A Trigger Identification Service for Defending Reactive Jammers in WSN

During the last decade, Reactive Jamming Attack has emerged as a great security threat to wireless sensor networks, due to its mass destruction to legitimate sensor communications and difficulty to be disclosed and defended. Considering the specific characteristics of reactive jammer nodes, a new scheme to deactivate them by efficiently identifying all trigger nodes, whose transmissions invoke the jammer nodes, has been proposed and developed. Such a trigger-identification procedure can work as an application-layer service and benefit many existing reactive-jamming defending schemes. In this paper, on the one hand, we leverage several optimization problems to provide a complete trigger-identification service framework for unreliable wireless sensor networks. On the other hand, we provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios. Theoretical analysis and simulation results are included to validate the performance of this framework.

[1]  Srdjan Capkun,et al.  Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .

[2]  David S. Johnson,et al.  The Rectilinear Steiner Tree Problem is NP Complete , 1977, SIAM Journal of Applied Mathematics.

[3]  Radha Poovendran,et al.  Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[4]  Othman Sidek,et al.  Reed Solomon Coding for Frequency Hopping Spread Spectrum in Jamming Environment , 2008 .

[5]  Srikanth V. Krishnamurthy,et al.  Lightweight Jammer Localization in Wireless Networks: System Design and Implementation , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.

[6]  Leslie G. Valiant,et al.  Universality considerations in VLSI circuits , 1981, IEEE Transactions on Computers.

[7]  Srdjan Capkun,et al.  Detection of reactive jamming in sensor networks , 2010, TOSN.

[8]  Srdjan Capkun,et al.  Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.

[9]  Wenyuan Xu,et al.  Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges , 2010, DCOSS.

[10]  Wang Zanji,et al.  Performance of DSSS against Repeater Jamming , 2006, 2006 13th IEEE International Conference on Electronics, Circuits and Systems.

[11]  Wenyuan Xu,et al.  Localizing jammers in wireless networks , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.

[12]  Jingbo Guo,et al.  Feasibility Assessment of Repeater Jamming Technique for DSSS , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[13]  Richard A. Poisel,et al.  Modern Communications Jamming Principles and Techniques , 2003 .

[14]  Taieb Znati,et al.  A Novel Approach Against Reactive Jamming Attacks , 2011, Ad Hoc Sens. Wirel. Networks.

[15]  Radha Poovendran,et al.  Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection , 2011, IEEE/ACM Transactions on Networking.

[16]  Murat Çakiroglu,et al.  Jamming detection mechanisms for wireless sensor networks , 2008, Infoscale.

[17]  Taieb Znati,et al.  Reactive jamming attacks in multi-radio wireless sensor networks: an efficient mitigating measure by identifying trigger nodes , 2009, FOWANC '09.

[18]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[19]  Wenyuan Xu,et al.  Channel surfing and spatial retreats: defenses against wireless denial of service , 2004, WiSe '04.

[20]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[21]  Jean Walrand,et al.  Maximal Cliques in Unit Disk Graphs: Polynomial Approximation , 2006 .

[22]  C. Pandu Rangan,et al.  Algorithmic aspects of clique-transversal and clique-independent sets , 2000, Discret. Appl. Math..

[23]  Haim Kaplan,et al.  Optimal Cover of Points by Disks in a Simple Polygon , 2010, SIAM J. Comput..

[24]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[25]  Ding-Zhu Du,et al.  New Constructions of One- and Two-Stage Pooling Designs , 2008, J. Comput. Biol..

[26]  Mikhail J. Atallah,et al.  Indexing Information for Data Forensics , 2005, ACNS.