A survey on jamming attacks and countermeasures in WSNs

Jamming represents the most serious security threat in the field of wireless sensor networks (WSNs), as it can easily put out of order even WSNs that utilize strong highlayer security mechanisms, simply because it is often ignored in the initial WSN design. The objective of this article is to provide a general overview of the critical issue of jamming in WSNs and cover all the relevant work, providing the interested researcher pointers for open research issues in this field. We provide a brief overview of the communication protocols typically used in WSN deployments and highlight the characteristics of contemporary WSNs, that make them susceptible to jamming attacks, along with the various types of jamming which can be exercised against WSNs. Common jamming techniques and an overview of various types of jammers are reviewed and typical countermeasures against jamming are also analyzed. The key ideas of existing security mechanisms against jamming attacks in WSNs are presented and open research issues, with respect to the defense against jamming attacks are highlighted.

[1]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[2]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[3]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[4]  Chee-Yee Chong,et al.  Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.

[5]  Nitin H. Vaidya,et al.  Medium access control protocols using directional antennas in ad hoc networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[6]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[7]  G. Thiele,et al.  Antenna theory and design , 1981 .

[8]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[9]  Yoan Shin,et al.  Multipath characteristics of impulse radio channels , 2000, VTC2000-Spring. 2000 IEEE 51st Vehicular Technology Conference Proceedings (Cat. No.00CH37026).

[10]  Henry Samueli,et al.  Analysis and design of a frequency-hopped spread-spectrum transceiver for wireless personal communications , 2000, IEEE Trans. Veh. Technol..

[11]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[12]  TRANSPORT LAYER AND SECURITY PROTOCOLS FOR AD HOC WIRELESS NETWORKS , 2004 .

[13]  Somprakash Bandyopadhyay,et al.  Multipath Routing in Ad Hoc Wireless Networks with Omni Directional and Directional Antenna: A Comparative Study , 2002, IWDC.

[14]  W. H. Martin Decibel — The name for the transmission unit , 1929 .

[15]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[16]  Sang Hyuk Son,et al.  Wireless Sensor Networks for In-Home Healthcare: Potential and Challenges , 2005 .

[17]  L. B. Milstein,et al.  Theory of Spread-Spectrum Communications - A Tutorial , 1982, IEEE Transactions on Communications.

[18]  Yee Wei Law,et al.  How to Secure a Wireless Sensor Network , 2005, 2005 International Conference on Intelligent Sensors, Sensor Networks and Information Processing.

[19]  Özgür B. Akan,et al.  Multimedia communication in wireless sensor networks , 2005, Ann. des Télécommunications.

[20]  D. Curtis Schleher,et al.  Electronic Warfare in the Information Age , 1999 .

[21]  Ahmed Karmouch,et al.  Mobile software agents: an overview , 1998, IEEE Commun. Mag..

[22]  Don J. Torrieri,et al.  Fundamental limitations on repeater jamming of frequency-hopping communications , 1989, IEEE J. Sel. Areas Commun..

[23]  S. Bandyopadhyay,et al.  An adaptive MAC and idrectional routing protocol for ad hoc wireless network using ESPAR antenna , 2001, MobiHoc '01.

[24]  Charalampos Konstantopoulos,et al.  Defending Wireless Sensor Networks from Jamming Attacks , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[25]  Guevara Noubir,et al.  On Connectivity in Ad Hoc Networks under Jamming Using Directional Antennas and Mobility , 2004, WWIC.

[26]  Yee Wei Law,et al.  Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2005, TOSN.

[27]  J. Gardner,et al.  Microsensors, MEMS, and Smart Devices , 2001 .

[28]  Gang Zhou,et al.  RID: radio interference detection in wireless sensor networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[29]  Martin Reisslein,et al.  A survey of multimedia streaming in wireless sensor networks , 2008, IEEE Communications Surveys & Tutorials.

[30]  Wenyuan Xu,et al.  Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.

[31]  Burton S. Kaliski,et al.  PKCS #5: Password-Based Cryptography Specification Version 2.0 , 2000, RFC.

[32]  Radha Poovendran,et al.  Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[33]  Wenyuan Xu,et al.  Channel Surfing: Defending Wireless Sensor Networks from Interference , 2007, 2007 6th International Symposium on Information Processing in Sensor Networks.

[34]  John G. Proakis,et al.  Digital Communications , 1983 .

[35]  Gregory J. Pottie,et al.  Wireless integrated network sensors: toward low-cost and robust self-organizing security networks , 1999, Other Conferences.

[36]  Gyula Simon,et al.  The flooding time synchronization protocol , 2004, SenSys '04.

[37]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[38]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[39]  Paul J.M. Havinga,et al.  A Lightweight Medium Access Protocol (LMAC) for Wireless Sensor Networks: Reducing Preamble Transmissions and Transceiver State Switches , 2004 .

[40]  Ram Ramanathan,et al.  On the performance of ad hoc networks with beamforming antennas , 2001, MobiHoc '01.

[41]  Ram Ramanathan On the performance of ad hoc networks with beamforming antennas , 2001, MobiHoc.

[42]  Ian F. Akyildiz,et al.  A survey on wireless multimedia sensor networks , 2007, Comput. Networks.

[43]  Cauligi S. Raghavendra,et al.  Energy efficient communications in ad hoc networks using directional antennas , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[44]  Jerry den Hartog,et al.  Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[45]  Radha Poovendran,et al.  Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[46]  Gang Zhou,et al.  DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[47]  Sunita Ram,et al.  The people sensor: a mobility aid for the visually impaired , 1998, Digest of Papers. Second International Symposium on Wearable Computers (Cat. No.98EX215).

[48]  David L. Adamy,et al.  EW 102: A Second Course in Electronic Warfare , 2004 .

[49]  Yang Li,et al.  Analysis of multipath routing for ad hoc networks using directional antennas , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.

[50]  Somprakash Bandyopadhyay,et al.  An adaptive MAC and idrectional routing protocol for ad hoc wireless network using ESPAR antenna , 2001, MobiHoc.

[51]  J. Gardner,et al.  Microsensors, MEMS, and Smart Devices: Gardner/Microsensors, MEMS, and Smart Devices , 2001 .

[52]  Abdelsalam Helal,et al.  Drishti: an integrated indoor/outdoor blind navigation system and service , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[53]  Victor C. M. Leung,et al.  Secure Routing for Mobile Ad Hoc Networks , 2006 .

[54]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[55]  Takuji Nishimura,et al.  Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator , 1998, TOMC.

[56]  Parameswaran Ramanathan,et al.  Distributed target classification and tracking in sensor networks , 2003 .

[57]  Kai-Ten Feng LMA: Location- and Mobility-Aware Medium-Access Control Protocols for Vehicular Ad Hoc Networks Using Directional Antennas , 2007, IEEE Transactions on Vehicular Technology.

[58]  Liesbet Van der Perre,et al.  Optimizing transmission and shutdown for energy-efficient packet scheduling in sensor networks , 2005, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[59]  Ian Oppermann,et al.  UWB wireless sensor networks: UWEN - a practical example , 2004, IEEE Communications Magazine.

[60]  Charalampos Konstantopoulos,et al.  JAID: An algorithm for data fusion and jamming avoidance on distributed sensor networks , 2009, Pervasive Mob. Comput..

[61]  Moe Z. Win,et al.  Impulse radio multipath characteristics and diversity reception , 1998, ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220).

[62]  A. F. Mohammed Near-far problem in direct-sequence code-division multiple-access systems , 1993 .

[63]  F. Gross Smart Antennas for Wireless Communications: With MATLAB , 2005 .

[64]  Lisa Ann Osadciw,et al.  Jamming attack detection and countermeasures in wireless sensor network using ant system , 2006, SPIE Defense + Commercial Sensing.

[65]  Srdjan Capkun,et al.  Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .

[66]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .

[67]  Marimuthu Palaniswami,et al.  Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2009, SASN '05.

[68]  Srdjan Capkun,et al.  Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.

[69]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .