Title: Jamming and anti-jamming techniques in wireless networks: a survey

Authors: Kanika Grover; Alvin Lim; Qing Yang

Addresses: Department of Computer Science and Software Engineering, 3101 Shelby Center for Engineering Technology, Auburn University, Auburn, AL 36849-5347, USA ' Department of Computer Science and Software Engineering, 3101 Shelby Center for Engineering Technology, Auburn University, Auburn, AL 36849-5347, USA ' Department of Computer Science, Montana State University, Bozeman, MT 59717, USA

Abstract: Because of the proliferation of wireless technologies, jamming in wireless networks has become a major research problem due to the ease in blocking communication in wireless networks. Jamming attacks are a subset of denial of service (DoS) attacks in which malicious nodes block legitimate communication by causing intentional interference in networks. To better understand jamming and anti-jamming, we surveyed and analysed their various techniques. For evaluating jamming, we categorised the types of jammers implemented in the literature and investigated the placement strategies for supporting effective jamming. For anti-jamming approaches, we start by discussing the protocols for localising jammers before presenting the mechanisms for detection and jamming countermeasure. We present comparison tables for each of the jammer types, jammer placements, jammer localisation, jamming detection schemes and jamming countermeasures. Our analyses are helpful for selecting an existing strategy for a particular system setup. Finally, we discuss open issues in this field.

Keywords: jamming attacks; anti-jamming; wireless networks; jammer categorisation; jammer placement; jammer localisation; jamming detection; jamming countermeasures; denial of service; DoS attacks.

DOI: 10.1504/IJAHUC.2014.066419

International Journal of Ad Hoc and Ubiquitous Computing, 2014 Vol.17 No.4, pp.197 - 215

Accepted: 11 Jul 2013
Published online: 19 Dec 2014 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article