Abstract
Reactive jamming attacks have been considered as the most critical and fatally adversarial threats to subvert or disrupt the networks since they attack the broadcast nature of transmission mediums by injecting interfering signals. Existing countermeasures against reactive jamming attacks, i.e. frequency hopping or channel surfing, requires excessive computational capabilities, which are infeasible for low cost resource constraint Wireless Sensor Networks (WSNs). To overcome the problems for normal lower power sensors, we propose an efficient localized jamming-resistant approach against reactive jamming attacks by identifying trigger nodes whose transmissions invoke the jammer. By constraining the trigger nodes to be receivers only, we can avoid invoking the jammers and completely nullify the reactive jamming attack. The triggers identification approach utilizes a hexagon tiling coloring and sequential Group Testing (GT), which does not demand any sophisticated hardware. Theoretical analyses and simulation results endorse the suitability of our localized algorithm in terms of time and message complexity.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bellardo, J., Savage, S.: 802.11 Denail-of-Service Sttacks: Real Vulnerabilities and Practical Solutions. In: Proceedings of the 12th Conference on USENIX Security Symposium (2003)
Sidek, O., Yahya, A.: Reed Solomon Coding for Frequency Hopping Spread Spectrum in Jamming Environment. American Journal of Applied Sciences (2008)
Chiang, T., Hu, Y.: Dynamic Jamming Mitigation for Wireless Broadcast Networks. In: INFOCOM (2008)
Desmedt, Y., Safavi-Naini, R., Wang, H., Charnes, C., Pieprzyk, J.: Broadcast Anti-Jamming Systems. Computer Networks, 349–355 (1999)
Ling, Q., Ren, J., Li, T.: Message-Driven Frequency Hopping — Design and Analysis. In: Li, Y., Huynh, D.T., Das, S.K., Du, D.-Z. (eds.) WASA 2008. LNCS, vol. 5258, pp. 373–384. Springer, Heidelberg (2008)
Wood, A., Stankovic, J., Son, S.: A Jammed-Area Mapping Service for Sensor Networks. In: Proceedings of the 24th IEEE International Real-Time System Symposium, vol. 78, pp. 286–297 (2003)
Strasser, M., Popper, C., Capkun, S., Cagalj, M.: Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, pp. 80–89 (2008)
Xu, W., Wood, T., Trappe, W., Zhang, Y.: Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service. In: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 80–89 (2004)
Xu, W., Trappe, W., Zhang, Y.: Channel Surfing: Defending Wireless Sensor Networks from Interference. In: Proceedings of the 6th International Conference on Information Processing in Sensor Networks, pp. 499–508 (2007)
Shin, I., Shen, Y., Xuan, Y., Thai, M., Znati, T.: Reactive Jamming Attacks in Multi-Radio Wireless Sensor Networks: an Efficient Mitigating Measure by Identifying Trigger Nodes. In: Proceedings of the 2nd ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing, FOWANC 2009, pp. 87–96 (2009)
Xuan, Y., Shin, I., Thai, M.: On Trigger Detection against Reactive Jamming Attacks: A Clique-Independent Set Based Approach. In: Performance Computing and Communications Conference (IPCCC), pp. 223–230 (2009)
Xu, W., Trappe, W., Zhang, Y., Wood, T.: The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 46–57 (2005)
Sen, A., Roxborough, T., Sinha, B.: On an Optimal Algorithm for Channel Assignment in Cellular Networks. In: IEEE International Conference on Communications (1999)
Niculescu, D., Nath, B.: Ad Hoc Positioning System (APS) using AOA. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2003 (2003)
Niculescu, D., Nath, B.: Ad Hoc Positioning System (APS) using AOA. In: GLOBECOM 2001 (2001)
Thai, M., Tiwari, R., Du, D.: On Construction of Virtual Backbone in Wireless Ad Hoc Networks with Unidirectional Links. IEEE Transactions on Mobile Computing, TMC (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Shin, I., Kim, S., Seo, J. (2012). On Trigger Detection against Reactive Jamming Attacks: A Localized Solution. In: Lee, D.H., Yung, M. (eds) Information Security Applications. WISA 2012. Lecture Notes in Computer Science, vol 7690. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35416-8_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-35416-8_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-35415-1
Online ISBN: 978-3-642-35416-8
eBook Packages: Computer ScienceComputer Science (R0)