Skip to main content
Log in

Modeling and performance evaluation of jamming-tolerant wireless systems

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Many of the failures suffered by wireless systems are not accidental; they are actually caused by security breaches. Therefore, the conventional QoS measures are not sufficient for quantifying the performance of wireless systems. In fact, there is a need for security-related QoS measures that describe the performance of wireless systems under security-breaches. In this paper we focus on Jamming which is one of the most common security breaches in wireless systems. We propose a mathematical model for jamming-tolerant wireless systems. Our model is based on the theory of semi-Markov processes (SMPs). By analyzing the steady-state behavior of the proposed SMP, we derive security-related performance measures such as the steady-state availability and the “mean time to process a packet” (MTTPP). By studying the transient behavior of the proposed SMP, we derive the “probability of packet failure” (PPF) and the “mean time to packet failure” (MTTPF) performance measures. With the proposed model, we analyze the performance of a real jamming-tolerant wireless system for smart grid applications and the numerical results are presented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  • Adamy D (2001) A first course in electronic warfare. Artech House, Norwood

    Google Scholar 

  • Bany Salameh H, Almajali S, Ayyash M, Elgala H (2017) Security-aware channel assignment in iot-based cognitive radio networks for time-critical applications. In: Fourth International Conference on Software Defined Systems (SDS-2017)

  • Bayraktaroglu E, King C, Liu C, Noubir G, Rajaraman R, Thapa B (2008) On the performance of ieee 802.11 under jamming. In: IEEE International Conference on Computer Communications (INFOCOM), pp 1265–1273

  • Besharati E, Naderan M, Namjoo E (2018) Lr-hids: logistic regression host-based intrusion detection system for cloud environments. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-018-1093-8

    Article  Google Scholar 

  • Chen J, Tian Z, Cui X, Yin L, Wang X (2018) Trust architecture and reputation evaluation for internet of things. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-018-0887-z

    Article  Google Scholar 

  • Danish SM, Nasir A, Qureshi HK, Ashfaq AB, Mumtaz S, Rodriguez J (2018) Network intrusion detection system for jamming attack in lorawan join procedure. In: 2018 IEEE International Conference on Communications (ICC), p. 1–6

  • Gao Jingcheng, Xiao Yang, Liu Jing, Liang Wei, Philip Chen CL (2012) A survey of communication/networking in smart grids. Future Gener Comput Syst 28(2):391–404

    Article  Google Scholar 

  • Gupta A, Jha RK (2015) Security threats of wireless networks: A survey. In: International Conference on Computing, Communication Automation, pp 389–395

  • Hassan SF, Mahmood A, Hassan SA, Gidlund M (2018) Wireless mediation of multiple equi-priority events in time-critical industrial applications. In: Proceedings of the 1st ACM MobiHoc Workshop on Networking and Cybersecurity for Smart Cities, SmartCitiesSecurity’18, pp 2:1–2:6, New York, NY, USA

  • Jha S, Sheyner O, Wing JM (2002) Minimization and reliability analyses of attack graphs, technical report, cmu technical report no. cmu-cs-2-109

  • Jonsson E, Olovsson T (1997) A quantitative model of the security intrusion process based on attacker behavior. IEEE Trans Softw Eng 23(4):235–245

    Article  Google Scholar 

  • Karaağaç A, Haxhibeqiri J, Moerman I, Hoebeke J, (2018) Time-critical communication in 6tisch networks. In: 2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), pp 161–166

  • Kurose J, Ross K (2012) computer networking: a top-down approach, 6th edn. Pearson, London

    Google Scholar 

  • Li M, Koutsopoulos I, Poovendran R (2007) Optimal jamming attacks and network defense policies in wireless sensor networks. In: IEEE International Conference on Computer Communications (INFOCOM)

  • Li M, Koutsopoulos I, Poovendran R (2007) Optimal jamming attacks and network defense policies in wireless sensor networks. In: IEEE International Conference on Computer Communications (INFOCOM), pp 1307–1315

  • Lin Jie, Wei Yu, Zhang Nan, Yang Xinyu, Zhang Hanlin, Zhao Wei (2017) A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125–1142

    Article  Google Scholar 

  • Lin G, Noubir G (2005) On link layer denial of service in data wireless lans. Wirel Commun Mobile Comput 5(3)

    Article  Google Scholar 

  • Lu Z, Wang W, Wang C (2014) Modeling, evaluation and detection of jamming attacks in time-critical wireless applications. IEEE Trans Mob Comput 13(8):1746–1759

    Article  Google Scholar 

  • Lu Z, Wang W, Wang C (2011) From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic. In: IEEE International Conference on Computer Communications (INFOCOM), pp 1871–1879

  • Madan B, Goševa-Popstojanova K, Vaidyanathan K, Trivedi K (2004) A method for modeling and quantifying the security attributes of intrusion tolerant systems. Perform Eval 56(1–4):167–186

    Article  Google Scholar 

  • Madwifi-team (2018) The madwifi project. http://madwifi-project.org

  • Murata-team (2018) Wsn802g-e integration guide. www.murata.com

  • Olovsson T, Jonsson E, Brocklehurst S, Littlewood B (1995) Towards operational measures of computer security: experimentation and modelling. In: Randell B, Laprie J-C, Kopetz H, Littlewood B (eds) Predictably dependable computing systems. Springer, Berlin, pp 555–569

    Chapter  Google Scholar 

  • Ortalo R, Deswarte Y, Kaaniche M (1999) Experimenting with quantitative evaluation tools for monitoring operational security. IEEE Trans Softw Eng 25(5):633–650

    Article  Google Scholar 

  • Park S-T, Li G, Hong J-C (2018) A study on smart factory-based ambient intelligence context-aware intrusion detection system using machine learning. J Ambient Intell Human Comput. https://doi.org/10.1007/s12652-018-0998-6

  • Poisel RA (2006) Modern communications jamming principles and techniques. Artech House, Norwood

    Google Scholar 

  • Rangelov Y, Nikolaev N, Ivanova M (2016) The iec 61850 standard—communication networks and automation systems from an electrical engineering point of view

  • Salameh HAB, Almajali S, Ayyash M, Elgala H (2018) Spectrum assignment in cognitive radio networks for internet-of-things delay-sensitive applications under jamming attacks. IEEE Internet Things J 5(3):1904–1913

    Article  Google Scholar 

  • Strasser M, Capkun S, Popper C, Cagalj M (2005) Jamming-resistant key establishment using uncoordinated frequency hopping. In: IEEE Symposium on Security and Privacy, pp 64–78

  • Surya Prabha M, Sarojini B (2017) Survey on big data and cloud computing. In: World Congress on Computing and Communication Technologies (WCCCT), Tiruchirappalli, India

  • Toledo AL, Wang X (2008) Robust detection of mac layer denial-of-service attacks in csma/ca wireless networks. IEEE Trans Info Forensics Secur 3:347–358

    Article  Google Scholar 

  • Trivedi K (2001) Probability and statistics with reliability, queuing, and computer science applications, 2nd edn. Wiley, Chichester

    MATH  Google Scholar 

  • Trivedi K, Bobbio A (2017) Reliability and availability engineering, modeling, analysis, and applications. Cambridge University Press, Cambridge

    Book  Google Scholar 

  • USRP team (2018) Usrp n210 software defined radio (sdr). https://www.ettus.com

  • Xu W, Trappe W, Zhang Y (2006) Channel surfing: defending wireless sensor networks from jamming and interference. In ACM Conference on Embedded Networked Sensor Systems (SenSys)

  • Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)

  • Yang Yuchen, Longfei Wu, Yin Guisheng, Li Lijie, Zhao Hongbin (2017) A survey on security and privacy issues in internet-of-things. IEEE Internet Things J 4(5):1250–1258

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rami Halloush.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Halloush, R., Liu, H. Modeling and performance evaluation of jamming-tolerant wireless systems. J Ambient Intell Human Comput 10, 4361–4375 (2019). https://doi.org/10.1007/s12652-018-1113-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-018-1113-8

Keywords

Navigation