Wireless networks are prone to jamming-type attacks due to their shared medium. An attacker node can send a radio frequency signal and if this signal interferes with the "normal" signals of two communicating nodes, the communication can be severely impacted. In this paper, we examine radio interference attacks from the jamming node perspective. In particular, we assume a "greedy" jamming node, whose main twofold objectives are to attack and interfere the communication of a transmitter and a receiver node, by minimizing its energy consumption and maximizing the detection time. The two communication nodes are static during the attack window time, while the attacker node can adapt its distance from the transmitter in order to select the most suitable range for a successful interference. In order to take into account the distance factor for the effectiveness of the attack, we derive an optimization model for representing the attack and we will study the key factors that allow effective and efficient implementation of a jamming attack, namely a) the energy b) the detection time and c) the impact on the transmission in terms of lowering the PDR. Three different types of attacks will be analyzed, 1) Constant Jamming, 2) Random Jamming and 3) Reactive Jamming. Simulation results show that the effectiveness of a jamming attack in respect to the others not only depends on the position of the jamming node but also on the distance between the transmitter and receiver nodes.
The inherent openness of wireless communication techniques has made them vulnerable to jamming attacks. However, the effectiveness of a jamming attack depends on numerous parameters and varies according to the state of the environment. At the same time, attacks are becoming increasingly sophisticated and attempt to evade basic detection methods. Consequently, there is a real need to evaluate this new type of attack to improve the robustness of the detection and mitigation methods. A simulating tool to assess the impact of jamming attacks on wireless networks has become essential to gain effectiveness against attackers. This paper proposes a module of jamming attack for the discrete network simulator 3 (ns-3). This module, adaptable to any type of jamming attack strategy, provides a set of essential metrics allowing their evaluation. We evaluate the module by comparing the impacts of different types of jamming attacks already carried out in a real environment.
CCS CONCEPTS• Networks → Network simulations; • Security and privacy → Denial-of-service attacks.
The Internet of Things (IoT) represents an eclectic paradigm that is still growing in popularity. However, security aspects are a major concern for IoT devices due to their applications and the amount of sensitive data they provide. Simultaneously, the energy constraint in IoT networks remains a significant issue due to their limited resources. To reduce their energy consumption, several IoT protocols have integrated the energy-saving mode which offers four operating modes. On the basis of these four states, we derive an analysis framework, named HARPAGON, allowing an attacker to maximize his attack efficiency and minimize his impact in terms of energy consumption. Indeed, the effectiveness of many attacks depends principally on the state of the attacker and the victim at the same time. HARPAGON with the help of Markov Chains Theory allows to model the interaction between the attacker and its victims. In this paper, we demonstrate the effectiveness of the framework coupled to a jamming attack by comparing it to other types of jamming attacks. Experimental results reveal HARPAGON combined with jamming attack drastically reduces the performance of the network, with an impact on the Packet Error Rate (PER), which is around 13% higher than the reactive attack and with a reduced energy budget in respect of other two well-known "green" jamming attacks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.