Professional Documents
Culture Documents
clement.delattre50@orange.fr, kyc6454@kma.ac.kr
Abstract
Securing wireless networks is one of the main objectives of Tactical Communications in every army, especially
concerning a way to avoid jamming attacks, which can be easily done by emitting a continuous radio signal. Finding
a perfect way to avoid jamming is a utopia, but scientists agree on a solution which consists in a channel hopping
scheme to mitigate jamming attacks. In this paper, we consider an existing channel-hopping scheme under smart
jammer attacks, and study a way to find the hopping sequence of a jammer, to protect users from jamming attack.
- 377 -
한국통신학회 2015년도 추계종합학술발표회
from the beginning of sequence whenever it detects a hopping sequence of a jammer, the damage from the
channel or it fails within a DT. This method is weak jamming attack is significant as shown in Fig. 4.
for the jammer because it prevents itself to scan the However, the hopping sequence of a jammer is known
whole channels with the same frequency. The other by an AP after 10 DT periods, the average normalized
possible process, which is highly likely, is to follow throughput is significantly increased as depicted in Fig.
the hopping sequence in order regardless of detecting 5. If the simulation time increases, the average
a channel as described in Fig. 2. normalized throughput of the scheme will be as close
as to the highest normalized throughput Th1 . Indeed, as
there is no more jamming attack once an AP finds out
the hopping sequence of a jammer, the average
normalized throughput of the scheme can be
considered as the best normalized throughput.
- 378 -