Abstract
Many of the failures suffered by wireless systems are not accidental; they are actually caused by security breaches. Therefore, the conventional QoS measures are not sufficient for quantifying the performance of wireless systems. In fact, there is a need for security-related QoS measures that describe the performance of wireless systems under security-breaches. In this paper we focus on Jamming which is one of the most common security breaches in wireless systems. We propose a mathematical model for jamming-tolerant wireless systems. Our model is based on the theory of semi-Markov processes (SMPs). By analyzing the steady-state behavior of the proposed SMP, we derive security-related performance measures such as the steady-state availability and the “mean time to process a packet” (MTTPP). By studying the transient behavior of the proposed SMP, we derive the “probability of packet failure” (PPF) and the “mean time to packet failure” (MTTPF) performance measures. With the proposed model, we analyze the performance of a real jamming-tolerant wireless system for smart grid applications and the numerical results are presented.
Similar content being viewed by others
References
Adamy D (2001) A first course in electronic warfare. Artech House, Norwood
Bany Salameh H, Almajali S, Ayyash M, Elgala H (2017) Security-aware channel assignment in iot-based cognitive radio networks for time-critical applications. In: Fourth International Conference on Software Defined Systems (SDS-2017)
Bayraktaroglu E, King C, Liu C, Noubir G, Rajaraman R, Thapa B (2008) On the performance of ieee 802.11 under jamming. In: IEEE International Conference on Computer Communications (INFOCOM), pp 1265–1273
Besharati E, Naderan M, Namjoo E (2018) Lr-hids: logistic regression host-based intrusion detection system for cloud environments. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-018-1093-8
Chen J, Tian Z, Cui X, Yin L, Wang X (2018) Trust architecture and reputation evaluation for internet of things. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-018-0887-z
Danish SM, Nasir A, Qureshi HK, Ashfaq AB, Mumtaz S, Rodriguez J (2018) Network intrusion detection system for jamming attack in lorawan join procedure. In: 2018 IEEE International Conference on Communications (ICC), p. 1–6
Gao Jingcheng, Xiao Yang, Liu Jing, Liang Wei, Philip Chen CL (2012) A survey of communication/networking in smart grids. Future Gener Comput Syst 28(2):391–404
Gupta A, Jha RK (2015) Security threats of wireless networks: A survey. In: International Conference on Computing, Communication Automation, pp 389–395
Hassan SF, Mahmood A, Hassan SA, Gidlund M (2018) Wireless mediation of multiple equi-priority events in time-critical industrial applications. In: Proceedings of the 1st ACM MobiHoc Workshop on Networking and Cybersecurity for Smart Cities, SmartCitiesSecurity’18, pp 2:1–2:6, New York, NY, USA
Jha S, Sheyner O, Wing JM (2002) Minimization and reliability analyses of attack graphs, technical report, cmu technical report no. cmu-cs-2-109
Jonsson E, Olovsson T (1997) A quantitative model of the security intrusion process based on attacker behavior. IEEE Trans Softw Eng 23(4):235–245
Karaağaç A, Haxhibeqiri J, Moerman I, Hoebeke J, (2018) Time-critical communication in 6tisch networks. In: 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), pp 161–166
Kurose J, Ross K (2012) computer networking: a top-down approach, 6th edn. Pearson, London
Li M, Koutsopoulos I, Poovendran R (2007) Optimal jamming attacks and network defense policies in wireless sensor networks. In: IEEE International Conference on Computer Communications (INFOCOM)
Li M, Koutsopoulos I, Poovendran R (2007) Optimal jamming attacks and network defense policies in wireless sensor networks. In: IEEE International Conference on Computer Communications (INFOCOM), pp 1307–1315
Lin Jie, Wei Yu, Zhang Nan, Yang Xinyu, Zhang Hanlin, Zhao Wei (2017) A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125–1142
Lin G, Noubir G (2005) On link layer denial of service in data wireless lans. Wirel Commun Mobile Comput 5(3)
Lu Z, Wang W, Wang C (2014) Modeling, evaluation and detection of jamming attacks in time-critical wireless applications. IEEE Trans Mob Comput 13(8):1746–1759
Lu Z, Wang W, Wang C (2011) From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic. In: IEEE International Conference on Computer Communications (INFOCOM), pp 1871–1879
Madan B, Goševa-Popstojanova K, Vaidyanathan K, Trivedi K (2004) A method for modeling and quantifying the security attributes of intrusion tolerant systems. Perform Eval 56(1–4):167–186
Madwifi-team (2018) The madwifi project. http://madwifi-project.org
Murata-team (2018) Wsn802g-e integration guide. www.murata.com
Olovsson T, Jonsson E, Brocklehurst S, Littlewood B (1995) Towards operational measures of computer security: experimentation and modelling. In: Randell B, Laprie J-C, Kopetz H, Littlewood B (eds) Predictably dependable computing systems. Springer, Berlin, pp 555–569
Ortalo R, Deswarte Y, Kaaniche M (1999) Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Trans Softw Eng 25(5):633–650
Park S-T, Li G, Hong J-C (2018) A study on smart factory-based ambient intelligence context-aware intrusion detection system using machine learning. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-018-0998-6
Poisel RA (2006) Modern communications jamming principles and techniques. Artech House, Norwood
Rangelov Y, Nikolaev N, Ivanova M (2016) The iec 61850 standard—communication networks and automation systems from an electrical engineering point of view
Salameh HAB, Almajali S, Ayyash M, Elgala H (2018) Spectrum assignment in cognitive radio networks for internet-of-things delay-sensitive applications under jamming attacks. IEEE Internet Things J 5(3):1904–1913
Strasser M, Capkun S, Popper C, Cagalj M (2005) Jamming-resistant key establishment using uncoordinated frequency hopping. In: IEEE Symposium on Security and Privacy, pp 64–78
Surya Prabha M, Sarojini B (2017) Survey on big data and cloud computing. In: World Congress on Computing and Communication Technologies (WCCCT), Tiruchirappalli, India
Toledo AL, Wang X (2008) Robust detection of mac layer denial-of-service attacks in csma/ca wireless networks. IEEE Trans Info Forensics Secur 3:347–358
Trivedi K (2001) Probability and statistics with reliability, queuing, and computer science applications, 2nd edn. Wiley, Chichester
Trivedi K, Bobbio A (2017) Reliability and availability engineering, modeling, analysis, and applications. Cambridge University Press, Cambridge
USRP team (2018) Usrp n210 software defined radio (sdr). https://www.ettus.com
Xu W, Trappe W, Zhang Y (2006) Channel surfing: defending wireless sensor networks from jamming and interference. In ACM Conference on Embedded Networked Sensor Systems (SenSys)
Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
Yang Yuchen, Longfei Wu, Yin Guisheng, Li Lijie, Zhao Hongbin (2017) A survey on security and privacy issues in internet-of-things. IEEE Internet Things J 4(5):1250–1258
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Halloush, R., Liu, H. Modeling and performance evaluation of jamming-tolerant wireless systems. J Ambient Intell Human Comput 10, 4361–4375 (2019). https://doi.org/10.1007/s12652-018-1113-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-018-1113-8