An Inducing Localization Scheme for Reactive Jammer in ZigBee Networks

Reactive Jamming attack could severely disrupt the communications in ZigBee networks, which will have an evident jamming effect on the transmissions in a hard-to-detect manner. Therefore, after analyzing the general process of reactive jamming, we develop a lightweight reactive jammer localization scheme, called IndLoc, which is applicable to ZigBee networks. In this scheme, we first design the time-varying mask code (TVMC) to protect the transmission of the packets to ensure that the jammer cannot monitor the channel effectively. Then, the strength of jamming signal (JSS) could be collected by sending inducing messages into the channel. And the location of the jammer can be estimated through the locations of JSS peak nodes, which are selected according to the gradient ascent algorithm. Experiments are performed based on an open-source stack, msstatePAN. And the results reveal that IndLoc could effectively protect the transmissions of the packets and achieve relatively higher localization accuracy under different network scenarios with fewer calculation and storage overheads.

[1]  Srdjan Capkun,et al.  Detection of reactive jamming in sensor networks , 2010, TOSN.

[2]  Wenyuan Xu,et al.  Localizing Multiple Jamming Attackers in Wireless Networks , 2011, 2011 31st International Conference on Distributed Computing Systems.

[3]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[4]  Wenyuan Xu,et al.  Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges , 2010, DCOSS.

[5]  Nam P. Nguyen,et al.  A Trigger Identification Service for Defending Reactive Jammers in WSN , 2012, IEEE Transactions on Mobile Computing.

[6]  Ivan Martinovic,et al.  Short paper: reactive jamming in wireless networks: how realistic is the threat? , 2011, WiSec '11.

[7]  Xin Wang,et al.  Joint reactive jammer detection and localization in an enterprise WiFi network , 2013, Comput. Networks.

[8]  Srikanth V. Krishnamurthy,et al.  Lightweight Jammer Localization in Wireless Networks: System Design and Implementation , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[9]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[10]  Fernando J. Velez,et al.  Survey on the Characterization and Classification of Wireless Sensor Network Applications , 2014, IEEE Communications Surveys & Tutorials.

[11]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[12]  Wenyuan Xu,et al.  Localizing jammers in wireless networks , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[13]  Yang-Han Lee,et al.  ZigBee(2.4G) wireless sensor network application on indoor intrusion detection , 2015, 2015 IEEE International Conference on Consumer Electronics - Taiwan.

[14]  Peng Ning,et al.  BitTrickle: Defending against broadband and high-power reactive jamming attacks , 2012, 2012 Proceedings IEEE INFOCOM.

[15]  Radha Poovendran,et al.  Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[16]  Xianglin Wei,et al.  GSA-Based Jammer Localization in Multi-Hop Wireless Network , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[17]  Sencun Zhu,et al.  An Algorithm for Jammer Localization in Wireless Sensor Networks , 2012, 2012 IEEE 26th International Conference on Advanced Information Networking and Applications.