CURD: Controllable reactive jamming detection in underwater sensor networks

Underwater sensor networks (UWSNs) are vulnerable to jamming attacks. Controllable reactive jamming is a kind of realistic and very harmful jamming attack. A reactive jammer controls the probability of jamming and the duration of the jam signal, in order to maintain high vulnerability with low detection probability. The existing works on reactive jamming detection are focused on terrestrial wireless sensor networks (TWSNs), and are limited in their ability to (a) detect jamming correctly, (b) distinguish between the corrupted and uncorrupted parts of a packet, and (c) be adaptive with the dynamic environment. In this paper, we develop a non-parametric cumulative sum (CUSUM)-test and weak estimation learning automata (WELA)-based scheme, named CURD, for controllable reactive jamming detection. In the proposed scheme, the CUSUM-test allows to quickly find the abrupt changes in bits without any a priori knowledge about the adversary, and the learning scheme helps in ''absorbing'' the impact of the dynamism in the environment. Unlike the existing works on this issue, we introduce the concept of partial-packet (PP) for analyzing a packet in different fragments (i.e., PPs) to identify packet corruption in few bits. We develop a Markov chain-based analytical model for theoretical analysis of the proposed scheme, CURD, under the consideration of a single controllable reactive jammer. We evaluate the performance of CURD through simulation studies in a UWSN environment. Results show that the proposed scheme is capable of accurately detecting reactive jamming in UWSNs, and outperforms the benchmark scheme considered in the study.

[1]  Yih-Chun Hu,et al.  Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks , 2007, IEEE/ACM Transactions on Networking.

[2]  A. Girotra,et al.  Performance Analysis of the IEEE 802 . 11 Distributed Coordination Function , 2005 .

[3]  Jiejun Kong,et al.  The challenges of building mobile underwater wireless networks for aquatic applications , 2006, IEEE Network.

[4]  Huifang Chen,et al.  A hybrid reservation-based MAC protocol for underwater acoustic sensor networks , 2013, Ad Hoc Networks.

[5]  Hari Balakrishnan,et al.  PPR: partial packet recovery for wireless networks , 2007, SIGCOMM '07.

[6]  Srdjan Capkun,et al.  Wormhole-Based Anti-Jamming Techniques in Sensor Networks , 2007 .

[7]  Jerry den Hartog,et al.  Link-layer jamming attacks on S-MAC , 2004, Proceeedings of the Second European Workshop on Wireless Sensor Networks, 2005..

[8]  Sudip Misra,et al.  Exploiting Partial-Packet Information for Reactive Jamming Detection: Studies in UWSN Environment , 2013, ICDCN.

[9]  Srdjan Capkun,et al.  Detection of Reactive Jamming in Sensor Networks , 2009 .

[10]  Srdjan Capkun,et al.  Wormhole-Based Antijamming Techniques in Sensor Networks , 2007, IEEE Transactions on Mobile Computing.

[11]  Charalampos Konstantopoulos,et al.  JAID: An algorithm for data fusion and jamming avoidance on distributed sensor networks , 2009, Pervasive Mob. Comput..

[12]  Jun-Hong Cui,et al.  R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks , 2007, International Conference on Wireless Algorithms, Systems and Applications (WASA 2007).

[13]  Sang Hyuk Son,et al.  JAM: a jammed-area mapping service for sensor networks , 2003, RTSS 2003. 24th IEEE Real-Time Systems Symposium, 2003.

[14]  Milica Stojanovic,et al.  Underwater acoustic communication channels: Propagation models and statistical characterization , 2009, IEEE Communications Magazine.

[15]  Winston K. G. Seah,et al.  A Survey of Techniques and Challenges in Underwater Localization , 2011 .

[16]  Haiyun Luo,et al.  Datalink streaming in wireless sensor networks , 2006, SenSys '06.

[17]  M. Stojanovic,et al.  Statistical Characterization and Computationally Efficient Modeling of a Class of Underwater Acoustic Communication Channels , 2013, IEEE Journal of Oceanic Engineering.

[18]  Donggang Liu,et al.  Fast jamming detection in sensor networks , 2012, 2012 IEEE International Conference on Communications (ICC).

[19]  Nam P. Nguyen,et al.  A Trigger Identification Service for Defending Reactive Jammers in WSN , 2012, IEEE Transactions on Mobile Computing.

[20]  Weihua Zhuang,et al.  An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.

[21]  Ivan Martinovic,et al.  Short paper: reactive jamming in wireless networks: how realistic is the threat? , 2011, WiSec '11.

[22]  Shengli Zhou,et al.  Aqua-Sim: An NS-2 based simulator for underwater sensor networks , 2009, OCEANS 2009.

[23]  Radha Poovendran,et al.  Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks , 2010, IEEE Transactions on Mobile Computing.

[24]  Srikanth V. Krishnamurthy,et al.  Denial of Service Attacks in Wireless Networks: The Case of Jammers , 2011, IEEE Communications Surveys & Tutorials.

[25]  D. Vere-Jones Markov Chains , 1972, Nature.

[26]  H. T. Mouftah,et al.  A Survey of Architectures and Localization Techniques for Underwater Acoustic Sensor Networks , 2011, IEEE Communications Surveys & Tutorials.

[27]  Wen-Hwa Liao,et al.  SF-MAC: A Spatially Fair MAC Protocol for Underwater Acoustic Sensor Networks , 2012, IEEE Sensors Journal.

[28]  Ranjit Singh,et al.  Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System , 2010, Sensors.

[29]  Mari Carmen Domingo,et al.  Securing underwater wireless communication networks , 2011, IEEE Wireless Communications.

[30]  M. Stojanovic,et al.  Slotted FAMA: a MAC protocol for underwater acoustic networks , 2006, OCEANS 2006 - Asia Pacific.

[31]  John S. Heidemann,et al.  T-Lohi: A New Class of MAC Protocols for Underwater Acoustic Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[32]  Jens B. Schmitt,et al.  Detection of reactive jamming in DSSS-based wireless networks , 2013, WiSec '13.

[33]  B. John Oommen,et al.  Stochastic learning-based weak estimation of multinomial random variables and its applications to pattern recognition in non-stationary environments , 2006, Pattern Recognit..

[35]  Athanasios V. Vasilakos,et al.  Jamming in underwater sensor networks: detection and mitigation , 2012, IET Commun..

[36]  H. Vincent Poor,et al.  Quickest Detection: Probabilistic framework , 2008 .

[37]  Wenyuan Xu,et al.  The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.

[38]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[39]  Charalampos Konstantopoulos,et al.  A survey on jamming attacks and countermeasures in WSNs , 2009, IEEE Communications Surveys & Tutorials.

[40]  Dario Pompili,et al.  Underwater acoustic sensor networks: research challenges , 2005, Ad Hoc Networks.

[41]  Peng Xie,et al.  VBF: Vector-Based Forwarding Protocol for Underwater Sensor Networks , 2006, Networking.