ABSTRACT
Mobile ad-hoc and sensor networks play an important role in several application fields. The usage of wireless links and the node mobility make the networks prone to security attacks; among these, jamming attacks are insidious and they consist of one or more nodes continuously transmitting dummy packets to keep some wireless links busy. The goal is to destroy the network connectivity or highly reduce its throughput. In this paper we propose a probabilistic formal method, based on a process algebraic approach, targeted at the analysis of connectivity and the evaluation of interference in mobile networks. We show our framework at work on the analysis of an indoor wireless communication scenario.
- M. Bernardo and M. Bravetti. Performance measure sensitive congruences for Markovian process algebras. Theoretical Computer Science, 290(1):117--160, 2003. Google ScholarDigital Library
- M. Bugliesi, L. Gallina, S. Hamadou, A. Marin, and S. Rossi. Interference-sensitive preorders for manets. Technical Report DAIS-2011-10, University Ca' Foscari Venice, 2011.Google Scholar
- I. D. Chakeres and E. M. Belding-Royer. AODV routing protocol implementation design. In Proc. of 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04), volume 7, pages 698--703. IEEE, 2004. Google ScholarDigital Library
- L. Gallina, S. Hamadou, A. Marin, and S. Rossi. A probabilistic energy-aware model for mobile ad-hoc networks. In Proc. of the 18th International Conference on Analytical and Stochastic Modelling Techniques and Applications (ASMTA'11), volume 6751 of LNCS, pages 316--330. Springer-Verlag, 2011. Google ScholarDigital Library
- J. Goubault-Larrecq, C. Palamidessi, and A. Troina. A probabilistic applied pi-calculus. In Proc. of the 5th Asian Symposium on Programming Languages and Systems (APLAS'07), volume 4807 of LNCS, pages 175--190. Springer-Verlag, 2007. Google ScholarDigital Library
- G. Hiertz, D. Denteneer, S. Max, R. Taori, J. Cardona, L. Berlemann, and B. Walke. IEEE 802.11s: the wlan mesh standard. Wireless Communications, IEEE, 17(1):104--111, 2010. Google ScholarDigital Library
- J. Hillston. A Compositional Approach to Performance Modelling. Cambridge University Press, 1996. Google ScholarDigital Library
- M. Kwiatkowska and D. Parker. Advances in probabilistic model checking. In Proc. 2011 Marktoberdorf Summer School: Tools for Analysis and Verification of Software Safety and Security. IOS Press, 2012. To appear.Google Scholar
- I. Lanese and D. Sangiorgi. An operational semantics for a calculus for wireless systems. Theoretical Computer Science, 411(19):1928--1948, 2010. Google ScholarDigital Library
- M.Bugliesi, L.Gallina, S. Hamaodu, A. Marin, and S. Rossi. Interference-sensitive preorders for manets. In Proc. 9th International Conference on Quantitative Evaluation of SysTems (QEST'12). IEEE, 2012. Google ScholarDigital Library
- R. Milner and D. Sangiorgi. Barbed bisimulation. In Proc. of International Colloquium on Automata, Languages and Programming (ICALP'92), volume 623 of LNCS, pages 685--695. Springer-Verlag, 1992. Google ScholarDigital Library
- E. M. Royer and C. E. Perkins. Multicast operation of the ad-hoc on-demand distance vector routing protocol. In Proc. of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pages 207--218. ACM, 1999. Google ScholarDigital Library
- R. Segala and N. Lynch. Probabilistic simulations for probabilistic processes. In Proc. of the 5th International Conference on Concurrency Theory (CONCUR'94), volume 836 of LNCS, pages 481--496. Springer-Verlag, 1994. Google ScholarDigital Library
- M. Strasser, B. Danev, and S. Čapkun. Detection of reactive jamming in sensor networks. ACM Transactions on Sensor Networks, 7:16:1--16:29, 2010. Google ScholarDigital Library
- W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In Proc. of the 6th ACM International Symposium on Mobile ad hoc Networking and Computing, pages 46--57. ACM, 2005. Google ScholarDigital Library
Index Terms
- Evaluating resistance to jamming and casual interception in mobile wireless networks
Recommendations
A hybrid probabilistic counter-based broadcast approach protocol for Mobile Ad hoc Networks
Broadcast has been widely used in Mobile Ad Hoc Networks (MANETs) to disseminate information to all reachable nodes. However, the conventional broadcast scheme using simple flooding mechanism suffers from broadcast storm problem characterised by ...
Compromise-resilient anti-jamming communication in wireless sensor networks
Jamming is a kind of Denial-of-Service attack in which an adversary purposefully emits radio frequency signals to corrupt the wireless transmissions among normal nodes. Although some research has been conducted on countering jamming attacks, few works ...
Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks
IEEE 802.11 access points deployed in shopping malls, university campuses, crowded streets, airports, and many other locations provide ubiquitous Internet access to millions of stations. However, these hot spots are vulnerable to Denial-of-Service (DoS) ...
Comments