IJCNIS Vol. 4, No. 7, 8 Jul. 2012
Cover page and Table of Contents: PDF (size: 1043KB)
Full Text (PDF, 1043KB), PP.51-56
Views: 0 Downloads: 0
Denial-of-Service, physical layer jamming, constant shadowing, log normal shadowing, multicasting, wireless sensor networks
This paper analyzes the impact of a physical layer jamming on the performance of wireless sensor networks by performing exhaustive comparative simulations using multicasting and by employing varying intensity of shadowing (constant and log normal). Comprehensive result analysis reveals that jamming drastically degrades the legitimate traffic throughput in a network, and, the constant shadowing approach is a better fit for a static network, both, under static as well as mobile jammer environments, as compared to the log normal one. An improvement in sink-node packet delivery ratio by 15.02 % and 16.58 % was observed with static and mobile jammer environments respectively, under multicasting and constant shadowing mean of 8.0. Further, average sink-node packet delivery ratio with constant shadowing shows an improvement of 4.15% and 5.94%, using static and mobile jammer environment respectively, in comparison to the values obtained under log normal shadowing based network.
Nischay Bahl, Ajay K. Sharma, Harsh K. Verma, "Impact of Physical Layer Jamming on Wireless Sensor Networks with Shadowing and Multicasting", International Journal of Computer Network and Information Security(IJCNIS), vol.4, no.7, pp.51-56, 2012. DOI:10.5815/ijcnis.2012.07.06
[1]Vassilaras Spyridon and Y. Gregory. "Wireless Innovations as Enablers for Complex & Dynamic Artificial Systems", Wireless Personal Communications, Volume 53, Number 3, pp. 365-393 (2010).
[2]Robert Szewczyk, Joseph Polastre, Alan Mainwaring and David Culler. "Lessons from a sensor network expedition", Wireless Sensor Networks Lecture Notes in Computer Science, Vol. 2920, pp. 307-322 (2004).
[3]Adrian Perrig, John Stankovic, David Wagner. "Security in Wireless Sensor Networks", Communications of the ACM, Vol. 47, No. 6 (2004).
[4]JP Walters, Z Liang, W Shi, V Chaudhary. Chapter 17 "Wireless Sensor Network Security: A Survey", Security in Distributed, Grid, and Pervasive Computing Yang Xiao, (Eds.), Auerbach (2006).
[5]Eitan Altman, Konstantin Avrachenkov and Andrey Garnaev. "Jamming in Wireless Networks under Uncertainty", Mobile Networks and Applications, Volume 16, No. 2, pp. 246-254 (2011).
[6]Anthony D. Wood and John A. Stankovic. "Denial of Service in Sensor Networks", IEEE Computer, Vol. 35, No.10, pp. 54-62 (2002).
[7]M. Simon, J. Omura, R. Scholtz, and B. Levitt. "Spread spectrum communications handbook", McGraw-Hill Companies, 1994.
[8]G. Noubir and G. Lin. "Low-power DoS attacks in data wireless LANs and countermeasures", ACM SIGMOBILE Mobile Computing and Communications Review, 7(3):29–30, 2003.
[9]C. Popper, M. Strasser, and S. Capkun. "Jamming-resistant broadcast communication without shared keys" Proceedings of the USENIX Security Symposium, 2009.
[10]W. Xu, W. Trappe, Y. Zhang, and T. Wood. "The feasibility of launching and detecting jamming attacks in wireless networks", Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, pages 46–57, 2005.
[11]Nischay Bahl, Ajay K Sharma and Harsh K Verma. "On Denial of Service Attacks for Wireless Sensor Networks", International Journal of Computer Applications 43 (6): 43-47, April 2012. Published by Foundation of Computer Science, New York, USA.
[12]Xu W, Ma K, Trappe W and Zhang Y. "Jamming sensor networks: attack and defense strategies", IEEE Networks 20(3), pp. 41–47 (2006).
[13]Y. W. Law, M. Palaniswami, L. V. Hoesel, J. Doumen, P. Hartel, and P. Havinga. "Energy-efficient link-layer jamming attacks against WSN MAC protocols", ACM Transactions on Sensor Networks, 5(1):1–38, 2009.
[14]D. Thuente and M. Acharya. "Intelligent jamming in wireless networks with applications to 802.11b and other networks", Proceedings of the IEEE MILCOM, 2006.
[15]Wenyuan Xu, Timothy Wood, Wade Trappe and Yanyong Zhang. "Channel surfing and spatial retreats: Defenses against wireless denial of service", Proceedings of ACM workshop on Wireless security, pp. 80 - 89 (2004).
[16]Hung-Min Sun, Shih-Pu Hsu, and Chien-Ming Chen. "Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks", Proceedings of the 21st International Conference on Advanced Information Networking and Applications Workshops, Vol. 1, pp. 457-462 (2007).
[17]Chan, X. Liu, G. Noubir, and B. Thapa. "Control channel jamming: Resilience and identiļ¬cation of traitors", Proceedings of the IEEE ISIT, 2007.
[18]P. Tague, M. Li, and R. Poovendran. "Probabilistic mitigation of control channel jamming via random key distribution", Proceedings of the PIMRC, 2007.
[19]Yu-Kai Huang, Ai-Chun Pang and Hui-Nien Hung. "A comprehensive analysis of low-power operation for beacon-enabled IEEE 802.15.4 wireless networks", IEEE Transactions on Wireless Communications, Vol. 8 Issue 11, pp. 5601-5611 (2009).
[20]Shigeru Fukunaga et al. "Development of Ubiquitous Sensor Network", Oki Technical Review, Issue 200, Vol. 71, No. 4, pp. 24-29 (2004).
[21]Qualnet 5.0.2 Sensor Network Model Library. Scalable Network Technologies, Inc., Los Angeles, CA (2010).
[22]T.K. Sarkar et al. "A survey of various propagation models for Mobile Communications", IEEE Antennas and Propagation Magazine, Vol. 45, Issue 3, pp. 51 – 82 (2003).
[23]R. Mukherjee and J. William Atwood. "Rendezvous point relocation in protocol independent multicast – sparse mode", Telecommunication Systems, Vol. 24, No. 1, pp. 207-220 (2003).