A framework for energy-efficient adaptive jamming of adversarial communications

Jiasi Chen, Soumya Sen, Mung Chiang, David J. Dorsey

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

This work proposes a framework for jamming wireless networks that incorporates probabilistic models of internal states and observable characteristics of link protocols, where protocols are divided into two general classes: random access (RA) or channelized access (CA). Without exact knowledge of network parameters and internal state, the proposed intelligent jammer optimizes its strategy to be energy efficient while achieving the target throughput. Probabilistic models for jamming FDMA and CSMA-based protocols are described for illustration of the framework: A frequency-hopping voice network is analyzed to determine the optimal jam strategy for proactive frequency jammer; and a CSMA packet protocol is analyzed for varying packet arrival rates at the nodes. Since RA protocols display observable reaction to channel conditions, we propose a feedback-control loop that uses observable feedback to infer network parameters. Both protocols are evaluated through simulation for their energy-throughput tradeoff compared to a naive jammer.

Original languageEnglish (US)
Title of host publication2013 47th Annual Conference on Information Sciences and Systems, CISS 2013
DOIs
StatePublished - 2013
Event2013 47th Annual Conference on Information Sciences and Systems, CISS 2013 - Baltimore, MD, United States
Duration: Mar 20 2013Mar 22 2013

Publication series

Name2013 47th Annual Conference on Information Sciences and Systems, CISS 2013

Other

Other2013 47th Annual Conference on Information Sciences and Systems, CISS 2013
Country/TerritoryUnited States
CityBaltimore, MD
Period3/20/133/22/13

All Science Journal Classification (ASJC) codes

  • Information Systems

Fingerprint

Dive into the research topics of 'A framework for energy-efficient adaptive jamming of adversarial communications'. Together they form a unique fingerprint.

Cite this