Jamming in underwater sensor networks: detection and mitigation

Underwater sensor networks (UWSNs) can be deployed for sensing the environment in oceanographic columns and other water bodies in which they are deployed. The peculiar characteristic of the underwater medium, coupled with the queer nature of the sound waves in water, poses an enigmatic problem for UWSN researchers. In this study, the authors focus on the problem of UWSN jamming, which is a popular type of denial-of-service attack. The existing jamming detection solutions for sensor networks are primarily targeted towards the terrestrial ones. In this work, the authors study the unique characteristics of jamming in UWSN, and propose a protocol, known as underwater jamming detection protocol (UWJDP), to detect and mitigate jamming in underwater environments. The results show that if the packet delivery ratio (PDR) is less than or equal to 0.8, the authors have the maximum probability of detecting jamming. The jamming detection ratio is around 2-11- more for the said PDR.

[1]  Jiejun Kong,et al.  Time-critical underwater sensor diffusion with no proactive exchanges and negligible reactive floods , 2007, Ad Hoc Networks.

[2]  Wang Chunlei,et al.  Detecting and Locating Wormhole Attacks in Wireless Sensor Networks Using Beacon Nodes , 2009 .

[3]  George Dimitoglou,et al.  Using Standard Deviation in Signal Strength Detection to Determine Jamming in Wireless Networks , 2008, CAINE.

[4]  Chun Tung Chou,et al.  Detecting Wormhole Attacks in Wireless Sensor Networks , 2006 .

[5]  Jiejun Kong,et al.  Building underwater ad-hoc networks and sensor networks for large scale real-time aquatic applications , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[6]  Lisa Ann Osadciw,et al.  Jamming attack detection and countermeasures in wireless sensor network using ant system , 2006, SPIE Defense + Commercial Sensing.

[7]  Hewijin Christine Jiau,et al.  Localization with mobile anchor points in wireless sensor networks , 2005, IEEE Transactions on Vehicular Technology.

[8]  Yi Zhou,et al.  A Localization Scheme for Underwater Wireless Sensor Networks , 2009 .

[9]  Yixian Yang,et al.  A ranging based scheme for detecting the wormhole attack in wireless sensor networks , 2012 .

[10]  Michael Joswig,et al.  Beneath-and-Beyond Revisited , 2002, Algebra, Geometry, and Software Systems.

[11]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[12]  Mohamed Hamdi,et al.  Doppler Effect on Location-Based Tracking in Mobile Sensor Networks , 2007, 2007 IEEE/ACS International Conference on Computer Systems and Applications.

[13]  Taieb Znati,et al.  Locate More Nodes in Under Water Sensor Networks Using Out-of-Range Information , 2008, 2008 IEEE Wireless Communications and Networking Conference.

[14]  Milica Stojanovic,et al.  Shallow-Water Acoustic Networks† , 2003 .

[15]  Zhou Shengli,et al.  Prospects and problems of wireless communication for underwater sensor networks , 2008 .

[16]  Dario Pompili,et al.  Underwater acoustic sensor networks: research challenges , 2005, Ad Hoc Networks.

[17]  Mario Gerla,et al.  Localization with Dive'N'Rise (DNR) beacons for underwater acoustic sensor networks , 2007, Underwater Networks.

[18]  Dario Pompili,et al.  Deployment analysis in underwater acoustic wireless sensor networks , 2006, Underwater Networks.

[19]  Jun-Hong Cui,et al.  Aqua-Net : An Underwater Sensor Network Architecture — Design and Implementation , 2009 .

[20]  Srdjan Capkun,et al.  Detection of Reactive Jamming in Sensor Networks , 2009 .

[21]  Sudip Misra,et al.  Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks , 2010, Comput. Electr. Eng..

[22]  Ellis Horowitz,et al.  Fundamentals of Computer Algorithms , 1978 .

[23]  Jun-Hong Cui,et al.  Scalable Localization with Mobility Prediction for Underwater Sensor Networks , 2011, IEEE Trans. Mob. Comput..

[24]  Murat Çakiroglu,et al.  Jamming detection mechanisms for wireless sensor networks , 2008, Infoscale.

[25]  Dario Pompili,et al.  Three-dimensional and two-dimensional deployment analysis for underwater acoustic sensor networks , 2009, Ad Hoc Networks.

[26]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[27]  M. Stojanovic,et al.  Underwater acoustic networks , 2000, IEEE Journal of Oceanic Engineering.

[28]  Wenyu Liu,et al.  Localization and Synchronization for 3D Underwater Acoustic Sensor Networks , 2007, UIC.

[29]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[30]  Mario Gerla,et al.  Pressure Routing for Underwater Sensor Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[31]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[32]  Bharat K. Bhargava,et al.  Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks , 2005, WiSe '05.

[33]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[34]  Shengli Zhou,et al.  Localization for Large-Scale Underwater Sensor Networks , 2007, Networking.

[35]  Jun-Hong Cui,et al.  R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks , 2007, International Conference on Wireless Algorithms, Systems and Applications (WASA 2007).

[36]  Jiejun Kong,et al.  The challenges of building mobile underwater wireless networks for aquatic applications , 2006, IEEE Network.

[37]  Ranjit Singh,et al.  Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System , 2010, Sensors.

[38]  David P. Dobkin,et al.  The quickhull algorithm for convex hulls , 1996, TOMS.

[39]  I. Akyildiz,et al.  A Resilient Routing Algorithm for Long-term Applications in Underwater Sensor Networks , 2006 .

[40]  Dario Pompili,et al.  Challenges for efficient communication in underwater acoustic sensor networks , 2004, SIGBED.

[41]  Shengli Zhou,et al.  Prospects and Problems of Wireless Communication for Underwater Sensor , 2008 .

[42]  P. Venkata Krishna,et al.  An adaptive learning routing protocol for the prevention of distributed denial of service attacks in wireless mesh networks , 2010, Comput. Math. Appl..

[43]  Aung Htein Maw,et al.  Wormhole Attack Detection in Wireless Sensor Networks , 2008 .

[44]  Bharat K. Bhargava,et al.  Visualization of wormholes in sensor networks , 2004, WiSe '04.