CSC 714 - Real-Time Computer Systems

On Mobile Routers and Jammers in Wireless Sensor Networks

Kunal Kandekar
(kakandek)
Nandini Kappiah
(nkappia)
Indraneel Kelkar
(ibkelkar)

Final Report
2nd Milestone
Abstract
Denial of service (jamming) is a major source of concern in any wireless network. Introduction of mobility in wireless nodes further complicates the scenario. This proposal aims to study the dynamics of such a system and develop techniques to take advantage of mobility in establishment and disruption of wireless communication.
Keywords: mobile sensor networks, wireless communication, denial of service, mobile routers
Problem Description
One possible defense against DoS attacks is introducing mobile nodes to route around his attacks. We study and develop techniques to dynamically relocate these routers when faced with a DoS attack. The natural counter-offense against such a scheme is the use of mobile Jammers. Hence we study the dynamics of interaction between mobile Routers and Jammers, and attempt to develop effective techniques for communication and disruption using mobile wireless nodes.
Approach
Scenarios with various attacks and defenses are considered and implemented using Lego Mindstorms as the wireless mobile agents. We apply evolutionary and biologically-inspired paradigms to develop effective offensive and defensive techniques.
Experimental Setup
We use Lego RCX modules to emulate mobile nodes in the wireless network. A set of LNP IR towers act as the Senders and Receivers. The Senders are out of communication range of the Receivers. The mobile RCX modules act as intermediate routers to enable data transfer from the senders to the receivers as far as possible. One, or more, mobile RCX modules represent the Jammers, whose role is to disrupt this communication while conserving its power.
We develop several scenarios and corresponding strategies for both Routers and Jammers.
  • Scenario: Single Sender and single Receiver
    Strategy: Jammer tries to locate the source and effectively jam all communications.
  • Scenario: Multiple Senders and Receiver
    Strategy: Senders (and Receivers) can communicate amongst themselves over an out-of-band connection (the LAN) hence the Jammer is forced to target the Routers. Hence the Routers must evade the Jammers without being able to communicate to coordinate. Biologically-inspired algorithms such as swarm behaviour can be applied to develop these strategies.
  • Scenario: Switching between short and long range transmissions for Routers.
    Strategy: The mobile Routers exploit different communication ranges to their advantage. It is more difficult for the Routers to establish a link using short-range transmissions due to the directional considerations. However it is also difficult for the Jammers to detect these links and jam them effectively using long-range transmissions without losing an undue amount of power.
  • Scenario: Robotic Virus
    Strategy: Jammer acts a self-replicating virus. It locates a Router and tries to reprogram ("infect") it to behave as a Jammer. This exploits a feature of the RCX.
Expected Results
This work has several ramifications in real-world scenarios involving mobile sensor networks in military applications. We attempt to determine which strategies would be most effective with respect to both communication as well as jamming.
References
  1. A.D. Wood and J.A. Stankovic, "Denial of Service in Sensor Networks", IEEE Computer Society Press, 2002
  2. A. D. Wood, J. A. Stankovic,Sang Hyuk Son "JAM: A Jammed-Area Mapping Service for Sensor Networks", RTSS'03
  3. Eric Bonabeau, Guy Theraulaz, Swarm Smarts - Scientific American, 1998
  4. J. Butler, "Mobile robots as gateways into wireless sensor networks"
  5. Andrew Howard, Maja J Mataric, "Cover Me! A Self-Deployment Algorithm for Mobile Sensor Networks"