Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Defending wireless sensor networks from radio interference through channel adaptation

Published: 04 September 2008 Publication History
  • Get Citation Alerts
  • Abstract

    Radio interference, whether intentional or otherwise, represents a serious threat to assuring the availability of sensor network services. As such, techniques that enhance the reliability of sensor communications in the presence of radio interference are critical. In this article, we propose to cope with this threat through a technique called channel surfing, whereby the sensor nodes in the network adapt their channel assignments to restore network connectivity in the presence of interference. We explore two different approaches to channel surfing: coordinated channel switching, in which the entire sensor network adjusts its channel; and spectral multiplexing, in which nodes in a jammed region switch channels and nodes on the boundary of a jammed region act as radio relays between different spectral zones. For coordinated channel switching, we examine an autonomous strategy where each node detects the loss of its neighbors in order to initiate channel switching. To cope with latency issues in the autonomous strategy, we propose a broadcast-assisted channel switching strategy to more rapidly coordinate channel switching. For spectral multiplexing, we have devised both synchronous and asynchronous strategies to facilitate the scheduling of nodes in order to improve network fidelity when sensor nodes operate on multiple channels. In designing these algorithms, we have taken a system-oriented approach that has focused on exploring actual implementation issues under realistic network settings. We have implemented these proposed methods on a testbed of 30 Mica2 sensor nodes, and the experimental results show that channel surfing, in its various forms, is an effective technique for repairing network connectivity in the presence of radio interference, while not introducing significant performance-overhead.

    References

    [1]
    Bellardo, J. and Savage, S. 2003. 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In Proceedings of the USENIX Security Symposium. 15--28.
    [2]
    Cagalj, M., Capkun, S., and Hubaux, J. 2007. Wormhole-based anti-jamming techniques in sensor networks. To IEEE Trans. Mob. Comput. To appear.
    [3]
    Ganeriwal, S., Kumar, R., and Srivastava, M. 2003. Timing-sync protocol for sensor networks. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys'03). 138--149.
    [4]
    Garces, R. and Aceves, J. G. L. 2000. Collision avoidance and resolution multiple access for multi-channel wireless networks. In Proceedings of IEEE INFOCOM. 595--602.
    [5]
    Heinzelman, W., Kulik, J., and Balakrishnan, H. 1999. Adaptive protocols for information dissemination in wireless sensor networks. In Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking. 174--185.
    [6]
    Intanagonwiwat, C., Govindan, R., and Estrin, D. 2000. Directed diffusion: a scalable and robust communication paradigm for sensor networks. In Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networks (MobiCOM).
    [7]
    Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L., and Rubenstein, D. 2002. Energy-efficient computing for wildlife tracking: design and tradeoffs and early experiences with zebranet. In Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems. 96--107.
    [8]
    Kyasanur, P. and Vaidya, N. 2003. Detection and handling of MAC layer misbehavior in wireless networks. In Proceedings of the IEEE International Conference on Dependable Systems and Networks. 173--182.
    [9]
    Law, Y., Hartel, P., den Hartog, J., and Havinga, P. 2005. Link-layer jamming attacks on S-MAC. In Proceedings of the 2nd European Workshop on Wireless Sensor Networks (EWSN'05). 217--225.
    [10]
    Ma, K., Zhang, Y., and Trappe, W. 2005. Mobile network management and robust spatial retreats via network dynamics. In Proceedings of the The 1st International Workshop on Resource Provisioning and Management in Sensor Networks (RPMSN05).
    [11]
    Madden, S., Franklin, M., Hellerstein, J., and Hong, W. 2002. TAG: a Tiny aggregation service for ad-hoc sensor networks. In Proceedings of the Usenix Symposium on Operating Systems Design and Implementation.
    [12]
    Navda, V., Bohra, A., Ganguly, S., and Rubenstein. 2007. Using channel hopping to Increase 802.11 resilience to jamming attacks. In IEEE Infocom Minisymposium. Anchorage, AK.
    [13]
    Noubir, G. and Lin, G. 2003. Low-power DoS attacks in data wireless lans and countermeasures. SIGMOBILE Mob. Comput. Comm. Rev. 7, 3, 29--30.
    [14]
    Perrig, A., Szewczyk, R., Tygar, D., Wen, V., and Culler, D. 2002. SPINS: security protocols for sensor networks. Wirel. Netw. 8, 5, 521--534.
    [15]
    Polastre, J., Hill, J., and Culler, D. 2004. Versatile low power media access for wireless sensor networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys'04). 95--107.
    [16]
    Proakis, J. G. 2000. Digital Communications, 4th Ed. McGraw-Hill.
    [17]
    Rajeswaran, A. and Negi, R. 2005. DoS analysis of reservation based MAC protocols. In Proceedings of the IEEE International Conference on Communications.
    [18]
    Raniwala, A., Gopalan, K., and Chiueh, T. 2004. Centralized channel assignment and routing algorithms for multi-channel wireless mesh networks. ACM Mob. Comput. Comm. Rev. 8, 2, 50--65.
    [19]
    Rappaport, S. S. and Grieco, D. M. 1984. Spread-spectrum signal acquisition—Methods and technology. IEEE Comm. Mag. 22, 6--21.
    [20]
    Raya, M., Hubaux, J., and Aad, I. 2004. Domino: a system to detect greedy behavior in IEEE 802.11 hotspots. In Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services (MobiSYS'04). ACM Press, 84--97.
    [21]
    Schleher, C. 1999. Electronic Warfare in the Information Age. MArtech House.
    [22]
    So, J. and Vaidya, N. 2003. Multi-channel MAC for ad hoc network: handling multi-channel hidden terminals using a single transceiver. In Proceedings of ACM MobiHoc. 222--233.
    [23]
    TinyOS. Tinyos homepage. http://webs.cs.berkeley.edu/tos/.
    [24]
    Wan, C.-Y., Eisenman, S., and Campbell, A. 2003. Coda: congestion detection and avoidance in sensor networks. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys'03). 266--279.
    [25]
    Woo, A., Tong, T., and Culler, D. 2003. Taming the underlying challenges of reliable multihop routing in sensor networks. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys'03). 14--27.
    [26]
    Wood, A. and Stankovic, J. 2002. Denial of service in sensor networks. IEEE Comput. 35, 10, 54--62.
    [27]
    Wood, A., Stankovic, J., and Son, S. 2003. JAM: A jammed-area mapping service for sensor networks. In Proceedings of the 24th IEEE Real-Time Systems Symposium. 286--297.
    [28]
    Xu, W., Trappe, W., Zhang, Y., and Wood, T. 2005. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'05). 46--57.
    [29]
    Xu, W., Wood, T., Trappe, W., and Zhang, Y. 2004. Channel surfing and spatial retreats: defenses against wireless denial of service. In Proceedings of the ACM Workshop on Wireless Security. 80--89.
    [30]
    Ye, W., Heidemann, J., and Estrin, D. 2002. An energy-efficient MAC protocol for wireless sensor networks. In Proceedings of the IEEE INFOCOM. Vol. 3. 1567--1576.
    [31]
    Zhao, J. and Govindan, R. 2003. Understanding packet delivery performance in dense wireless sensor networks. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys'03). 1--13.

    Cited By

    View all
    • (2022)Understanding and Mitigating the Impact of Wi-Fi 6E Interference on Ultra-Wideband Communications and Ranging2022 21st ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)10.1109/IPSN54338.2022.00015(92-104)Online publication date: May-2022
    • (2021)Communication Jamming in Body Sensor Network: A Review2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)10.1109/SMART52563.2021.9676294(135-139)Online publication date: 10-Dec-2021
    • (2018)A Framework for Energy Optimization in Wireless Sensor Nodes at Ad-Hoc network2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on10.1109/I-SMAC.2018.8653738(419-422)Online publication date: Aug-2018
    • Show More Cited By

    Index Terms

    1. Defending wireless sensor networks from radio interference through channel adaptation

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Sensor Networks
      ACM Transactions on Sensor Networks  Volume 4, Issue 4
      August 2008
      295 pages
      ISSN:1550-4859
      EISSN:1550-4867
      DOI:10.1145/1387663
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Journal Family

      Publication History

      Published: 04 September 2008
      Accepted: 01 October 2007
      Revised: 01 October 2007
      Received: 01 April 2007
      Published in TOSN Volume 4, Issue 4

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Channel Surfing
      2. Jamming
      3. Radio Interference

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 09 Aug 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Understanding and Mitigating the Impact of Wi-Fi 6E Interference on Ultra-Wideband Communications and Ranging2022 21st ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN)10.1109/IPSN54338.2022.00015(92-104)Online publication date: May-2022
      • (2021)Communication Jamming in Body Sensor Network: A Review2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)10.1109/SMART52563.2021.9676294(135-139)Online publication date: 10-Dec-2021
      • (2018)A Framework for Energy Optimization in Wireless Sensor Nodes at Ad-Hoc network2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on10.1109/I-SMAC.2018.8653738(419-422)Online publication date: Aug-2018
      • (2018)Large scale data based audio scene classificationInternational Journal of Speech Technology10.1007/s10772-018-9552-321:4(825-836)Online publication date: 1-Dec-2018
      • (2017)Evaluation of various feature sets and feature selection towards automatic recognition of bird speciesInternational Journal of Computer Applications in Technology10.5555/3192212.319221456:3(172-184)Online publication date: 1-Jan-2017
      • (2017)An Algorithm for Resisting WiFi Interference in ZigBee2017 4th International Conference on Information Science and Control Engineering (ICISCE)10.1109/ICISCE.2017.289(1391-1395)Online publication date: Jul-2017
      • (2017)Jammer Localization in Multi-Hop Wireless Network: A Comprehensive SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2016.263114619:2(765-799)Online publication date: Oct-2018
      • (2017)Anti-jamming communication for body area network using chaotic frequency hoppingHealthcare Technology Letters10.1049/htl.2017.00414:6(233-237)Online publication date: 1-Dec-2017
      • (2016)Security Challenges in Wireless Sensor NetworkMobile Computing and Wireless Networks10.4018/978-1-4666-8751-6.ch083(1874-1899)Online publication date: 2016
      • (2016)Interference-Robust Transmission in Wireless Sensor NetworksSensors10.3390/s1611191016:11(1910)Online publication date: 14-Nov-2016
      • Show More Cited By

      View Options

      Get Access

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media