Efficient Channel Access Model for Detecting Reactive Jamming for Underwater Wireless Sensor Network

Underwater sensor networks (UWSNs) are exposed to various kind of wireless jamming attacks such as reactive, optimal, proactive, and hybrid jammer. Among jamming attack, reactive jammer has been a biggest security concern for UWSN. This is due to its significant impact to authenticated sensor device communication. Along with, it is difficult to be disclosed and defended. A reactive jammer preserve high vulnerability with low detection likelihood by regulating jamming duration (i.e., jamming probability) of jamming signal. The state-of-work presented so far for detecting reactive jammer are designed considering terrestrial wireless sensor networks (TWSNs). Further, a very limited work is carried out using cooperative jamming detection in UWSN. For overcoming research challenges, this work present Efficient Channel Access (ECA) model using cross layer design for mitigating reactive jammer. The ECA jointly optimizes the cooperative hopping probabilities and channel accessibility probabilities of authenticated sensor device. Experiment outcome shows the proposed ECA model attain superior performance than state-of-art model in terms of packet transmission.

[1]  Sudip Misra,et al.  Optimal decision rule-based ex-ante frequency hopping for jamming avoidance in wireless sensor networks , 2017, Comput. Networks.

[2]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[3]  Sabu M. Thampi,et al.  Simulation Tools for Underwater Sensor Networks: A Survey , 2016, Netw. Protoc. Algorithms.

[4]  Athanasios V. Vasilakos,et al.  Jamming in underwater sensor networks: detection and mitigation , 2012, IET Commun..

[5]  Waqas Aman,et al.  Impersonation Detection in AWGN-limited Underwater Acoustic Sensor Networks , 2018, ArXiv.

[6]  Gang Zhou,et al.  DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[7]  Paolo Casari,et al.  Cooperative Authentication in Underwater Acoustic Sensor Networks , 2018, IEEE Transactions on Wireless Communications.

[8]  Srdjan Capkun,et al.  Detection of reactive jamming in sensor networks , 2010, TOSN.

[9]  Jens B. Schmitt,et al.  Detection of reactive jamming in DSSS-based wireless networks , 2013, WiSec '13.

[10]  Gerhard P. Hancke,et al.  Denial of Service Defence for Resource Availability in Wireless Sensor Networks , 2018, IEEE Access.

[11]  Mauro Conti,et al.  Toward the Development of Secure Underwater Acoustic Networks , 2017, IEEE Journal of Oceanic Engineering.

[12]  Nam P. Nguyen,et al.  A Trigger Identification Service for Defending Reactive Jammers in WSN , 2012, IEEE Transactions on Mobile Computing.

[13]  Ivan Martinovic,et al.  Short paper: reactive jamming in wireless networks: how realistic is the threat? , 2011, WiSec '11.

[14]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[15]  Radha Poovendran,et al.  Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection , 2011, IEEE/ACM Transactions on Networking.

[16]  Dario Pompili,et al.  Underwater acoustic sensor networks: research challenges , 2005, Ad Hoc Networks.

[17]  Monther Aldwairi,et al.  A survey on network simulators in three-dimensional wireless ad hoc and sensor networks , 2016, Int. J. Distributed Sens. Networks.

[18]  Mahmoud Ahmadian-Attari,et al.  Worst-Case Jamming Attack and Optimum Defense Strategy in Cooperative Relay Networks , 2019, IEEE Control Systems Letters.

[19]  Michele Zorzi,et al.  Topology-Efficient Discovery: A Topology Discovery Algorithm for Underwater Acoustic Networks , 2018, IEEE Journal of Oceanic Engineering.

[20]  Sudip Misra,et al.  Exploiting Partial-Packet Information for Reactive Jamming Detection: Studies in UWSN Environment , 2013, ICDCN.