Activity Modelling and Countermeasures on Jamming Attack
DOI:
https://doi.org/10.13052/jcsm2245-1439.211Keywords:
Wireless sensor networks (WSNs), activity modelling, security attacks, jamming attacks, media access control (MAC)Abstract
In last few decades there is wide demand of wireless sensor network (WSN) in extensive mission critical applications such as monitoring, industrial control, military, health and many more. The larger demand of WSN in mission critical applications makes it more prone towards malicious users who are trying to invade. These security assaults worsen the performance of WSN in large extent in terms of energy consumption, throughput, and delay. Therefore, it is necessary to save the WSN from these attacks. The major aim of researchers working on WSN security is to enhance the performance of WSN in presence of this attack. The major concentration of this paper is to model the behaviour of different kinds of jamming attacks using activity modelling and to find countermeasure against it. Jamming attack is the one of the ruinous invasion which blocks the channel by introducing larger amount of noise packets in a network. The activity modelling of jamming attack gives the perfect understanding of its accomplishment on WSN and it is useful to develop the security countermeasure against the attack.
The paper also gives the survey of different countermeasures of WSN and proposes the new countermeasure on jamming attack. The paper suggests the Threshold based Jamming Countermeasure (TJC) on reactive jamming attack which detects the jamming in network and save the network against reactive jamming attack. The implementation of proposed mechanism in different realistic conditions shows that TJC saves the network in case of reactive jamming attack with increase traffic and number of malicious nodes in network. The paper simulate the TJC by considering the more realistic scenarios which shows the adaptability of the algorithm in change traffic interval and mobility among the normal- and malicious- nodes.
Downloads
References
Jennifer Yick, Biswanath Mukherjee, and Dipak Ghosal. Wireless sensor networks: A survey. Elsevier Computer Networks, 52(12):2292–2330, 2008.
A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou. A survey on jamming attacks and countermeasures in WSNs. IEEE Communications Surveys &Tutorials, 11(4):42–56, 2009.
A.R. Mahmood, H.H. Aly, and M.N. El-Derini. Defending against energy efficient link layer jamming denial of service attack in wireless sensor networks. In Proceedings of IEEE AICCSA, Sharm El-Sheikh, Egypt, 27–30 December, pp. 38–45, 2011.
D.R. Raymond and S.F. Midkiff. Denial-of-service in wireless sensor networks: Attacks and defences. IEEE Journal on Pervasive Computing, 7(1):74–81, 2008.
T. Peder, UML Bible. John Wiley & Sons, 2003.
Wenyuan Xu, Ke Ma, W. Trappe, and Yanyong Zhang. Jamming sensor networks: attack and defense strategies. IEEE Journal on Networks, 20(3):41–47, 2006.
Sachin Babar, Parikshit Mahalle, Antonietta Stango, Neeli Prasad, and Ramjee Prasad.Proposed security model and threat taxonomy for the Internet of Things (IoT). InSpringer CNSA, Chennai, India, 23–25 July, pp. 420–429, 2010.
Pranav M. Pawar, Rasmus H. Nielsen, Neeli R. Prasad, Shingo Ohmori, and Ramjee Prasad. Behavioural modelling of WSN MAC layer security attacks: A sequential UML approach. Journal of Cyber Security and Mobility, 1(1):65–82, 2012.
Wenyuan Xu, Wade Trappe, Yanyong Zhang, and Timothy Wood. The feasibility oflaunching and detecting jamming attacks in wireless networks. In Proceedings ACMMobiHoc, Urbana Champaign, IL, 25–28 May, pp. 46–57, 2005.
G. Zhou, T. He, J.A. Stankovic, and T. Abdelzaher. RID: Radio interference detection in wireless sensor networks. In Proceedings IEEE INFOCOM, Miami, FL, 13–17 March,pp. 891–901, 2005.
Y. Law, L. van Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. ACM Transaction on Sensor Network, 5(1):6.1–6.38, 2009.
A.D. Wood, J.A. Stankovic, and Gang Zhou. DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. In Proceedings IEEE SECON, SanDiego, CA, 18–21 June, pp.60–69, 2007.
A. Mpitziopoulos, D. Gavalas, G. Pantziou, and C. Konstantopoulos. Defending wireless sensor nhetworks from jamming attacks. In Proceedings IEEE PIMRC, Athens, Greece,3–7 September, pp. 1–5, 2007.
A.D. Wood, J.A. Stankovic, and S.H. Son. JAM: A jammed-area mapping service forsensor networks. In Proceedings IEEE RTSS, Cancun, Mexico, 3–5 December, pp. 286–297, 2003.
W. Xu, T. Wood, W. Trappe, and Y. Zhang. Channel surfing and spatial retreats: Defensesagainst wireless denial of service. In Proceedings ACM Workshop on Wireless Security,New York, 26 September–1 October, pp. 80–89, 2004.
M. Cagalj, S. Capkun, and J.P. Hubaux, Wormhole-based antijamming techniques insensor networks. IEEE Transactions on Mobile Computing, 6(1):100–114, 2007.
Rajani Muraleedharan and Lisa Osadciw. Jamming attack detection and countermeas-ures in wireless sensor network using ant system. In Proceedings SPIE, Orlando, FL, 12March, pp. 1–5, 2006.
A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos, and G. Pantziou. JAID: An algorithmfor data fusion and jamming avoidance on distributed sensor networks. Elsevier Journalof Pervasive and Mobile Computing, 5(2):135–147, 2006.
Mingyan Li, I. Koutsopoulos, and R. Poovendran. Optimal jamming attack strategies and network defense policies in wireless sensor networks. IEEE Transactions on Mobile Computing, 9(8):1119–1133, 2010.
Derek J. Corbett, Antonio G. Ruzzelli, David Everitt, and Gregory O’Hare. A procedure for benchmarking MAC protocols used in wireless sensor networks. Technical Report593, School of IT, University of Sydney, pp. 1–28, August 2006.
C. Bettstetter, G. Resta, and P. Santi. The node distribution of the random way point mobility model for wireless ad hoc networks. IEEE Transactions on Mobile Computing,2(3):257–269, 2003.