A Defense Technique for Jamming Attacks in Wireless Sensor Networks Based on SI

Abstract - Jamming can interrupt wireless transmission and occur by mistake in form of interference, noise or as collision at the receiver or in the circumstance of an attack. In this paper, we propose a swarm based defense technique for jamming attacks in wireless sensor networks. Swarm intelligence algorithm is proficient enough to adapt change in network topology and traffic. The sender and receiver change channels in order to stay away from the jammer, in channel hoping technique. The jammers remain on a single channel, hoping to disrupt any fragment that may be transmitted in the pulse jamming technique. Using the swarm intelligence technique, the forward ants either unicast or broadcast at each node depending on the availability of the channel information for end of the channel. If the channel information is available, the ants randomly choose the next hop. As the backward ants reaches the source, the data collected is verified which channel there is prevalence of attacker long time, and those are omitted. Simultaneously the forward ants are sent through other channels which are not detected before for attacks. This scheme helps limit the channel maintenance overhead. By simulation results, it is clear that this swarm based defense technique for jamming attack is most effective.

[1]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[2]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[3]  Salman Ahmad Khan,et al.  Fuzzy Logic-Based Decision Making for Detecting Distributed Node Exhaustion Attacks in Wireless Sensor Networks , 2010, 2010 Second International Conference on Future Networks.

[4]  David A. Wagner,et al.  Security in wireless sensor networks , 2004, SASN '04.

[5]  K. V. Arya,et al.  Designing Intrusion Detection to Detect Black Hole and Selective Forwarding Attack in WSN Based on Local Information , 2009, 2009 Fourth International Conference on Computer Sciences and Convergence Information Technology.

[6]  Jerry den Hartog,et al.  Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[7]  Gang Zhou,et al.  DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[8]  Zhou Su,et al.  Malicious node detection in wireless sensor networks using weighted trust evaluation , 2008, SpringSim '08.

[9]  Radha Poovendran,et al.  Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[10]  De Li,et al.  Improving Anti-Detection/Interception Performance for Wireless Sensor Network Based on Time-Reversal Technology , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.

[11]  Ayman I. Kayssi,et al.  Malicious Node Detection in Wireless Sensor Networks , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[12]  Amit Konar,et al.  Swarm Intelligence Algorithms in Bioinformatics , 2008, Computational Intelligence in Bioinformatics.

[13]  Ashish Srivastava,et al.  Wireless sensor networks : A Survey of Intrusions and their Explored Remedies , 2010 .

[14]  Lisa Ann Osadciw,et al.  Jamming attack detection and countermeasures in wireless sensor network using ant system , 2006, SPIE Defense + Commercial Sensing.