Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System

The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes.

[1]  Andy Hopper,et al.  The active badge location system , 1992, TOIS.

[2]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[3]  Ed. McKenzie 10. Time Series Analysis by Higher Order Crossings , 1996 .

[4]  Jerry den Hartog,et al.  Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[5]  Gang Zhou,et al.  RID: radio interference detection in wireless sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[6]  Srdjan Capkun,et al.  Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .

[7]  Srdjan Capkun,et al.  Detection of reactive jamming in sensor networks , 2010, TOSN.

[8]  Marimuthu Palaniswami,et al.  Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2009, SASN '05.

[9]  Srdjan Capkun,et al.  Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.

[10]  Richard P. Martin,et al.  The Robustness of Localization Algorithms to Signal Strength Attacks: A Comparative Study , 2006, DCOSS.

[11]  Gruia-Catalin Roman,et al.  Consistent group membership in ad hoc networks , 2001, Proceedings of the 23rd International Conference on Software Engineering. ICSE 2001.

[12]  J.E. Mazo,et al.  Digital communications , 1985, Proceedings of the IEEE.

[13]  Ronald R. Yager,et al.  Fuzzy sets, neural networks, and soft computing , 1994 .

[14]  Behrouz A. Forouzan,et al.  Data Communications and Networking , 2000 .

[15]  L. B. Milstein,et al.  Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.

[16]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[17]  Ebrahim H. Mamdani,et al.  An Experiment in Linguistic Synthesis with a Fuzzy Logic Controller , 1999, Int. J. Hum. Comput. Stud..

[18]  King Lun Yiu Ad-hoc positioning system , 2008 .

[19]  Leszek Rutkowski,et al.  Neural Networks and Soft Computing , 2003 .

[20]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[21]  Chuen-Tsai Sun,et al.  Neuro-fuzzy And Soft Computing: A Computational Approach To Learning And Machine Intelligence [Books in Brief] , 1997, IEEE Transactions on Neural Networks.

[22]  Urbashi Mitra,et al.  Boundary Estimation in Sensor Networks: Theory and Methods , 2003, IPSN.

[23]  Murat Çakiroglu,et al.  Jamming detection mechanisms for wireless sensor networks , 2008, Infoscale.

[24]  Christian F. Tschudin,et al.  Coping with communication gray zones in IEEE 802.11b based ad hoc networks , 2002, WOWMOM '02.

[25]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[26]  F. Golatowski,et al.  Weighted Centroid Localization in Zigbee-based Sensor Networks , 2007, 2007 IEEE International Symposium on Intelligent Signal Processing.

[27]  Leonidas J. Guibas,et al.  Collaborative signal and information processing: an information-directed approach , 2003 .

[28]  George Dimitoglou,et al.  Using Standard Deviation in Signal Strength Detection to Determine Jamming in Wireless Networks , 2008, CAINE.

[29]  Hari Balakrishnan,et al.  6th ACM/IEEE International Conference on on Mobile Computing and Networking (ACM MOBICOM ’00) The Cricket Location-Support System , 2022 .

[30]  Tarek F. Abdelzaher,et al.  Range-free localization schemes for large scale sensor networks , 2003, MobiCom '03.

[31]  Richard P. Martin,et al.  A Practical Approach to Landmark Deployment for Indoor Localization , 2006, 2006 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks.

[32]  Gang Zhou,et al.  DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[33]  Guevara Noubir,et al.  Low-power DoS attacks in data wireless LANs and countermeasures , 2003, MOCO.

[34]  Yee Wei Law,et al.  Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.

[35]  Tian He,et al.  Range-free localization schemes in large scale sensor network , 2003, MobiCom 2003.

[36]  H. S. Wolff,et al.  iRun: Horizontal and Vertical Shape of a Region-Based Graph Compression , 2022, Sensors.

[37]  Lisa Ann Osadciw,et al.  Jamming attack detection and countermeasures in wireless sensor network using ant system , 2006, SPIE Defense + Commercial Sensing.