A Novel Physical Channel Characteristics-based Channel Hopping Scheme for Jamming-resistant in Wireless Communication

نویسندگان

  • Qiuhua Wang
  • Hongxia Zhang
  • Qiuyun Lyu
  • Xiaojun Wang
  • Jianrong Bao
چکیده

Jamming is an effective denial-of-service (DoS) attack in wireless networks due to the open nature of radio propagation. In Jamming attack, the attacker purposely emits radio signals to corrupt the ongoing communication between the legitimate transmitter and receiver. Channel hopping is a feasible link-layer method for preventing jamming attack in wireless communications. In this paper, we propose a novel channel hopping scheme for jammingresistant in wireless communication. In our proposed scheme, we explore the reciprocity, randomness and spatial uncorrelation of the wireless fading channel to generate random channel hopping sequences. We evaluate our channel hopping scheme through real-world experiments on 802.11a 5 GHz band. Experiment results show that our scheme is efficient and secure, and achieves higher channel agreement ratio with almost equally channel distribution.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Throughput and Fairness Analysis of Channel-hopping Scheme under Smart Jammer Attacks in IEEE 802.11 WLANs

Jamming attack in wireless networks is a severe problem and is easily accomplished by emitting a continuous radio signal. Although the perfect solution to avoid jamming attack does not exist due to the nature of the wireless shared medium, a channel-hopping scheme is considered one of the most effective ways to mitigate jamming attacks. In this paper, I consider various channel-hopping schemes ...

متن کامل

The Effect of Increasing the Number of Transceivers in an Anti-jamming Channel-Hopping Scheme

—In this paper, we analyze a channel-hopping scheme under a smart jamming attack in wireless military communication systems. In particular, we focus on the effect of using multiple transceivers in channel-hopping schemes and compare them with the case of a single transceiver. To evaluate the performance of the multiple transceiver system, we present an analytical model that can calculate the a...

متن کامل

Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks

Wireless local area networks (WLANs) can adopt channel hopping technologies in order to avoid unintentional interferences such as radars or microwaves, which function as proactive jamming signals. Even though channel hopping technologies are effective against proactive types of jamming, it has been reported that reactive jammers could attack the targets through scanning busy channels. In this p...

متن کامل

Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks

Multi-radio (multi-interface, multi-channel) 802.11 and sensor networks have been proposed to increase network capacity and to reduce energy consumption, to name only a few of their applications. They are vulnerable, however, to jamming attacks, in which attackers block communication by radio interference or MAC-protocol violation. Two jamming countermeasures have been proposed, namely software...

متن کامل

A Two-Threshold Guard Channel Scheme for Minimizing Blocking Probability in Communication Networks

In this paper, we consider the call admission problem in cellular network with two classes of voice users. In the first part of paper, we introduce a two-threshold guard channel policy and study its limiting behavior under the stationary traffic. Then we give an algorithm for finding the optimal number of guard channels. In the second part of this paper, we give an algorithm, which minimizes th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • I. J. Network Security

دوره 20  شماره 

صفحات  -

تاریخ انتشار 2018