Mitigating Basestation Jamming in Sensor Networks - PowerPoint PPT Presentation

1 / 20
About This Presentation
Title:

Mitigating Basestation Jamming in Sensor Networks

Description:

Mitigating Base-station Jamming in. Sensor Networks. Sherif Khattab, Daniel ... Jamming Defense Power Efficiency (JDPE) (1 ... mitigates jamming attacks by ... – PowerPoint PPT presentation

Number of Views:38
Avg rating:3.0/5.0
Slides: 21
Provided by: sherifk
Category:

less

Transcript and Presenter's Notes

Title: Mitigating Basestation Jamming in Sensor Networks


1
Mitigating Base-station Jamming in Sensor
Networks
  • Sherif Khattab, Daniel Mossé, Rami Melhem
  • Department of Computer Science
  • University of Pittsburgh
  • WPDRTS
  • April 25, 2006

2
Example Application
3
Wireless sensor network
  • Base station sends query
  • Sensors collect and send data back
  • Attackers can cause
  • denial of service by
  • jamming the
  • base station

4
Replication
  • Replicating base stations
  • Effective?
  • Attackers can jam all replicas
  • Energy efficient?

5
Evasion
  • Single Mobile Base station
  • Effective?
  • Energy-efficient?

6
Honeybees (1/2)
  • Mobile base stations roam among collection points
    to collect data

7
Honeybees (2/2)
  • How many replicas?
  • How much evasion?

8
Attack Strategies
  • Attack target
  • Random vs. scheduled
  • When to move
  • Synchronized vs. unsynchronized

9
Defense Strategies
  • When to evade
  • Proactive, reactive, and hybrid
  • Where to evade
  • Random vs. Scheduled (pseudo-random)
  • Which Base station to move
  • Random vs. Jammed

10
Simulation Parameters
  • Base stations and attackers are PackBot robots
    www.packbot.com
  • 13 Km/h speed
  • 60 W moving power
  • Mobile base stations equipped with motes
  • Communication power 60 mW
  • 20 collection points
  • Travel time between collection points 100 seconds
    ( 360 m distance)
  • Simulation time 106 seconds

11
Metrics
  • Blocking Probability
  • Percentage of time all base stations are blocked
  • Relative Power Consumption
  • (Attack power consumption) / (Defense power
    consumption)
  • Jamming Defense Power Efficiency (JDPE)
  • (1- Blocking Probability)
  • (Attack-to-defense power ratio)

12
Attack Strategy
  • Periodically, a number of attackers move to
    unjammed collection points
  • We determine the best (from attack perspective)
    attack moving period experimentally
  • Against single mobile base station

13
Attack Strategy
14
Blocking Probability
15
Relative Power Consumption
16
JDPE
17
Two-party wireless communication
  • Attackers can jam a large number of radio
    frequencies

Frequencies
18
Solution
  • Data Replication with frequency hopping

Frequencies
19
Summary
  • Honeybees mitigates jamming attacks by combining
  • Replication of base stations and collection
    points
  • Evasion using pseudo-random hopping
  • Future work
  • Study interaction between other attack and
    replica strategies
  • Develop models for attack and defense strategies
  • Predict number of attackers and attack strategy
  • Adapt defense strategy accordingly

20
Questions?
Write a Comment
User Comments (0)
About PowerShow.com