A Novel Mechanism to Detect Jamming Attack in Wireless Sensor Network Using Modified Ant System


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


Jamming attack is one of the most serious threat in wireless sensor networks (WSN). This type of attack not only blocks the ongoing communication but also exhaust the energy of the sensor nodes. In WSN, several types of DoS attacks in different layers might be performed. The physical layer being the lowest layer and the first to be attacked by jammers.
The mechanisms to prevent jamming attacks include payment for network resources, pushback, strong authentication and identification of traffic. Therefore guarding against DoS attacks is a critical component of any security system but there is lack of research for preventing such attacks. In this paper, the physical layer DoS attack is analyzed and a defense mechanism is proposed using modified ant system. The proposed detection and defense mechanism is simulated using Matlab 6.5.
The simulation results show that the proposed scheme helps in achieving maximum reliability on DoS claims improving the Quality of Service (QoS) of WSN.


Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


Wireless Sensor Network; Denial of Service (DoS); Jamming Attack; Detection Theory; Ant System

Full Text:

PDF


References


D. L. Adamy, D. Adamy, “EW 102: A Second Course in Electronic Warfare”, Artech House Publishers, 2004.

E. Shi, A. Perrig, “Designing Secure Sensor Networks”, Wireless Communications Magazine, 11(6), pp. 38-43, Dec. 2004.

A. D. Wood and J. A. Stankovic, “Denial of service in sensor networks”, Computer, vol. 35,no. 10, pp.54-62, 2002.

W. Xu, W. Trappe, Y. Zhang, T. Wood, “The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks”, in Proc. 6th ACM international symposium on Mobile ad hoc networking and computing, pp. 46-57, 2005.

I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, “A survey on sensor networks”, IEEE Commun. Mag., pp. 102-114, August 2002.

Ali Hamieh and Jalel Ben-Othman, "Detection of Jamming Attacks in Wireless Ad Hoc Networks using Error Distribution", ANR (French Research National Agency) under CLADIS grant N. 05-SSIA-0018.978-1-4244-3435-0/2009 IEEE

Tao Jin, Guevara Noubir and Bishal Thapa, “Zero Pre-shared Secret Key Establishment in the Presence of Jammers”, Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing, Pages 219-228, 2009.

Yao Liu, Peng Ning, Huaiyu Dai and An Liu, “Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication”, IEEE INFOCOM, pg 1-9, 2010.

Loukas Lazos, Sisi Liu, and Marwan Krunz, “Mitigating Control-Channel Jamming Attacks in Multi-channel Ad Hoc Networks”, Proceedings of the second ACM conference on Wireless network security, pg 169-180, 2009.

Hong Huang, Nihal Ahmed, and Pappu Karthik, “On a New Type of Denial of Service Attack in Wireless Networks: The Distributed Jammer Network”, IEEE Transactions on Wireless Communications, Vol. 10, No. 7, July 2011.

Alejandro Proan˜o and Loukas Lazos, “Packet-Hiding Methods for Preventing Selective Jamming Attacks”, IEEE Transactions On Dependable and Secure Computing, Vol. 9, No. 1, January/February 2012.

Andrea Richa, Christian Scheideler, Stefan Schmid and Jin Zhang, “A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks”, Distributed Computing Lecture Notes in Computer Science Volume 6343, pp 179-193, 2010.

Jerry T. Chiang and Yih-Chun Hu, "Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks", IEEE/ACM Transactions on Networking, Vol. 19, No. 1, February 2011.

Mario Cagalj, Srdjan Capkun, and Jean-Pierre Hubaux, "Wormhole-Based Antijamming Techniques in Sensor Networks Mario", IEEE Transactions on Mobile Computing, Vol. 6, No. 1, January 2007.

Sisi Liu, Loukas Lazos and Marwan Krunz, "Thwarting Control-Channel Jamming Attacks from Inside Jammers", IEEE Transactions on Mobile Computing, Vol. 11, No. 9, September 2012.

Zhenhua Liu, Hongbo Liu, Wenyuan Xu, and Yingying Chen, "Exploiting Jamming-Caused Neighbor Changes for Jammer Localization", IEEE Transactions On Parallel And Distributed Systems, Vol. 23, No. 3, March 2012.

E. M. Saad, M. El Adawy, H. A. Keshk, and Shahira M. Habashy “Ant Algo Modification”, Helwan University.

Rajani Muraleedharan and Lisa Ann Osadciw,” Jamming Attack Detection and Countermeasures In Wireless Sensor Network Using Ant System”, Syracuse University.

Yun-Chia Liang and Alice E. Smith, “ An Ant system approach to redundancy allocation," Proceedings of the 1999 Congress on Evolutionary Computation, Washington D.C., IEEE, 1999.

Neha Jain & Jasvinder Pal Singh, “Modification of Ant Algorithm for Feature Selection”, International Conference on Control, Automation, Communication and Energy Conservation, 2009.

Kasaei, M.J., Norouzi, H., Reconfiguration of distribution network with dispersed generations based on ant colony algorithm, (2011) International Review on Modelling and Simulations (IREMOS), 4 (6), pp. 3113-3118.

A. A. Moghanjoughi, S. Khatun, M. A. Borhanuddin, R. S. A. Raja Abdullah, Performance Analysis of Ant Colony's Algorithm: Load-Balancing in QoS-based for Wireless Mesh Networks Routing, (2008) International Review on Computers and Software (IRECOS), 3 (2), pp. 203- 209.

Prabhakar Telagarapu, L. Govinda Rao, D. Srinivasa Rao, P. Devi Pradeep, Analysis of Mobile User Identification Inside the Buildings, (2011) International Journal on Communications Antenna and Propagation (IRECAP), 1 (2), pp. 196-203.

Said Ben Alla, Abdellah Ezzati, A Qos-Guaranteed Coverage and Connectivity Preservation Routing Protocol for Heterogeneous Wireless Sensor Networks, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (6), pp. 363-371.

Reza Mohammadi, Reza Javidan, Adaptive Quiet Time Underwater Wireless MAC: AQT-UWMAC, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (4), pp. 236-243.

Nursel Akçam, Murat Oğul, Optimizing Data Transport by Using MPLS-TE-FRR and QoS, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (5), pp. 283-289.

D. David Neels Pon Kumar, K. Murugesan, K. Arun Kumar, Jithin Raj, Performance Analysis of Fuzzy Neural based QoS Scheduler for Mobile WiMAX, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (6), pp. 377-385.

Ji, Z., Ganchev, I., O'Droma, M., Performance evaluation of 'WBC over DVB-H' system, (2009) IEEE Transactions on Consumer Electronics, 55 (2), pp. 754-762.

Ji, Z., Ganchev, I., O'Droma, M., An iWBC consumer application for 'always best connected and best served': Design and implementation, (2011) IEEE Transactions on Consumer Electronics, 57 (2), art. no. 5955180, pp. 462-470.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize