skip to main content
10.1145/2387238.2387265acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Evaluating resistance to jamming and casual interception in mobile wireless networks

Published:21 October 2012Publication History

ABSTRACT

Mobile ad-hoc and sensor networks play an important role in several application fields. The usage of wireless links and the node mobility make the networks prone to security attacks; among these, jamming attacks are insidious and they consist of one or more nodes continuously transmitting dummy packets to keep some wireless links busy. The goal is to destroy the network connectivity or highly reduce its throughput. In this paper we propose a probabilistic formal method, based on a process algebraic approach, targeted at the analysis of connectivity and the evaluation of interference in mobile networks. We show our framework at work on the analysis of an indoor wireless communication scenario.

References

  1. M. Bernardo and M. Bravetti. Performance measure sensitive congruences for Markovian process algebras. Theoretical Computer Science, 290(1):117--160, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Bugliesi, L. Gallina, S. Hamadou, A. Marin, and S. Rossi. Interference-sensitive preorders for manets. Technical Report DAIS-2011-10, University Ca' Foscari Venice, 2011.Google ScholarGoogle Scholar
  3. I. D. Chakeres and E. M. Belding-Royer. AODV routing protocol implementation design. In Proc. of 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04), volume 7, pages 698--703. IEEE, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. L. Gallina, S. Hamadou, A. Marin, and S. Rossi. A probabilistic energy-aware model for mobile ad-hoc networks. In Proc. of the 18th International Conference on Analytical and Stochastic Modelling Techniques and Applications (ASMTA'11), volume 6751 of LNCS, pages 316--330. Springer-Verlag, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Goubault-Larrecq, C. Palamidessi, and A. Troina. A probabilistic applied pi-calculus. In Proc. of the 5th Asian Symposium on Programming Languages and Systems (APLAS'07), volume 4807 of LNCS, pages 175--190. Springer-Verlag, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. G. Hiertz, D. Denteneer, S. Max, R. Taori, J. Cardona, L. Berlemann, and B. Walke. IEEE 802.11s: the wlan mesh standard. Wireless Communications, IEEE, 17(1):104--111, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. J. Hillston. A Compositional Approach to Performance Modelling. Cambridge University Press, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Kwiatkowska and D. Parker. Advances in probabilistic model checking. In Proc. 2011 Marktoberdorf Summer School: Tools for Analysis and Verification of Software Safety and Security. IOS Press, 2012. To appear.Google ScholarGoogle Scholar
  9. I. Lanese and D. Sangiorgi. An operational semantics for a calculus for wireless systems. Theoretical Computer Science, 411(19):1928--1948, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. M.Bugliesi, L.Gallina, S. Hamaodu, A. Marin, and S. Rossi. Interference-sensitive preorders for manets. In Proc. 9th International Conference on Quantitative Evaluation of SysTems (QEST'12). IEEE, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Milner and D. Sangiorgi. Barbed bisimulation. In Proc. of International Colloquium on Automata, Languages and Programming (ICALP'92), volume 623 of LNCS, pages 685--695. Springer-Verlag, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. E. M. Royer and C. E. Perkins. Multicast operation of the ad-hoc on-demand distance vector routing protocol. In Proc. of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking, pages 207--218. ACM, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. R. Segala and N. Lynch. Probabilistic simulations for probabilistic processes. In Proc. of the 5th International Conference on Concurrency Theory (CONCUR'94), volume 836 of LNCS, pages 481--496. Springer-Verlag, 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Strasser, B. Danev, and S. Čapkun. Detection of reactive jamming in sensor networks. ACM Transactions on Sensor Networks, 7:16:1--16:29, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In Proc. of the 6th ACM International Symposium on Mobile ad hoc Networking and Computing, pages 46--57. ACM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Evaluating resistance to jamming and casual interception in mobile wireless networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          MSWiM '12: Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
          October 2012
          428 pages
          ISBN:9781450316286
          DOI:10.1145/2387238

          Copyright © 2012 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 21 October 2012

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate398of1,577submissions,25%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader