+ All Categories
Home > Documents > Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li,...

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li,...

Date post: 15-Dec-2015
Category:
Upload: makena-blessington
View: 222 times
Download: 0 times
Share this document with a friend
Popular Tags:
19
Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran (InfoComm ’07) Presented by Choi, Chang-Beom
Transcript

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks

Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran

(InfoComm ’07)

Presented by Choi, Chang-Beom

Introductions (1/2)

•Characteristic of jamming attacks (DoS)▫No special hardware is needed in order to

be launched

▫It can be implemented by simply listening to the open medium and broadcasting in the same frequency band as the network

▫If launched wisely, it can lead to significant benefits with small incurred cost for the attacker

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 2/$

Introductions (2/2)

•Vulnerabilities of Sensor Network▫Sensor networks rely on deployed miniature

energy constrained devices to perform a certain task without a central powerful monitoring point

•Controllable Jamming Attacks▫Easy to launch and difficult to detect and

confront▫Jammer controls probability of jamming and

transmission range in order to cause maximal damage to the network

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 3/$

Modeling Assumptions(1/4)

•Sensor network model▫Each node cannot transmit and receive

simultaneously▫There are always packets in each node’s

buffer in each slot▫Sensor nodes are uniformly distributed in a

region with spatial density ρ nodes per unit area

▫Sensor network topology is static

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 4/$

Modeling Assumptions(2/4)• Multiple access protocols are characterized by

a common channel access probability γ for all nodes in a slot▫Probability that a packet is transmitted to j is γ/ni

• Case of collision▫Receiver node j experiences collision if at least

two nodes in its neighborhood transmit packet simultaneously

▫Probability of collision 1 – Pr{only one or no neighbor transmits}

=

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 5/$

Modeling Assumptions(3/4)

•Attacker model▫The objective of the jammer is to corrupt

transmissions of legitimate nodes by causing packet collisions at receivers

▫Jammer controls the probability q of jamming the area within its transmission range in a slot to control the aggressiveness of the attack

▫Probability of collision

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 6/$

Modeling Assumptions(4/4)• Attack detection model

▫The monitoring mechanism Determination of a subset of nodes that will act as

network monitors Employment of a detection algorithm at each

monitor node▫Detection

During normal network operation, and in the absence of a jammer, it give a large enough training period (percentage of collisions)

Fix attention to a time window and check whether the percentage of collisions over this time window exceeds the learned long-term average or not

Wald’s Sequential Probability Ratio Test(SPRT) A. Wald, Sequential Analysis, Wiley 1947

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 7/$

Attacker Payoff(1/5)• Instantaneous Payoff of the attacker UmI

▫ It depends on jamming probability q and network access probability γ

▫Transmitters are uniformly distributed with density ργ

▫Total number of transmitters in the jammed area A is Poisson distributed with spatial density λ = ργ which is Aργ

▫The number of potential receivers is Aρ(1-γ)▫The probability of success of an attempted

transmission is

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 8/$

Attacker Payoff(2/5)• Instantaneous Payoff of the attacker UmI

▫ The number of successful transmission links Y follows the binomial distribution

▫ Payoff for the jammer

▫ Instantaneous pay off for the attacker that jams with probability q

▫ The instantaneous payoff for the network in the absence of jammer

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 9/$

Attacker Payoff(3/5)• Cumulative Payoff

▫The number of jammed links until the jammer is detected and the notification message is transferred out of the jammed area

▫The probability of successful channel access for a node on the route of the notification message in the presence of jamming

▫Average waiting time for node before successful transmission

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 10/$

Attacker Payoff(4/5) Cumulative Payoff

• Let average number of hops needed to deliver the alarm out of area be H▫The Average time needed for the alarm to

propagate out of the jamming area is

where is the average number of neighbors of a node along the path

• The total time until the jamming activity stops is

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 11/$

Where D(q,r) is detection time

Attacker Payoff(5/5) Cumulative Payoff

• Cumulative payoff

• Cumulative payoff for the network

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 12/$

•Constant Jamming Power and one monitor node▫The objective function is the total delay▫An adversary tries to maximize total delay

by controlling q▫The network tries to minimize total delay by

selecting γ

Problem Formulation

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 13/$

Attacker Problem Network Problem

Problem Formulation• Constant Jamming Power and one monitor node

▫With perfect knowledge Solution is determined by the energy and payoff

constraints

▫Without perfect knowledge Approximate the solution of the max-min(min-max)

problem

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 14/$

Attacker Problem Network Problem

Numerical Result For Lack of Knowledge Case

• Sensor node transmission range R = 20m

• Node density ρ =0.0025

• Energy constraint E/P = 500

• Payoff threshold U0 = 500 transmission

• Attacker transmission range Rm = 200m

• Energy constraint Em/Pm = 1000

• Target payoff U0m =

500• pFA = 0.02, pD =

0.98Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 15/$

Problem Formulation• Constant Jamming Power and several monitor

nodes▫Nodes can be classified in different classes C1,

… Ck such that nodes in class Cn have n neighbors

▫Assign the role of monitor to nodes of a class with n* neighbors to minimize detection time

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 16/$

Detection delay balancing problem

Since detection time is decreasing in q regardless of number of neighbors, the smallest feasible q imposed by the energy constraint is the solution for the attacker

Problem Formulation• Controllable Jamming Power and several

monitor nodes▫ Jammer can choose transmission power level with

probability qj such that ▫With probability q0 = 1 – q the jammer remains

silent▫Different jamming power levels lead to different

jamming area▫Monitor nodes located in outer zones

Perceive lower jamming probability, pass notification message faster

▫Monitor nodes located in inner zones Detect faster, delay in passing the message out of

the jamming areaOptimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 17/$

Problem Formulation

•Controllable Jamming Power and several monitor nodes▫Detection plus notification time for inner

zone

▫Detection plus notification time for outer zone

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 18/$

From numerical solutions for different , Optimal solution without knowledge of monitor neighborhood is to jam the inner region

The theoretical proof or disproof of this observation is deferred for future study

Conclusion• Controllable jamming attacks

▫ Easy to launch ▫ Difficult to detect and confront

▫ Comparisons between Perfect knowledge of the attacker and network strategy Lack of knowledge of the attacker and network strategy

• Further research▫ Consider about multi-channel networks▫ Find alternatives for modeling lack of knowledge for the

attacker and the network▫ Considering multiple potentially co operating attackers

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks 19/$


Recommended