全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
Sensors  2010 

Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System

DOI: 10.3390/s100403444

Keywords: wireless sensor networks, jamming detection, fuzzy inference system, information warfare

Full-Text   Cite this paper   Add to My Lib

Abstract:

The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes.

References

[1]  Xu, W.; Trappe, W.; Zhang, Y.; Wood, T. The feasibility of launching and detecting jamming attacks in wireless networks. In MobiHoc ’05, Proceedings of the Sixth ACM International Symposium on Mobile ad hoc Networking and Computing, Alexandria, VA, USA, 07–07 November 2005; pp. 46–57.
[2]  Rajani, M.; Lisa, A.O. Jamming attack detection and countermeasures in wireless sensor network using ant system. Available online: http://www.cognitiveintelligence.com/documents/SPIE2006.pdf/ (accessed on 12 October 2009 at 1:15 PM).
[3]  ?akiro?lu, M.; ?zcerit, A.T. Jamming detection mechanisms for wireless sensor networks. Proceedings of the 3rd International Conference on Scalable Information Systems, Vico Equense, Italy, 04–06 June 2008.
[4]  Kristopher, W.R.; Ahmed, S.; George, D. Using standard deviation in signal strength detection to determine jamming in wireless networks. Available online: http://kreese.net/scr/content/documents/SSDModel.reese.pdf/ (accessed on 07 October 2009 at 1:30 PM).
[5]  Mario, S.; Boris, D.; Srdjan, C. Detection of reactive jamming in sensor networks. ETH Zurich D-INFK Technical Report 634; ETH: Zurich, Switzerland, 2009.
[6]  Behrouz, A.F.; Sophia, C.F. Data Communications and Networking; Tata McGraw-Hill: New Delhi, Delhi, India, 2007; pp. 19–21.
[7]  Wood, A.; Stankovic, J.; Son, S. JAM: a jammed area mapping service for sensor networks. 24th IEEE Real-Time Systems Symposium, Cancun, Mexico, December 2003; pp. 286–297.
[8]  Nowak, R.; Mitra, U. Boundary estimation in sensor networks: theory and methods. IPSN ’03, Palo Alto, CA, USA, 22–23 April 2003; pp. 162–177.
[9]  Hallerstein, J.M.; Hong, W.; Madden, S.; Stanek, K. Beyond average: towards sophisticated sensing with queries. IPSN ’03;, Palo Alto, CA, USA, 22–23 March 2003; pp. 63–79.
[10]  Yee, W.; Lodewijk, L.; Hossel, V.; Doumen, J.; Hartel, P.; Havinga, P. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. SANS ’05;, Alexandria, VA, USA, 7 November 2005; pp. 1567–1576.
[11]  Law, Y.; Hartel, P.; Hartog, J.D.; Havinga, P. Link-layer jamming attacks on S-MAC. 2nd European Workshop on Wireless Sensor Networks, Alexandria, VA, USA, 7 November 2005; pp. 217–225.
[12]  Anthony, D.W.; John, A.S.; Gang, Z. DEEJAM: defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. SECON 2007, San Diego, CA, USA, June 2007.
[13]  Gang, Z.; Tian, H.; John, A. S.; Tarek, A. RID: radio interference detection in wireless sensor networks. Available online: http://scholar.google.co.in/scholar?start=0&q=jamming+detection+wireless+sensor+network&hl=en/ (accessed on 7 October 2009 at 12:53 PM).
[14]  Kedem, B. Time Series Analysis by Higher Order Crossings; IEEE Press: New York, NY, USA, 1994.
[15]  Yager, R.P.; Zaden, L.A. Fuzzy Sets, Neural Networks and Soft Computing; John Wiley & Sons, Inc: New York, NY, USA, 1994; pp. 450–530.
[16]  Mamdani, E.H.; Assilian, S. Experiment in linguistic synthesis with a fuzzy logic controller. Int. J. Man-Mach. Stud?1975, 7, 1–13.
[17]  Jang, J.S.R.; Sun, C.T.; Mizutani, E. Neuro-Fuzzy and Soft Computing: A Computational Approach to Learning and Machine Intelligence; Dorling Kindersley (India) Pvt. Ltd: New Delhi, India, 2007; pp. 99–115.
[18]  Niculescu, D.; Nath, B. Ad-hoc positioning system. Proceedings of IEEE GLOBECOM ’01; San Antonio, TX, USA, 2001; pp. 2926–2931.
[19]  Pickholtz, R.L.; Schilling, D.L.; Milstein, L.B. Theory of spread spectrum communications–a tutorial. IEEE Trans. Commun?1982, 20, 855–884.
[20]  Roman, G.C.; Huang, Q.; Hazemi, A. Consistent group membership in ad-hoc networks. Proceedings of the 23rd International Conference on Soft-ware Engineering, Washington, DC, USA, May 2001; pp. 381–388.
[21]  Zhao, F.; Liu, J.; Guibas, L.; Reich, J. Collaborative signal and information processing: an information directed approach. Proc. IEEE?2003, 91, 1199–1209.
[22]  Want, R.; Hopper, A.; Falcao, V.; Gibbons, J. The active badge location system. ACM Trans. Inform. Syst?1992, 10, 91–102.
[23]  Bahl, P.; Padmanabhan, V. N. RADAR: an in-building RF-based user location and tracking system. Proceedings of the IEEE International Conference on Computer Communications, Tel Aviv, Israel, March 2000; pp. 775–784.
[24]  Chen, Y.; Francisco, J.; Trappe, W.; Martin, R.P. A practical approach to landmark deployment for indoor localization. Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, San Jose, CA, USA, July 2006; pp. 406–414.
[25]  Proakis, J.G. Digital Communications, 4th ed ed.; McGraw-Hill: New York, NY, USA, 2000.
[26]  Noubir, G.; Lin, G. Low power DoS attacks in data wireless LANs and countermeasures. SIGMOBILE Mob. Comput. Commun. Rev?2003, 7, 29–30.
[27]  Cagalj, M.; Capkun, S.; Hubaux, J. Wormhole-based anti-jamming technique in sensor networks. IEEE Trans. Mob. Comput?2007, 6, 100–114.
[28]  Priyantha, N.; Chakraborty, A.; Balakrishnan, H. The cricket location support system. Proceedings of the ACM International Conference on Mobile Computing and Networking, Boston, MA, USA, August 2000; pp. 32–43.
[29]  Chen, Y.; Kleisouris, K.; Li, X.; Trappe, W.; Martin, R.P. The robustness of localization algorithms to signal strength attacks: a comparative study. Proceedings of the International Conference on Distributed Computing in Sensor Systems, San Francisco, CA, USA, 18–20 June 2006; pp. 546–563.
[30]  He, T.; Huang, C.; Blum, B.; Stankovic, J.A.; Abdelzaher, T. Range-free localization schemes in large scale sensor networks. Proceedings of the Ninth Annual ACM International Conference on Mobile Computing and Networking, San Diego, CA, USA, 19 September 2003; pp. 243–254.
[31]  Bluementhal, J.; Grossmann, R.; Golatowski, F.; Timmermann, D. Weighted centroid localization in zigbee-based sensor networks. Proceedings of the IEEE International Symposium on Intelligent Signal Processing, Alcalá de Henares, Spain, 3–5 October 2007; pp. 1–6.
[32]  Rappaport, T. Wireless Communications: Principles and Practice; Prentice Hall: Englewood Cliffs, NJ, USA, 1996.
[33]  Lundgren, H.; Nordstr, E.; C. Tschudin, C. Coping with communication gray zones in IEEE 802.11b based ad-hoc networks. Proceedings of the Fifth ACM International Workshop on Wireless Mobile Multimedia, New York, NY, USA, 28 September 2002; ACM Press: Atlanta, GA, USA; pp. 49–55.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133