Impact of Physical Layer Jamming on Wireless Sensor Networks with Shadowing and Multicasting

This paper analyzes the impact of a physical layer jamming on the performance of wireless sensor networks by performing exhaustive comparative simulations using multicasting and by employing varying intensity of shadowing (constant and log normal). Comprehensive result analysis reveals that jamming drastically degrades the legitimate traffic throughput in a network, and, the constant shadowing approach is a better fit for a static network, both, under static as well as mobile jammer environments, as compared to the log normal one. An improvement in sink-node packet delivery ratio by 15.02 % and 16.58 % was observed with static and mobile jammer environments respectively, under multicasting and constant shadowing mean of 8.0. Further, average sink-node packet delivery ratio with constant shadowing shows an improvement of 4.15% and 5.94%, using static and mobile jammer environment respectively, in comparison to the values obtained under log normal shadowing based network.

[1]  Wenyuan Xu,et al.  Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.

[2]  J. Walters,et al.  Chapter 17 Wireless Sensor Network Security : A Survey , 2006 .

[3]  Marvin K. Simon,et al.  Spread Spectrum Communications Handbook , 1994 .

[4]  Spyridon Vassilaras,et al.  Wireless Innovations as Enablers for Complex & Dynamic Artificial Systems , 2010, Wirel. Pers. Commun..

[5]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[6]  Marimuthu Palaniswami,et al.  Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols , 2009, SASN '05.

[7]  J. William Atwood,et al.  Rendezvous Point Relocation in Protocol Independent Multicast-Sparse Mode , 2003, Telecommun. Syst..

[8]  Eitan Altman,et al.  Jamming in wireless networks under uncertainty , 2009, WiOpt.

[9]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[10]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[11]  M. Salazar-Palma,et al.  A survey of various propagation models for mobile communication , 2003 .

[12]  John A. Stankovic,et al.  Security in wireless sensor networks , 2004, SASN '04.

[13]  Xin Liu,et al.  Broadcast Control Channel Jamming: Resilience and Identification of Traitors , 2007, 2007 IEEE International Symposium on Information Theory.

[14]  David J. Thuente,et al.  Intelligent jamming in wireless networks with applications to 802.11b and other networks , 2006 .

[15]  David E. Culler,et al.  Lessons from a Sensor Network Expedition , 2004, EWSN.

[16]  Srdjan Capkun,et al.  Jamming-resistant Broadcast Communication without Shared Keys , 2009, USENIX Security Symposium.

[17]  Kiyoshi Fukui,et al.  Development of Ubiquitous Sensor Network , 2004 .

[18]  Marvin K. Simon,et al.  Spread spectrum communications handbook (revised ed.) , 1994 .

[19]  Guevara Noubir,et al.  Low-power DoS attacks in data wireless LANs and countermeasures , 2003, MOCO.

[20]  Harsh K. Verma,et al.  On Denial of Service Attacks for Wireless Sensor Networks , 2012 .

[21]  Radha Poovendran,et al.  Probabilistic Mitigation of Control Channel Jamming via Random Key Distribution , 2007, 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications.

[22]  Hung-Min Sun,et al.  Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).