Geomorphic zonalisation of wireless sensor networks based on prevalent jamming effects

This study provides a mechanism to divide the complete geographical extent of wireless sensor networks (WSNs) under attack of a jammer into different zones as per the severity of jamming experienced by various nodes of the network. There are some existing methods such as, `Localised Edge Detection in Sensor Field`, `Robust Edge Detection in Wireless Sensor Networks` and `JAM: A Jammed Area Mapping Service for Sensor Networks`, that solve similar problems; but all of them are able to map the geographical extent into only two zones ` `jammed` and `not jammed`, and they all are vulnerable to information warfare as they all require to communicate even while under a jamming attack. The proposed method for zonalisation of the geographical extent of WSNs based on the effects of jamming on various nodes follows the centralised approach, where the mapping is done by the base station through hull tracing of jammed nodes as per their pre-calculated jamming indices thus enforcing the economy of scale, and making it one of the most energy-efficient and fastest-known mapping systems. The method is procedure-centric, as against almost all of the known systems that are protocol-centric, wherein the proposed method dispenses with the need of inter-nodal communications during moments of jamming. The system has no inherent inaccuracies.

[1]  Jerry den Hartog,et al.  Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[2]  Ramesh Govindan,et al.  Localized edge detection in sensor fields , 2003, Ad Hoc Networks.

[3]  Mohammad S. Obaidat,et al.  Connectivity preserving localized coverage algorithm for area monitoring using wireless sensor networks , 2011, Comput. Commun..

[4]  Ranjit Singh,et al.  Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System , 2010, Sensors.

[5]  Muralidhar Medidi,et al.  Robust Edge Detection in Wireless Sensor Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[6]  Sudip Misra,et al.  A probabilistic approach to minimize the conjunctive costs of node replacement and performance loss in the management of wireless sensor networks , 2010, IEEE Transactions on Network and Service Management.

[7]  David P. Kormann,et al.  802.11b access point mapping , 2003, CACM.

[8]  P. Venkata Krishna,et al.  A simple learning automata-based solution for intrusion detection in wireless sensor networks , 2011, Wirel. Commun. Mob. Comput..

[9]  Urbashi Mitra,et al.  Boundary Estimation in Sensor Networks: Theory and Methods , 2003, IPSN.

[10]  Murat Çakiroglu,et al.  Jamming detection mechanisms for wireless sensor networks , 2008, Infoscale.

[11]  Lisa Ann Osadciw,et al.  Jamming attack detection and countermeasures in wireless sensor network using ant system , 2006, SPIE Defense + Commercial Sensing.

[12]  Wenyuan Xu,et al.  On Adjusting Power to Defend Wireless Networks from Jamming , 2007, 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services (MobiQuitous).

[13]  Mark de Berg,et al.  Computational geometry: algorithms and applications , 1997 .

[14]  Ross J. Anderson Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .

[15]  George Dimitoglou,et al.  Using Standard Deviation in Signal Strength Detection to Determine Jamming in Wireless Networks , 2008, CAINE.

[16]  Gruia-Catalin Roman,et al.  Consistent group membership in ad hoc networks , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.

[17]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[18]  P. Venkata Krishna,et al.  An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks , 2010, Comput. Math. Appl..

[19]  Wei Hong,et al.  Beyond Average: Toward Sophisticated Sensing with Queries , 2003, IPSN.

[20]  Sudip Misra,et al.  Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks , 2010, Comput. Electr. Eng..

[21]  Brad Karp,et al.  GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.

[22]  Leonidas J. Guibas,et al.  Collaborative signal and information processing: an information-directed approach , 2003 .

[23]  Robert Morris,et al.  Location Proxies and Intermediate Node Forwarding for Practical Geographic Forwarding , 2001 .

[24]  Srdjan Capkun,et al.  Detection of Reactive Jamming in Sensor Networks , 2009 .