TY - GEN
T1 - Identifying insider-based jammers in multi-channel wireless networks
AU - Nguyen, Hoang
AU - Pongthawornkamol, Thadpong
AU - Nahrstedt, Klara
PY - 2010
Y1 - 2010
N2 - We consider the problem of identifying insider-based attacks in the form of jammers in multi-channel wireless networks, where jammers have the inside knowledge of frequency hopping patterns and any protocols used in the wireless network. We propose a novel technique, called "alibi", to identify the insider-based jammers in multi-channel wireless networks. Alibi is a form of defense whereby a defendant attempts to prove that he or she was elsewhere when the crime in question was committed. Starting from such simple concept, we develop an alibi framework to cope with insider-based jamming attackers in various situations including single/multiple jammer and lossy channels. We evaluate the framework according to several properties such as accuracy, detection time and network performance via TOSSIM simulation and analysis. The overall results of these protocols show a promising research direction to deal with insider-based jamming attacks.
AB - We consider the problem of identifying insider-based attacks in the form of jammers in multi-channel wireless networks, where jammers have the inside knowledge of frequency hopping patterns and any protocols used in the wireless network. We propose a novel technique, called "alibi", to identify the insider-based jammers in multi-channel wireless networks. Alibi is a form of defense whereby a defendant attempts to prove that he or she was elsewhere when the crime in question was committed. Starting from such simple concept, we develop an alibi framework to cope with insider-based jamming attackers in various situations including single/multiple jammer and lossy channels. We evaluate the framework according to several properties such as accuracy, detection time and network performance via TOSSIM simulation and analysis. The overall results of these protocols show a promising research direction to deal with insider-based jamming attacks.
UR - http://www.scopus.com/inward/record.url?scp=79551623022&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=79551623022&partnerID=8YFLogxK
U2 - 10.1109/GLOCOM.2010.5683229
DO - 10.1109/GLOCOM.2010.5683229
M3 - Conference contribution
AN - SCOPUS:79551623022
SN - 9781424456383
T3 - GLOBECOM - IEEE Global Telecommunications Conference
BT - 2010 IEEE Global Telecommunications Conference, GLOBECOM 2010
T2 - 53rd IEEE Global Communications Conference, GLOBECOM 2010
Y2 - 6 December 2010 through 10 December 2010
ER -