Activity Modelling and Countermeasures on Jamming Attack

Authors

  • Sachin D. Babar Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark
  • Neeli R. Prasad Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark
  • Ramjee Prasad Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark

DOI:

https://doi.org/10.13052/jcsm2245-1439.211

Keywords:

Wireless sensor networks (WSNs), activity modelling, security attacks, jamming attacks, media access control (MAC)

Abstract

In last few decades there is wide demand of wireless sensor network (WSN) in extensive mission critical applications such as monitoring, industrial control, military, health and many more. The larger demand of WSN in mission critical applications makes it more prone towards malicious users who are trying to invade. These security assaults worsen the performance of WSN in large extent in terms of energy consumption, throughput, and delay. Therefore, it is necessary to save the WSN from these attacks. The major aim of researchers working on WSN security is to enhance the performance of WSN in presence of this attack. The major concentration of this paper is to model the behaviour of different kinds of jamming attacks using activity modelling and to find countermeasure against it. Jamming attack is the one of the ruinous invasion which blocks the channel by introducing larger amount of noise packets in a network. The activity modelling of jamming attack gives the perfect understanding of its accomplishment on WSN and it is useful to develop the security countermeasure against the attack.

The paper also gives the survey of different countermeasures of WSN and proposes the new countermeasure on jamming attack. The paper suggests the Threshold based Jamming Countermeasure (TJC) on reactive jamming attack which detects the jamming in network and save the network against reactive jamming attack. The implementation of proposed mechanism in different realistic conditions shows that TJC saves the network in case of reactive jamming attack with increase traffic and number of malicious nodes in network. The paper simulate the TJC by considering the more realistic scenarios which shows the adaptability of the algorithm in change traffic interval and mobility among the normal- and malicious- nodes.

Downloads

Download data is not yet available.

Author Biographies

Sachin D. Babar, Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark

Sachin D. Babar is ISTE Life Member. He is graduated in Computer Engineering from Pune University, Maharashtra, India in 2002 and received Master in Computer Engineering from Pune University, Maharashtra, Indiain 2006. From 2002 to 2003, he was working as lecturer in D.Y. Patil College of Engineering, Pune, India. From 2003 to 2004, he was working as lecturer in Bharati Vidyapeeth College of Engineering, Pune, India. From 2005 to 2006, he was working as lecturer in Rajarshi Shahu College of Engineering, Pune, India. From July 2006, he has been working as an Assistant Professor in Department of Information Technology, STES’s Sinhgad Institute of Technology, Lonavala, India. Currently he is pursuing his Ph.D. in Wireless Communication at Center for TeleInFrastruktur (CTIF),Aalborg University, Denmark. He has published 20 papers at national and international levels. He has authored two books on subjects like Software Engineering and Analysis of Algorithm & Design. He has received the Cambridge International Certificate for Teachers and Trainers at Professional level under MISSION 10X Program. He is IBM DB2 certified professional. His research interests are Data Structures, Algorithms, Theory of Computer Science, IoT and Security.

Neeli R. Prasad, Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark

Neeli Rashmi Prasad, Ph.D., IEEE Senior Member, Director, Center For TeleInfrastructure USA (CTIF-USA), Princeton, USA. She is also Head of Research and Coordinator of Themantic area Network without Borders, Center for TeleInfrastruktur (CTIF) head office, Aalborg University, Aalborg,Denmark.
She is leading IoT Testbed at Easy Life Lab (IoT/M2M and eHealth) and Secure Cognitive radio network testbed at S-Cogito Lab (Network Manage-ment, Security, Planning , etc.). She received her Ph.D. from University of Rome “Tor Vergata”, Rome, Italy, in the field of “adaptive security for wireless heterogeneous networks” in 2004 and M.Sc. (Ir.) degree in Electrical Engineering from Delft University of Technology, the Netherlands, in the field of “Indoor Wireless Communications using Slotted ISMA Protocols” in 1997.
She has over 15 years of management and research experience both inindustry and academia. She has gained a large and strong experience into the administrative and project coordination of EU-funded and Industrial research projects. She joined Libertel (now Vodafone NL), The Netherlands in 1997 .Until May 2001, she worked at Wireless LANs in Wireless Communications and Networking Division of Lucent Technologie, the Netherlands. From June 2001 to July 2003, she was with T-Mobile Netherlands, the Netherlands. Subsequently, from July 2003 to April 2004, at PCOM:I3, Aalborg, Denmark. She has been involved in a number of EU-funded R&D projects, including FP7 CP Betaas for M2M & Cloud, FP7 IP ISISEMD ICt for Demetia, FP7 IP ASPIRE RFID and Middleware, FP7 IP FUTON Wired-Wireless Convergence, FP6 IP eSENSE WSNs, FP6 NoE CRUISE WSNs, FP6 IPMAGNET and FP6 IP Magnet Beyond Secure Personal Networks/Future Internet as the latest ones. She is currently the project coordinator of the FP7CIP-PSP LIFE 2.0 and IST IP ASPIRE and was project coordinator of FP6NoE CRUISE. She was also the leader of EC Cluster for Mesh and Sensor Networks and is Counselor of IEEE Student Branch, Aalborg. Her current research interests are in the area of IoT & M2M, Cloud, identity management,mobility and network management; practical radio resource management; security, privacy and trust. Experience in other fields includes physical layer techniques, policy based management, short-range communications. She has published over 160 publications ranging from top journals, international conferences and chapters in books. She is and has been in the organizationand TPC member of several international conferences. She is the co-editoris chief of Journal for Cyber Security and Mobilityby River Publishers and associate editor of Social Media and Social Networkingby Springer.

Ramjee Prasad, Center for TeleInFrastruktur, Aalborg University, Aalborg, Denmark

Ramjee Prasad (R) is currently the Director of the Center for TeleIn-frastruktur (CTIF) at Aalborg University (AAU), Denmark and Professor, Wireless Information Multimedia Communication Chair. He is the Found-ing Chairman of the Global ICT Standardisation Forum for India (GISFI:www.gisfi.org) established in 2009. GISFI has the purpose of increasing the collaboration between European, Indian, Japanese, North-American, and other worldwide standardization activities in the area of Information and Communication Technology (ICT) and related application areas. He was the Founding Chairman of the HERMES Partnership – a network of leading independent European research centres established in 1997, of which he is now the Honorary Chair.
Ramjee Prasad is the founding editor-in-chief of the Springer International Journal on Wireless Personal Communications .He is a member of the editorial board of several other renowned international journals, including those of River Publishers. He is a member of the Steering, Advisory,and Technical Program committees of many renowned annual international conferences, including Wireless Personal Multimedia Communications Sym-posium (WPMC) and Wireless VITAE. He is a Fellow of the Institute o fElectrical and Electronic Engineers(IEEE), USA, the Institution of Electronics and Telecommunications Engineers (IETE), India, the Institution of Engineering and Technology (IET), UK, and a member of the Netherlands Electronics and Radio Society (NERG) and the Danish Engineering Society(IDA). He is also a Knight (“Ridder”) of the Order of Dannebrog (2010), a distinguishment awarded by the Queen of Denmark.

References

Jennifer Yick, Biswanath Mukherjee, and Dipak Ghosal. Wireless sensor networks: A survey. Elsevier Computer Networks, 52(12):2292–2330, 2008.

A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou. A survey on jamming attacks and countermeasures in WSNs. IEEE Communications Surveys &Tutorials, 11(4):42–56, 2009.

A.R. Mahmood, H.H. Aly, and M.N. El-Derini. Defending against energy efficient link layer jamming denial of service attack in wireless sensor networks. In Proceedings of IEEE AICCSA, Sharm El-Sheikh, Egypt, 27–30 December, pp. 38–45, 2011.

D.R. Raymond and S.F. Midkiff. Denial-of-service in wireless sensor networks: Attacks and defences. IEEE Journal on Pervasive Computing, 7(1):74–81, 2008.

T. Peder, UML Bible. John Wiley & Sons, 2003.

Wenyuan Xu, Ke Ma, W. Trappe, and Yanyong Zhang. Jamming sensor networks: attack and defense strategies. IEEE Journal on Networks, 20(3):41–47, 2006.

Sachin Babar, Parikshit Mahalle, Antonietta Stango, Neeli Prasad, and Ramjee Prasad.Proposed security model and threat taxonomy for the Internet of Things (IoT). InSpringer CNSA, Chennai, India, 23–25 July, pp. 420–429, 2010.

Pranav M. Pawar, Rasmus H. Nielsen, Neeli R. Prasad, Shingo Ohmori, and Ramjee Prasad. Behavioural modelling of WSN MAC layer security attacks: A sequential UML approach. Journal of Cyber Security and Mobility, 1(1):65–82, 2012.

Wenyuan Xu, Wade Trappe, Yanyong Zhang, and Timothy Wood. The feasibility oflaunching and detecting jamming attacks in wireless networks. In Proceedings ACMMobiHoc, Urbana Champaign, IL, 25–28 May, pp. 46–57, 2005.

G. Zhou, T. He, J.A. Stankovic, and T. Abdelzaher. RID: Radio interference detection in wireless sensor networks. In Proceedings IEEE INFOCOM, Miami, FL, 13–17 March,pp. 891–901, 2005.

Y. Law, L. van Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. ACM Transaction on Sensor Network, 5(1):6.1–6.38, 2009.

A.D. Wood, J.A. Stankovic, and Gang Zhou. DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In Proceedings IEEE SECON, SanDiego, CA, 18–21 June, pp.60–69, 2007.

A. Mpitziopoulos, D. Gavalas, G. Pantziou, and C. Konstantopoulos. Defending wireless sensor nhetworks from jamming attacks. In Proceedings IEEE PIMRC, Athens, Greece,3–7 September, pp. 1–5, 2007.

A.D. Wood, J.A. Stankovic, and S.H. Son. JAM: A jammed-area mapping service forsensor networks. In Proceedings IEEE RTSS, Cancun, Mexico, 3–5 December, pp. 286–297, 2003.

W. Xu, T. Wood, W. Trappe, and Y. Zhang. Channel surfing and spatial retreats: Defensesagainst wireless denial of service. In Proceedings ACM Workshop on Wireless Security,New York, 26 September–1 October, pp. 80–89, 2004.

M. Cagalj, S. Capkun, and J.P. Hubaux, Wormhole-based antijamming techniques insensor networks. IEEE Transactions on Mobile Computing, 6(1):100–114, 2007.

Rajani Muraleedharan and Lisa Osadciw. Jamming attack detection and countermeas-ures in wireless sensor network using ant system. In Proceedings SPIE, Orlando, FL, 12March, pp. 1–5, 2006.

A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou. JAID: An algorithmfor data fusion and jamming avoidance on distributed sensor networks. Elsevier Journalof Pervasive and Mobile Computing, 5(2):135–147, 2006.

Mingyan Li, I. Koutsopoulos, and R. Poovendran. Optimal jamming attack strategies and network defense policies in wireless sensor networks. IEEE Transactions on Mobile Computing, 9(8):1119–1133, 2010.

Derek J. Corbett, Antonio G. Ruzzelli, David Everitt, and Gregory O’Hare. A procedure for benchmarking MAC protocols used in wireless sensor networks. Technical Report593, School of IT, University of Sydney, pp. 1–28, August 2006.

C. Bettstetter, G. Resta, and P. Santi. The node distribution of the random way point mobility model for wireless ad hoc networks. IEEE Transactions on Mobile Computing,2(3):257–269, 2003.

Downloads

Published

2013-04-25

How to Cite

1.
D. Babar S, Prasad NR, Prasad R. Activity Modelling and Countermeasures on Jamming Attack. JCSANDM [Internet]. 2013 Apr. 25 [cited 2024 Mar. 28];2(1):1-27. Available from: https://journals.riverpublishers.com/index.php/JCSANDM/article/view/6127

Issue

Section

Articles

Most read articles by the same author(s)