector (AODV) routing protocol is proposed. In the method, the required features for describing the normal behavior of AODV are defined via step by step analysis of AODV and independent of any attack. In order to learn the normal behavior of AODV, a fuzzy averaging method is used fo...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

Evaluating and Improving TCP Performance against Contention Losses in Multihop Ad Hoc Networks

Default TCP treats all losses as congestion since it was designed and optimized to work in networks with low noncongestion losses. In this paper first it is shown that the dominant cause of packet drops in multihop ad hoc network is medium access contention and congestion losses, are very rare. Then the most prevalent packet contention drops are analyzed and based on that a modification to both...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Computer Networks

دوره 109  شماره 

صفحات  -

تاریخ انتشار 2016