On trigger detection against reactive Jamming Attacks: A clique-independent set based approach

Among existing countermeasures against Reactive Jamming Attacks in Wireless Sensor Networks, the detection of trigger nodes whose transmissions invoke the jammer nodes has been proposed and developed as an efficient jamming-resistent routing scheme in unreliable WSN environments. Sequential group testing techniques were adopted in our previous work to alleviate the overhead of trigger detection in terms of time and communication complexity. In this paper, we further improve the detection procedure by leveraging the classic models of randomized non-adaptive group testing and clique-independent set, which dramatically decreases the time complexity compared to our previous solution.

[1]  Murat Çakiroglu,et al.  Jamming detection mechanisms for wireless sensor networks , 2008, Infoscale.

[2]  Taieb Znati,et al.  Reactive jamming attacks in multi-radio wireless sensor networks: an efficient mitigating measure by identifying trigger nodes , 2009, FOWANC '09.

[3]  Othman Sidek,et al.  Reed Solomon Coding for Frequency Hopping Spread Spectrum in Jamming Environment , 2008 .

[4]  Radha Poovendran,et al.  Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[5]  Srdjan Capkun,et al.  Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .

[6]  Srdjan Capkun,et al.  Detection of Reactive Jamming in Sensor Networks , 2009 .

[7]  Srdjan Capkun,et al.  Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.

[8]  Jean Walrand,et al.  Maximal Cliques in Unit Disk Graphs: Polynomial Approximation , 2006 .

[9]  Richard A. Poisel,et al.  Modern Communications Jamming Principles and Techniques , 2003 .

[10]  Jingbo Guo,et al.  Feasibility Assessment of Repeater Jamming Technique for DSSS , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[11]  Mikhail J. Atallah,et al.  Indexing Information for Data Forensics , 2005, ACNS.

[12]  C. Pandu Rangan,et al.  Algorithmic aspects of clique-transversal and clique-independent sets , 2000, Discret. Appl. Math..

[13]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[14]  Wang Zanji,et al.  Performance of DSSS against Repeater Jamming , 2006, 2006 13th IEEE International Conference on Electronics, Circuits and Systems.

[15]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[16]  Wenyuan Xu,et al.  Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.

[17]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.