Font Size: a A A

Research On Reactive Jamming Attack Detection Method In Ad Hoc Network

Posted on:2016-04-14Degree:MasterType:Thesis
Country:ChinaCandidate:Z Z LiuFull Text:PDF
GTID:2348330479953391Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
The reactive jamming attack is the same hazardous as the conventional non-intermittent jamming attacks, but it's more concealed. As the reactive jamming attack has high concealment, conventional jamming attacks detection methods cannot effectively detect it, and current reactive jamming attack detection methods still have some shortcomings. Therefore, it is of great significant value to research and develop an attack detection method which can detect reactive jamming attack effectively.Through the descriptions of the reactive jamming attack's principles and key parameters, it is pointed out that it is more difficult to detect the reactive jamming attack. Through the analysis of the difference between the packet delivery rate of normal scenario and the packet delivery rate of the scenario when the reactive jamming attack occur, it is found that the reactive jamming attack will lead to a evident anomaly change. Based on the conclusion above, the non-parametric CUSUM is used to measure the degree of the evident anomaly change. Furthermore, a reactive jamming attack detection method based on the non-parametric CUSUM is proposed.Aiming at the deficiencies of reactive jamming attack detection method based on the non-parametric CUSUM and through the analysis of the difference between the packet retransmit rate with the received signal strength of normal scenario and the packet retransmit rate with the received signal strength of the scenario when the reactive jamming attack occur, curve fitting and area under curve are used to measure the consistency between packet retransmit rate and received signal strength. And a reactive jamming attack detection method based on the consistency check between packet retransmit rate and received signal strength is proposed.Make a comprehensive analysis of the two reactive jamming attack detection methods, and then combine the two reactive jamming attack detection methods to propose a comprehensive detection method.Simulation experiments are used to verify the validity of the two independent reactive jamming detection methods and the comprehensive reactive jamming attack detection method. Experiments results show that the two independent reactive jamming attack detection methods can detect most of the reactive jamming attacks, but there are some shortcomings on the false negative and the performance, however, the comprehensive detection method absorbs their merits and is more practical.
Keywords/Search Tags:Reactive jamming attack, Attack detection, Non-parametric CUSUM, Consistency check, Curve fitting
PDF Full Text Request
Related items