| Peer-Reviewed

Defending WSNs Against Jamming Attacks

Received: 9 April 2013    Accepted:     Published: 2 April 2013
Views:       Downloads:
Abstract

Wireless sensor networks WSNs consist of a group of distributed monitor nodes working autonomously together cooperatively to achieve a common goal. Generally they face many threats, threatening the security and integrity of such networks. Jamming attacks are one of the most common attacks used against WSNs. In this paper we discuss the jamming attack and defense mechanisms proposed by two papers and suggest improvements on those four approaches.

Published in American Journal of Networks and Communications (Volume 2, Issue 2)
DOI 10.11648/j.ajnc.20130202.12
Page(s) 28-39
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2024. Published by Science Publishing Group

Keywords

Jamming Attacks, Network Security, Wireless Sensor Networks

References
[1] Kai Xing, Fang Liu, Xiuzhen Cheng, David H.C. Du "Real-time Detection of Clone Attacks in Wireless Sensor Networks" The 28th International Conference on Distributed Computing Systems ICDCS, IEEE 2008.
[2] Lewis, Frank L; "Wireless Sensor Networks," Smart Envi-ronments: Technologies, Protocols, and Applications, pp. 11-46, © 2005 John Wiley & Sons, Inc.
[3] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, "Wireless sensor networks: a survey", Computer Networks, Volume 38, Issue 4, pp. 393-422, 15 March 200.
[4] Lewis, Frank L; "Wireless Sensor Networks," Smart Envi-ronments: Technologies, Protocols, and Applications, pp. 11-46, © 2005 John Wiley & Sons, Inc.
[5] Sukumar Ghosh, Distributed Systems: An Algorithmic Ap-proach, 2006 CRC Press.
[6] Pottie, G.J.; "Wireless sensor networks," Information Theory Workshop, pp.139-140, 22-26 June 1998.
[7] Wenyuan Xu; Ke Ma; Trappe, W.; Yanyong Zhang; "Jamming sensor networks: attack and defense strategies," Network, IEEE, vol.20, no.3, pp. 41- 47, May-June 2006.
[8] Alzaid, Hani; Park, Dong Gook; Nieto, Juan Gonzalez; Boyd, Colin; Foo, Ernest; "A Forward and Backward Secure Key Management in Wireless Sensor Networks for PCS/SCADA," Sensor Systems and Software, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommu-nications Engineering, pp. 66-82, Vol.24, © 2010, Springer Berlin Heidelberg.
[9] Xin Liu, Guevara Noubir, Ravi Sundaram, San Tan, "SPREAD: Foiling Smart Jammers using Multi-layer Agility" IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2007 proceedings, IEEE 2007.
[10] DARPA, http://ww.darpa.mil/ato/programs/WolfPack/index.htm.
[11] Anthony D.Wood, John A. Stankovic, and Sang H. Son "JAM: A Jammed-Area Mapping Service for Sensor Networks" Proceedings of the 24th IEEE International Real-Time Systems Symposium (RTSS’03), IEEE, 2003.
[12] R. L. Pickholtz, D. L. Schilling, and L. B.Milstein "Theory of spread spectrum communications, a tutorial" IEEE Transac-tions on Communications, IEEE, May 1982.
[13] Onel, Tolga; Onur, Ertan; Ersoy, Cem; Delic, Hakan; Byrnes, Jim; "Wireless Sensor Networks For Security: Issues and Challenges," Advances in Sensing with Security Applications, NATO Security through Science Series, pp. 95-119, Vol. 2, © 2006 Springer Netherlands.
[14] AusCERT, "AA-2004.02 — Denial of Service Vulnerability in IEEE 802.11 Wireless Devices," http://www.auscert.org
[15] W. Xu, Timothy Wood, Wade Trappe, Yanyong Zhang "Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service," In the Proceedings of Wireless Security Workshop, ACM, pp. 80–89, 2004
[16] Wang, Le; Wyglinski, Alexander M.; , "A Combined Approach for Distinguishing Different Types of Jamming Attacks against Wireless Networks," In the Proceedings of the Conference on Communications, Computers and Signal Processing Pacific Rim, pp.809-814, 23-26 IEEE, Aug. 2011.
[17] Wood A. D., Stankovic J. A., "A Taxonomy for denial-of service attacks in wireless sensor networks," in Handbook of Sensor Networks: Compact Wireless and Wired Sensing Systems, edited by Mohammad Ilyas and Imad Mahgoub, CRC Press LLC, 2005.
[18] Faraz Ahsan, Ali Zahir, Sajjad Mohsin, Khalid Hussain "Survey On Survival Approaches In Wireless Network Against Jamming Attack" Journal of Theoretical and Applied Information Technology, Vol. 30 No.1, JATIT & LLS, 15th August 2011.
[19] Y. Hu, A. Perrig, and D. Johnson "Ariadne: A secure on demand routing protocol for ad hoc networks". In 8th ACM International Conference on Mobile Computing and Net-working, pages 12-23, September 2002.
[20] Wenyuan Xu, Wade Trappe, Yanyong Zhang "Channel Surfing: Defending Wireless Sensor Networks from Interference" In Proceedings of the 6th international conference on Information processing in sensor networks IPSN'07, April 25-27, Massachusetts, USA. ACM, 2007.
[21] Wood, A.D.; Stankovic, J.A.; Gang Zhou; "DEEJAM: De-feating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks," fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Commu-nications and Networks SECON '07. PP.60-69, 18-21 June 2007.
[22] Periyanayagi, S.; Sumathy, V.; Kulandaivel, R.; "A Defense Technique for Jamming Attacks in Wireless Sensor Networks Based on SI," International Conference on Process Automation, Control and Computing PACC, pp.1-5, 20-22 July 2011.
[23] Swarm Intelligence, http://www.sce.carleton.ca/netmanage/tony/swarm.html
[24] Aristides Mpitziopoulos, Damianos Gavalas, Grammati Pantziou, and Charalampos Konstantopoulos "Defending Wireless Sensor Networks From Jamming Attacks" The 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'07), IEEE, 2007.
[25] Zhenhua Liu, Hongbo Liu, Wenyuan Xu, and Yingying Che, "Exploiting Jamming-Caused Neighbor Changes for Jammer Lcalization", IEEE Transactions on Parallel and Distributed Systems, Vol. 23, No. 3, March 2012.
[26] Hai-Yan Shi, Wan-Liang Wang, Ngai-Ming Kwok and Sheng-Yong Chen "Game Theory for Wireless Sensor Net-works: A Survey", Sensors 2012, doi:10.3390/s120709055, July 2012.
[27] X. Zeng, R. Bagrodia, and M. Gerla "GloMoSim: A library for parallel simulation of large-scale wireless networks" Workshop on Parallel and Distributed Simulation, pages 154–161, 1998.
Cite This Article
  • APA Style

    Abdulaziz Rashid Alazemi. (2013). Defending WSNs Against Jamming Attacks. American Journal of Networks and Communications, 2(2), 28-39. https://doi.org/10.11648/j.ajnc.20130202.12

    Copy | Download

    ACS Style

    Abdulaziz Rashid Alazemi. Defending WSNs Against Jamming Attacks. Am. J. Netw. Commun. 2013, 2(2), 28-39. doi: 10.11648/j.ajnc.20130202.12

    Copy | Download

    AMA Style

    Abdulaziz Rashid Alazemi. Defending WSNs Against Jamming Attacks. Am J Netw Commun. 2013;2(2):28-39. doi: 10.11648/j.ajnc.20130202.12

    Copy | Download

  • @article{10.11648/j.ajnc.20130202.12,
      author = {Abdulaziz Rashid Alazemi},
      title = {Defending WSNs Against Jamming Attacks},
      journal = {American Journal of Networks and Communications},
      volume = {2},
      number = {2},
      pages = {28-39},
      doi = {10.11648/j.ajnc.20130202.12},
      url = {https://doi.org/10.11648/j.ajnc.20130202.12},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajnc.20130202.12},
      abstract = {Wireless sensor networks WSNs consist of a group of distributed monitor nodes working autonomously together cooperatively to achieve a common goal. Generally they face many threats, threatening the security and integrity of such networks. Jamming attacks are one of the most common attacks used against WSNs. In this paper we discuss the jamming attack and defense mechanisms proposed by two papers and suggest improvements on those four approaches.},
     year = {2013}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Defending WSNs Against Jamming Attacks
    AU  - Abdulaziz Rashid Alazemi
    Y1  - 2013/04/02
    PY  - 2013
    N1  - https://doi.org/10.11648/j.ajnc.20130202.12
    DO  - 10.11648/j.ajnc.20130202.12
    T2  - American Journal of Networks and Communications
    JF  - American Journal of Networks and Communications
    JO  - American Journal of Networks and Communications
    SP  - 28
    EP  - 39
    PB  - Science Publishing Group
    SN  - 2326-8964
    UR  - https://doi.org/10.11648/j.ajnc.20130202.12
    AB  - Wireless sensor networks WSNs consist of a group of distributed monitor nodes working autonomously together cooperatively to achieve a common goal. Generally they face many threats, threatening the security and integrity of such networks. Jamming attacks are one of the most common attacks used against WSNs. In this paper we discuss the jamming attack and defense mechanisms proposed by two papers and suggest improvements on those four approaches.
    VL  - 2
    IS  - 2
    ER  - 

    Copy | Download

Author Information
  • Computer Engineering Department, Kuwait University, Kuwait

  • Sections