To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute.
References
[1]
What Is Ubiquitous? Available online: http://www.nhk.or.jp/strl/publica/dayori-new/en/qa-0108e.html (accessed on January 1, 2010).
[2]
Wood, A.D.; Stankovic, J.A. Denial of Service in Sensor Networks. Computer?2002, 35, 54–62.
[3]
Li, M.; Koutsopoulos, I.; Poovendran, R. Optimal jamming attacks and network defense policies in wireless sensor networks. Proceedings of the IEEE International Conference on Computer Communications (INFOCOM), Anchorage, AK, USA, May 2007; pp. 1307–1315.
[4]
Raymond, D.; Marchany, R.; Brownfield, M.; Midkiff, S. Effects of Denial of Sleep Attacks on Wireless Sensor Network MAC Protocols. Proceedings of the IEEE Information Assurance Workshop, Cagliari, Italy, June 2006; pp. 297–304.
[5]
Raymond, D.R.; Midkiff, S.F. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses. IEEE Pervasive Comput?2008, 7, 74–81, doi:10.1109/MPRV.2008.6.
[6]
Intanagonwiwat, C.; Govindan, R.; Estrin, D. Directed diffusion: A scalable and robust communication paradigm for sensor networks. Proceedings of the 6th annual international conference on Mobile computing and networking (ACM Mobicom), Boston, MA, USA, August 2000; pp. 56–67.
[7]
Kulik, J.; Heinzelman, W.R.; Balakrishnan, H. Negotiation-based protocols for disseminating information in wireless sensor networks. Wirel. Netw?2002, 8, 169–185, doi:10.1023/A:1013715909417.
[8]
Wood, A.; Stankovic, J.; Son, S. JAM: A Jammed-Area Mapping Service for Sensor Networks. Proceedings of 24th IEEE Real-Time System Symposium, Cancun, Mexico, December 2003; pp. 286–297.
[9]
Keromytis, A.; Misra, V.; Rubenstein, D. SOS: An Architecture for Mitigating DDoS Attacks. IEEE J. Sel. Area. Commun. (JSAC)?2004, 22, 176–188, doi:10.1109/JSAC.2003.818807.
[10]
Yang, H.; Luo, H.; Yang, Y.; Lu, S.; Zhang, L. HOURS: Achieving DoS Resilience in an Open Service Hierarchy. Proceedings of International Conference on Dependable Systems and Netowrks (DSN), Florence, Italy, July 2004; pp. 83–92.
[11]
Perkins, C.; Belding-Royer, E.; Das, S. Ad hoc On-Demand Distance Vector (AODV) Routing. IETF RFC?2003, 3561.
[12]
Kang, B; Ko, I. Effective Route Maintenance and Restoration Schemes in Mobile Ad Hoc Networks. Sensors?2010, 1, 808–821.
[13]
Liu, M; Cao, J.; Chen, G.; Wang, X. An Energy-Aware Routing Protocol in Wireless Sensor Networks. Sensors?2009, 1, 445–462.
[14]
Tufail, A; Khayam, S.A.; Raza, M.T.; Ali, A.; Kim, K. An Enhanced Backbone-Assisted Reliable Framework for Wireless Sensor Networks. Sensors?2010, 3, 1619–1651.
[15]
Al-Karaki, J.N.; Ul-Mustafa, R.; Kamal, A.E. Data Aggregation in Wireless Sensor Networks - Exact and Approximate Algorithms. Proceedings of the IEEE Workshop on High Performance Switching and Routing (HPSR), Phoenix, AZ, USA, February 2004; pp. 241–245.
[16]
Xu, W.; Trappe, W.; Zhang, Y.; Wood, T. The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (Mobihoc), Urbana-Champaign, IL, USA, May 2005; pp. 46–57.
[17]
Xu, W.; Ma, K.; Trappe, W.; Zhang, Y. Jamming Sensor Networks: Attack and Defense Strategies. IEEE Network?2006, 20, 41–47, doi:10.1109/MNET.2006.1637931.
[18]
Chiang, J.; Hu, Y. Cross-layer jamming detection and mitigation in wireless broadcast networks. Proceedings of the 13th annual ACM international conference on Mobile computing and networking (ACM MobiCom), Montreal, QC, Canada, September 2007; pp. 346–349.
[19]
Chiang, J.; Hu, Y. Dynamic jamming mitigation for wireless broadcast networks. Proceedings of the IEEE Conference on Computer Communications (InfoCom), Phoenix, AZ, USA, April 2008; pp. 1211–1219.
[20]
Strasser, M.; P?pper, C.; Capkun, S.; Cagalj, M. Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. Proceedings of the 2008 IEEE Symposium on Security and Privacy, San Francisco, CA, USA, May 2008; pp. 64–78.
[21]
Wood, A.D.; Stankovic, J.A.; Zhou, G. DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. Proceedings of IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), Glasgow, Scotland, June 2007; pp. 60–69.
[22]
Xu, W.; Trappe, W.; Zhang, Y. Channel surfing: defending wireless sensor networks from interference. Proceedings of ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN), New York, NY, USA, 2007; pp. 499–508.
[23]
Khattab, S.; Mosse, D.; Melhem, R. Jamming Mitigation in Multi-Radio Wireless Networks: Reactive or Proactive? Proceedings of the 4th international Conference on Security and Privacy in Communication Networks (SecureComm), Istanbul, Turkey, September 2008; pp. 1–10.
[24]
Ma, K.; Zhang, Y.; Trappe, W. Mobile Network Management and Robust Spatial Retreats Via Network Dynamics. Proceedings of the First International Workshop on Resource Provisioning and Management in Sensor Networks (RPMSN), Washington, DC, USA, November 2005.
[25]
Tague, P.; Li, M.; Poovendran, R. Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution. Proceedings of IEEE Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Athens, Greece, September 2007.
[26]
Lazos, L.; Liu, S.; Krunz, M. Mitigating control-channel jamming attacks in multi-channel ad hoc networks. Proceedings of the Second ACM Conference on Wireless Network Security (WiSec), Zurich, Switzerland, March 2009; pp. 169–180.
[27]
Oh, H.; Bahn, H.; Chae, K. An Energy-Efficient Sensor Routing Scheme for Home Automation Networks. IEEE Trans. Consum. Electron?2005, 51, 836–839, doi:10.1109/TCE.2005.1510492.
[28]
GloMoSim, Available online: http://pcl.cs.ucla.edu/projects/glomosim/ (accessed on January 1, 2010).