Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 7

Integrated Intelligent Research (IIR) International Journal of Business Intelligents

Volume: 05 Issue: 01 June 2016 Page No.50-56


ISSN: 2278-2400

Mitigation and control of Defeating Jammers using P-1


Factorization
G Krithika 1, K Kamala2
1Student, ME-Communication Systems,krithika8793@gmail.com,Valliammai Engineering
College,Potheri,Chennai 603203.
2Assistant Professor(OG),kurrakamalareddy@gmail.com,Dept of ECE,Valliammai Engineering
College,Potheri, Chennai 603203

.Abstract— Jamming-resistant broadcast communication is from the network. TDBS differs from classical FHSS designs in
crucial for safety-critical applications such as emergency alert that two communicating nodes do not follow the same FH
broadcasts or the dissemination of navigation signals in sequence, but are assigned unique ones. TDBS is specifically
adversarial settings. These applications share the need for designed to fecilitate broadcasting in the presence of jammers
guaranteed authenticity and availability of messages which are [17], [9], [12] and in the absence of the coordination channel. We
broadcasted by base stations to a large and unknown number further consider the problem of updating the FH sequences of
existing nodes when the broadcast group is dynamic. This
of (potentially untrusted) receivers. Common techniques to
problem is mapped to the construction of rainbow path of fixed
counter jamming attacks such as Direct-Sequence Spread
size in proper edge- colored complete. Note that TDBS is not
Spectrum (DSSS) and Frequency Hopping are based on secrets
meant as a permanent replacement of the conventional broadcast
that need to be shared between the sender and the receivers mechanism. Broadcasting on a common frequency band achieves
before the start of the communication. However, broadcast anti the optimal communication efficiency in the absence of any
jamming communication that relies on Pollards Rho Method. jammer. TDBS is designed as an emergency mechanism for
In this work, we therefore propose a solution called P-Rho temporarily restoring communications until the jammer is
Method to enables spread-spectrum anti-jamming broadcast physically removed.
communication without the requirement of shared
II. ARCHITECTURE OF THE SYSTEM
secrets. complete our work with an experimental evaluation on
a prototype implementation. The architecture diagram shows that the messages in a network are
transmitted simultaneously through many paths. While reaching
Keywords—Jamming, Broadcast Communications, Wireless the server the messages are collected and identified the path
networks. through which the message is traversed. The path through which
the message is delayed while reaching the server is identified and
I. INTRODUCTION the jammer in that path is located using the JADE mechanism

Wireless communications are vulnerable to intentional


interference attacks, typically referred to as jamming.
Conventional anti-jamming techniques rely on spread spectrum
(SS) communications, such as direct sequence spread spectrum
(DSSS) and frequency hopping spread spectrum (FHSS) [17].
DSSS provides bit-level protection by spreading bits according
to a secret pseudorandom noise (PN) code, known only to the
communicating parties. In FHSS, the sender and the receiver
hop synchronously using a secret random frequency hopping
(FH) sequence [5], [10], [15]. For jamming-resistant broadcast
communications, a common secret to be shared between n the
sender and all (potentially non-trustworthy) receiver. The
disclosure of this common secret due to the compromise of any
receiver nullifies the SS gains [15], [17]. After the studies,
Researchers assumed that the jammer cannot flip a bit ‘1’ to a
bit ‘0’. It was shown that a jammer cannot erase packets from III. WORK DESCRIPTION
the wireless channel. They proposed a method called A. JAMMER
Uncoordinated DSSS (UDSSS) [15] and RD-DSS. We
propose the Time-Delayed Broadcast Scheme (TDBS) as an
To ensure the successful deployment of pervasive wireless
emergency mechanism for temporarily restoring broadcast
networks, it is crucial to localize jammers, since the locations of
communications until inside jammers are physically removed
jammers allow a better physical arrangement of wireless devices
50
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.50-56
ISSN: 2278-2400
that cause unintentional radio interference, or enable a wide {PJi }i∈[1,n] separately at the same time, and m nodes located at
range of defense strategies for combating malicious jamming {(xi , yi )}i∈[1,m] become boundary nodes. To calculate ez, each
attackers. There are many different attack strategies that boundary node measures JSS locally and we denote the JSS
jammers can perform in order to disrupt wireless measured at boundary node i as Pri which is a combined JSS
communications. It is impractical to cover all the possible from multiple jammers. We can include all the variables to be
jamming attack models that might exist. Thus, we mainly focus estimated, i.e., current estimation of the n jammers' locations and
on one common type of jammer - constant jammers. Constant the transmission powers, calculated in a form of matrix.
jammers continually emit radio signals, regardless of whether
the channel is idle or not. Such jammers can be unintentional F. MEASURE JSS
radio interferers that are always active or malicious jammers
that keep disturbing network communication. Besides, we Calculating JSS is equivalent to obtaining the average of the
assume each jammer is equipped with an omnidirectional Ambient Noise Floor (ANFs), i.e., mean (sa). In most cases, sc =
antenna. Thus, every jammer has a similar jamming range in all ∅ and sa ⊂ s. In a special case where no sender has ever
directions. Identification of jammers' positions will be transmitted packets throughout the process of obtaining n
performed after the jamming attack is detected, and we assume measurements, sc = ∅ and sa = s. The algorithm for calculating
the network is able to identify jamming attacks and obtain the the ANF should be able to cope with both cases. A regular node
number of jammers. will take n measurements of the ambient noise measurements. It
will consider the ANF as the average of all measurements if no
B.NETWORK CLASSIFICATION sender has trans- mitted during the period of measuring;
otherwise, the ANF is the average of sa, which can be obtained
We classify the network nodes based on the level of by filtering out sc from s. The intuition of differentiating those
disturbance caused by jammers, and identify the nodes that can two cases is that if only jamming signals are present, then the
participate in jammer localization, e.g., the ones that can variance of n measurements will be small; otherwise, the ambient
measure and report the JSS. Essentially, the communication noise measurements will vary as different senders happen to
range changes caused by jamming are reflected by the changes transmit. The correctness of the algorithm is supported by the fact
of neighbors at the network topology level. Thus, the network that sa is not likely to be empty due to carrier sensing, and the
nodes could be classified based on the changes of neighbors JSS approximately equals to the average.
caused by jamming. We define that node B is a neighbor of
node A if A can communicate with B prior to jamming. The
G. BEST ESTIMATION
network nodes can be classified into three categories according
to the impact of jamming: unaffected node, jammed node, and
The jammer localization problem can be modeled as a non-linear
boundary node.
optimization problem (defined in Problem 1), and finding a good
estimation of jammers' locations is equivalent to seeking the
C. EVALUATE METRIC
solution that minimizes the evaluation feedback metric ez . We
Essentially, our jammer localization approach works as use several heuristic search algorithms that rely on guided
follows. Given a set of JSS, for every estimated location, we random processes to approach the global optimum without
are able to provide a quantitative evaluation feedback converging to a local minimum.
indicating the distance between the estimated locations of
jammers and their true locations. For example, a small value of
evaluation feedback indicates that estimated locations are close H.GENETICALGORITHM
to the true ones, and vice versa.
Genetic algorithms (GA) searches for the global optimum by
mimicking the process of natural selection in biological
evolution. A GA iteratively generates a set of solutions known
D. SINGLE JAMMER
as a population. At each iteration, a GA selects a subset of
Assume a jammer J located at (xJ, yJ) starts to transmit at the solutions to form a new population based on their "fitness" and
power level of PJ, and m nodes located at {(xi, yi)}i∈[1,m] also randomly generates a few new solutions. As a result, the
become boundary nodes. To calculate ez, each boundary node "fitter" solutions will be inherited. At the same time, new
will first measure JSS locally and we denote the JSS measured solutions will be introduced to the population, which may turn
at boundary node i as Pri. Then the current estimation of the out to be "fitter" than ever. As a result, over successive
jammer J's location can be calculated. generations, a GA is likely to escape from local optima and
"evolves" towards an optimal solution.

E. MULTIPLE JAMMER I. SIMULATED ANNEALING ALGORITHM

Similar to single jammer, we assume n jammers located at {(xJi A simulated annealing algorithm (SA) searches for the optimal
, yJi )}i∈[1,n] start to transmit at the power level of solutions by modeling the physical process of heating a material

51
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.50-56
ISSN: 2278-2400
and then controlled lowering the temperature to decrease object). In other words, to use NS, you program in OTcl script
defects. At each iteration, the simulated annealing algorithm language. To setup and run a simulation network, a user should
compares the current solution with a randomly-generated new write an OTcl script that initiates an event scheduler, sets up the
solution. The new solution is selected according to a network topology using the network objects and the plumbing
probability distribution with a scale proportional to the functions in the library, and tells traffic sources when to start and
temperature, and it will replace the current solution according stop transmitting packets through the event scheduler. The term
to a probability governed by both the new object function value "plumbing" is used for a network setup, because setting up a
and temperature. network is plumbing possible data paths among network objects
by setting the "neighbor" pointer of an object to the address of an
IV. SIMULATION TOOL appropriate object. When a user wants to make a new network
object, he or she can easily make an object either by writing a
NS (version 2) is an object-oriented, discrete event driven new object or by making a compound object from the object
network simulator developed at UC Berkely written in C++ and library, and plumb the data path through the object. This may
OTcl. NS is primarily useful for simulating local and wide area sound like complicated job, but the plumbing OTcl modules
networks. Although NS is fairly easy to use once you get to actually make the job very easy. The power of NS comes from
know the simulator, it is quite difficult for a first time user, this plumbing.
because there are few user-friendly manuals. Even though there
is a lot of documentation written by the developers which has Another major component of NS beside network objects is the
in depth explanation of the simulator, it is written with the event scheduler. An event in NS is a packet ID that is unique for a
depth of a skilled NS user.The purpose of this project is to give packet with scheduled time and the pointer to an object that
a new user some basic idea of how the simultor works, how to handles the event. In NS, an event scheduler keeps track of
setup simulation networks, where to look for further simulation time and fires all the events in the event queue
information about network components in simulator codes, scheduled for the current time by invoking appropriate network
how to create new network components, etc., mainly by giving components, which usually are the ones who issued the events,
simple examples and brief explanations based on our and let them do the appropriate action associated with packet
experiences. Although all the usage of the simulator or possible pointed by the event. Network components communicate with
network simulation setups may not be covered in this project, one another passing packets, however this does not consume
the project should help a new user to get started quickly. actual simulation time. All the network components that need to
spend some simulation time handling a packet (i.e. need a delay)
NS is an event driven network simulator developed at UC use the event scheduler by issuing an event for the packet and
Berkeley that simulates variety of IP networks. It implements waiting for the event to be fired to itself before doing further
network protocols such as TCP and UPD, traffic source action handling the packet. For example, a network switch
behavior such as FTP, Telnet, Web, CBR and VBR, router component that simulates a switch with 20 microseconds of
queue management mechanism such as Drop Tail, RED and switching delay issues an event for a packet to be switched to the
CBQ, routing algorithms such as Dijkstra, and more. NS also scheduler as an event 20 microsecond later. The scheduler after
implements multicasting and some of the MAC layer protocols 20 microsecond dequeues the event and fires it to the switch
for LAN simulations. The NS project is now a part of the VINT component, which then passes the packet to an appropriate output
project that develops tools for simulation results display, link component. Another use of an event scheduler is timer. For
analysis and converters that convert network topologies example, TCP needs a timer to keep track of a packet
generated by well-known generators to NS formats. Currently, transmission time out for retransmission (transmission of a packet
NS (version 2) written in C++ and OTcl (Tcl script language with the same TCP packet number but different NS packet ID).
with Object-oriented extensions developed at MIT) is available. Timers use event schedulers in a similar manner that delay does.
The only difference is that timer measures a time value associated
with a packet and does an appropriate action related to that packet
after a certain time goes by, and does not simulate a delay.NS is
written not only in OTcl but in C++ also. For efficiency reason,
NS separates the data path implementation from control path
implementations. In order to reduce packet and event processing
time (not simulation time), the event scheduler and the basic
network component objects in the data path are written and
compiled using C++. These compiled objects are made available
Fig.2. Simplified View of NS to the OTcl interpreter through an OTcl linkage that creates a
matching OTcl object for each of the C++ objects and makes the
As shown in Figure in a simplified view, NS is Object-oriented control functions and the configurable variables specified by the
Tcl (OTcl) script interpreter that has a simulation event C++ object act as member functions and member variables of the
scheduler and network component object libraries, and network corresponding OTcl object. In this way, the controls of the C++
setup (plumbing) module libraries (actually, plumbing modules objects are given to OTcl. It is also possible to add member
are implemented as member functions of the base simulator functions and variables to a C++ linked OTcl object. The objects
52
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.50-56
ISSN: 2278-2400
in C++ that do not need to be controlled in a simulation or over wired and wireless networks. The simulator is a result of an
internally used by another object do not need to be linked to ongoing effort of research and developed. Even though there is a
OTcl. Likewise, an object (not in the data path) can be entirely considerable confidence in NS, it is not a polished product yet
implemented in OTcl. Figure 6.2 shows an object hierarchy and bugs are being discovered and corrected continuously. NS is
example in C++ and OTcl. One thing to note in the figure is written in C++, with an OTcl1 interpreter as a command and
that for C++ objects that have an OTcl linkage forming a configuration interface. The C++ part, which is fast to run but
hierarchy, there is a matching OTcl object hierarchy very slower to change, is used for detailed protocol implementation.
similar to that of C++. The OTcl part, on the other hand, which runs much slower but
can be changed very fast quickly, is used for simulation
configuration. One of the advantages of this split-language
program approach is that it allows for fast generation of large
scenarios. To simply use the simulator, it is sufficient to know
OTcl. On the other hand, one disadvantage is that modifying and
extending the simulator requires programming and debugging in
both languages.
NS can simulate the following:
1) Topology: Wired, wireless
Fig.3. C++ and OTcl: The Duality 2) Sheduling Algorithms: RED, Drop Tail,
3) Transport Protocols: TCP, UDP
4) Routing: Static and dynamic routing
5) Application: FTP, HTTP, Telnet, Traffic generators

A.NETWORK COMPONENTS

This section talks about the NS components, mostly compound


network components. Figure shows a partial OTcl class hierarchy
Fig.4. Architectural View of NS of NS, which will help understanding the basic network
Figure 8 shows the general architecture of NS. In this figure a components. The root of the hierarchy is the Tcl Object class that
general user (not an NS developer) can be thought of standing is the super class of all OTcl library objects (scheduler, network
at the left bottom corner, designing and running simulations in components, timers and the other objects including NAM related
Tcl using the simulator objects in the OTcl library. The event ones). As an ancestor class of Tcl Object, Ns Object class is the
schedulers and most of the network components are super class of all basic network component objects that handle
implemented in C++ and available to OTcl through an OTcl packets, which may compose compound network objects such as
linkage that is implemented using tclcl. The whole thing nodes and links. The basic network components are further
together makes NS, which is a OO extended Tcl interpreter divided into two subclasses, Connector and Classifier, based on
with network simulator libraries.This section briefly examined the number of the possible output DATA paths. The basic
the general structure and architecture of NS. At this point, one network and objects that have only one output DATA path are
might be wondering about how to obtain NS simulation results. under the Connector class, and switching objects that have
As shown in Figure 7, when a simulation is finished, NS possible multiple output DATA paths are under the Classifier
produces one or more text-based output files that contain class.
detailed simulation data, if specified to do so in the input Tcl
(or more specifically, OTcl) script. The data can be used for
simulation analysis (two simulation result analysis examples
are presented in later sections) or as an input to a graphical
simulation display tool called Network Animator (NAM) .
NAM has a nice graphical user interface similar to that of a CD
player (play, fast forward, rewind, pause and so on), and also
has a display speed controller. Furthermore, it can graphically
present information such as throughput and number of packet
drops at each link, although the graphical information cannot
be used for accurate simulation analysis.

Network simulator (NS) is an object–oriented, discrete event Fig.5. OTcl Class Hierarchy
simulator for networking research. NS provides substantial
A.CLASS TCL
support for simulation of TCP, routing and multicast protocols
53
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.50-56
ISSN: 2278-2400
The class Tcl encapsulates the actual instance of the OTcl class with multipleinheritance, one of two implementations can
interpreter and provides the methods to access and be chosen:
communicate with that interpreter, code. The class provides
methods for the following operations: 1.Either they can invoke one of the parent's command method,
1.obtain a reference to the Tel instance and return the result of that invocation.
2.invoke OTcl procedures through the interpreter 2. They can each of the parent's command methods in some
3.retrieve, or pass back results to the interpreter sequence, and return the result of the first invocation that is
successful. If none of them are successful, then they should
4.report error situations and exit in an uniform return an error.
manner
5.store and lookup "TclObjects"
6.acquire direct access to the interpreter. E.MOBILE NETWORKING

The wireless model essentially consists of the Mobile Node at the


B.OBTAIN A REFERENCE TO THE CLASS TCL core with additional supporting features that allows simulations
INSTANCE of multi-hop ad-hoc networks, wireless LANs etc. The Mobile
Node object is a split object. The C++ class Mobile Node is
A single instance of the class is declared in -tclcl/Tcl.cc as a
derived from parent class Node. A Mobile Node thus is the basic
static member variable. The statement required to access this
Node object with added functionalities of a wireless and mobile
instance is Tel& tel = Tcl::instance();
node like ability to move within a given topology, ability to
receive and transmit signals to and from a wireless channel etc. A
C. INVOKING OTCL PROCEDURES major difference between them is that a mobile Node is not
connected by means of Links to other nodes or mobile
There are four different methods to invoke an OTcl command
nodes.Mobile Node is the basic nsNode object with added
through the instance, tcl. They differ essentially in their calling
functionalities like movement, ability to transmit and receive on a
arguments. Each function passes a string to the interpreter that
channel that allows it to be used to create mobile, wireless
then evaluates the string in a global context. These methods
simulation environments. The class Mobile Node is derived from
will return to the caller if the interpreter returns TCL_OK. On
the base class Node. The four ad-hoc routing protocols that are
the other hand, if the interpreter returns TCL_ERROR, the
currently supported are, Dynamic Source Routing (DSR),
methods will call tkerror{}. The user can overload this
Temporally ordered Routing Algorithm (TORA) and Adhoc On-
procedure to selectively disregard certain types of errors.
demand Distance Vector (AODV).

1. Passing Results to/from the Interpreter : When the


F.TRACE ANALYSIS
interpreter invokes a C++ method, it expects the result
back in the private member variable, tcl-> result. This section shows a trace analysis. Running the TCL script
2. Error Reporting and Exit: This method provides a generates a
uniform way to report errors in the compiled code.
NAM trace file that is going to be used as an input to NAM and a
trace file called "out.tr" that will be used for our simulation
D.COMMAND METHODS: DEFINITION AND analysis. Figure shows the trace format and example trace DATA
INVOCATION from "out.tr". Where each line in trace file represents an event
associated to a packet.
For every TclObject that is created, ns establishes the instance
procedure,cmd{}, as a hook to executing methods through the
compiled shadow object. The procedure cmd{} invokes the G.NETWORK ANIMATOR (NAM)
method command() of the shadow object automatically, NAM-Tool for viewing network simulation traces and real world
passing the arguments to cmd{} as an argument vector to the packet teaches. It supports topology layout, packet level
command() method. The user can invoke the cmd {} method in animation and various DATA inspection tools. Before starting to
one of two ways, by explicitly invoking the procedure, use NAM, trace file need to be created. This trace file is usually
specifying the desired operation as the first argument, or generated by NS. It contains topology information, e.g. nodes and
implicitly, as if there were an instance procedure of the same links, as well as packet traces .during a simulation, the user can
name as the desired operation. Most simulation scripts will use produce topology configurations, layout information and packet
the latter form. If matched in this method, it must invoke its traces using tracing events in NS.Once the trace file is generated,
parent's command method, and return the corresponding result. NAM can be used to animate it.Upon startup, NAM will read the
This permits the user to conceive of operations as having the trace file, create topology, pop up a window, do layout if
same inheritance properties as instance procedures or compiled necessary and then pause at time 0. Through its user interface,
methods.In the event that this command method is defined for a NAM provides control over many aspects of animation. In Figure

54
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.50-56
ISSN: 2278-2400
a screenshot of a NAM window is shown, where the most
important function are explained. Although the NAM software
contains bugs, as do the NS software, it works fine most of the
times and times and causes only little trouble. NAM is an
excellent first step to check.

V. RESULTS AND DISCUSSIONS


NS2 is one of the most popular open source network
simulators. We conduct the following experiments with NS2.34 Fig.8. Source and Destination nodes Detected
simulator.A network is taken into consideration in which 50
nodes are randomly deployed. The time taken for simulation is D.IDENTIFICATION OF THE ROUTE TO TRANSMIT
30 ms. PACKETS

A.DEPLOYING THE NODES The route between source and destination nodes are identified
to transmit packets
The nodes are deployed in a random manner. The number of
nodes deployed are 50

Fig9. Path Identification


Fig.6. Deploying of Nodes
E.TRANSMITTING PACKETS AS NICAST
B.COVERAGE AREA TRANSMISSIONS

The coverage area of the neighboring nodes are identified After identifying the path between source and destination nodes
the packets are transmitted in unicast transmissions

Fig.7. Coverage area of Neighbouring Nodes


Fig.10. Unicast Transmission
C.DETERMINATION OF SOURCE AND
DESTINATION NODES
F.COMPLETION OF PACKET TRANSMISSION
The source and destination nodes are identified and marked
The packets are transmitted successfully even though jammer is
in different colors
present in the network or not

55
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.50-56
ISSN: 2278-2400
properties of TDBS under both an external and internal threat
model and shows that TDBS maintains broadcast
communications even when multiple nodes are compromised.In
future to ensure the successful deployment of pervasive wireless
networks, it is crucial to localize jammers, since the location of
jammers allow a better physical arrangement of wireless devices
that cause unintentional radio interference or enable a wide range
of defense strategies for combating malicious jamming attackers.
It mainly focuses on two types of jammers they are Reactive
jammer and Non Reactive jammers which emits radio signals
even when the network is idle.
Fig 11. Transmission Completed

G.PERFORMANCE ANALYSIS GRAPH REFERENCES

Performance analysis on delay time is measured between the [1] Abdel Rahman. M, Rahbari. H and Krunz. M (2012), “Adaptive
number of messages and delay time frequency hopping algorithms for multicast rendezvous in DSA
networks,” in Proc. IEEE DYSPAN Symp., pp. 517–528.
[2] Adamy. D (2001), EW 101: A First Course in Electronic Warfare.
Norwood, MA, USA: Artech House.
[3] Andersen. L. D (1989), “Hamilton circuits with many colours in
properly edge-coloured complete graphs,” Math. Scandinavica, vol.
64, pp. 5–14.
[4] Appel. K and Haken. W (1977), “Every planar map is four colourable:
Part I,” Illinois J. Math., vol. 21, no. 3, pp. 491–567.
[5] L. C, Bahn. W. L, Collins. M. D, Carlisle. M. C and Butler. S. C
(2007), “Keyless jam resistance,” in Proc. IEEE Workshop Inf.
Assurance United States Military Acad.
[6] Bahl. P, Chandra. R and Dunagan. J (2004), “SSCH: slotted seeded
channel hopping for capacity improvement in IEEE 802.11 ad-hoc
wireless networks,” in Proc. MOBICOM Conf., pp. 216–230.
[7] Bian. K, Park. J and Chen. R (2009), “A quorum-based framework for
Fig.12. Performance Graph establishing control channels in dynamic spectrum access networks,”
in Proc. MOBICOM Conf., pp. 25–36.
H.ENERGY GRAPH [8] Chan. A, Liu. X, Noubir. G and Thapa. B (2007), “Broadcast control
channel jamming: Resilience and identification of traitors,” in Proc.
ISIT Conf., pp. 2496–2500.
The graph is plotted between the drop rate and the packets [9] Chaporkar. P, Kar. K, Luo. X and Sarkar. S (Feb. 2008), “Throughput
and fairness guarantees through maximal scheduling in wireless
networks,” IEEE Trans. Inf. Theory, vol. 54, no. 2, pp. 572–594.
[10] Chiang. J. T and Hu. Y. C (2008), “Dynamic jamming mitigation for
wireless broadcast networks,” in Proc. INFOCOM Conf., pp. 1211–
1219.
[11] Dinitz. J. H and Stinson. D. R (1987), “A hill-climbing algorithm for
the construction of one-factorizations and room squares,” SIAM J.
Algebraic Discrete Meth., vol. 8, no. 3, pp. 430–438.
[12] Gupta. A, Lin. X and Srikant. R (Dec. 2009), “Low-complexity
distributed scheduling algorithms for wireless networks,” IEEE/ACM
Trans. Netw., vol. 17, no. 6, pp. 1846–1859.
[13] Ganeriwal. S, Popper. C, Capkun. S and Srivastava. M. B (2008),
“Secure time synchronization in sensor networks,” ACM Trans. Inf.
Fig.13. Energy Graph Syst. Security, vol. 11, no. 4, p. 23.
[14] Gollakota. S and Katabi. D (2008), “Zigzag decoding: Combating
hidden terminals in wireless networks,” in Proc. ACM SIGCOMM
Conf., pp. 159–170.
[15] Liu. S, Lazos. L and Krunz. M (2011), “Thwarting inside jamming
VI. CONCLUSION
attacks on wireless broadcast communications,” in Proc. 4th ACM
WiSec Conf., pp. 29–40.
The proposed TDBS is a scheme for jamming-resistant [16] Sisi Liu, Loukas Lazos and Marwan Krunz (May/Jun. 2015) “Time-
Delayed Broadcasting for Defeating Inside Jammers,” in Proc. IEEE
broadcast communications in the presence of inside jammers. Transactions On Dependable And Secure Computing, Vol. 12, No. 3.
In TDBS broadcast is realized as the series of unicast [17] [17] Zhang. Y, Yu. G, Li. Q, Wang. H, Zhu. H and Wang. B (Jun.
transmissions distributed in frequency and time. Further 2014), “Channel hopping-based communication rendezvous in
cognitive radio networks,” IEEE/ACM Trans. Netw., vol. 22, no. 3, pp.
developed mechanisms for updating the FH sequences assigned
889–902.
to nodes, when the broadcast group is dynamic. It mapped the
problem of minimizing the number of FH sequence changes
required for node addition. It analytically evaluates the security
56

You might also like