On Denial of Service Attacks for Wireless Sensor Networks

denial-of-service (DoS) attacks for wireless sensor networks (WSNs), we investigated the security aspects of the physical layer. We conducted the simulative performance analysis of jamming attacks for signal-to-noise ratio (SNR), bit error rate (BER), network throughput and packet delivery ratio (PDR) using IEEE 802.15.4 based OPNET simulative model for WSN under constant and varying intensity of jamming attacks. Under constant jamming attack, simulations revealed that average sink node PDR degrades from 79.01% in a normal scenario, to 59.22% in jammed scenario. Also, normal scenario shows maximum PDR of 89.68% and minimum PDR of 70.02% while jammed scenario shows a maximum PDR of 64.93% and minimum PDR of 49.90%. Under varying intensity of jamming attack, simulations revealed that average sink node PDR decreases, from 79.01% in a normal scenario, by 5.54%, 4.53%, 6.36% and 3.35% with the introduction of one, two, three and four jammers respectively. Further, the average SNR decreases, from 73.59%, in a normal scenario, by 5.43%, 5.63%, 10.44% and 20.39% with the introduction of one, two, three and four jammers respectively. Keywordsireless Sensor Network (WSN), ZigBee, Security, Denial of Service (DoS), Jamming Attack.

[1]  Rami G. Melhem,et al.  Honeybees: combining replication and evasion for mitigating base-station jamming in sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[2]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[3]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[4]  Spyridon Vassilaras,et al.  Wireless Innovations as Enablers for Complex & Dynamic Artificial Systems , 2010, Wirel. Pers. Commun..

[5]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[6]  Mitko Bogdanoski,et al.  Overview and Analysis of the Performances of ZigBee- based Wireless Sensor Networks , 2011 .

[7]  Kumkum Garg,et al.  A Hybrid Model of Defense Techniques against Base Station Jamming Attack in Wireless Sensor Networks , 2009, 2009 First International Conference on Computational Intelligence, Communication Systems and Networks.

[8]  Weisong Shi,et al.  Wireless Sensor Network Security: A Survey , 2006 .

[9]  Mithun Acharya,et al.  Intelligent Jamming Attacks , Counterattacks and ( Counter ) 2 Attacks in 802 . 11 b Wireless Networks , 2005 .

[10]  Shivakant Mishra,et al.  Enhancing Base Station Security in Wireless Sensor Networks , 2003 .

[11]  L. Devi,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2014 .

[12]  Hung-Min Sun,et al.  Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).

[13]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[14]  J. Walters,et al.  Chapter 17 Wireless Sensor Network Security : A Survey , 2006 .

[15]  David E. Culler,et al.  Lessons from a Sensor Network Expedition , 2004, EWSN.

[16]  Robert Simon,et al.  A multi-channel defense against jamming attacks in wireless sensor networks , 2007, Q2SWinet '07.

[17]  Shivakant Mishra,et al.  Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks , 2004, International Conference on Dependable Systems and Networks, 2004.

[18]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[19]  Wenyuan Xu,et al.  Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.

[20]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.