G0261041046

Page 1

International Journal of Engineering Science Invention ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726 www.ijesi.org Volume 2 Issue 6ǁ June. 2013 ǁ PP.41-46

An Effective Defensive Node against Jamming Attacks in Sensor Networks P.Indumathi1, P.Manikandan2 and K.Yogitha3 [1][2]

PG Scholar, Network Engineering and [3] Assistant Professor, ECE Department Arunai Engineering College, Tiruvannamalai, India

ABSTRACT-Resilience to electromagnetic jamming and its avoidances are difficult problem in wireless sensor networks .Jamming is one such Denial Of Service (DOS) attack that has been addressed at the physical layer and Energy Efficient Link Layer jamming attacks have proven to be a real threat to network communication for prolonged time. The intent of this paper proposes some changes in physical layer as well as Data Link layer. In Physical layer, uncorrelated groups based DSSS technique, which is a slender modification of DSSS used in sensor network standard, in which all possible 15 chip PN sequences are used to form groups of 5 sequences each and each group assigned an index and randomly selected. In Data Link layer, SMAC (Sensor Medium Access Control) protocol contains two modifications. The first is Data Packet Separation Slot Size Randomization (DS-SSR); the second is Maximum Covers using Mixed Integer Programming (MC-MIP). DS-SSR is used to increase the WSN resistance against the Energy efficient denial of service link layer jamming attacks, MC-MIP is used to slightly eliminate the negative impact on the network throughput when using countermeasures against energy efficient jamming. Lifetime advantage and censorship rate are the two measures used to evaluate the resistance of the proposed protocol against the attack. When compared to other counter measure experimental results shows more than 8% reduction of the attacker lifetime advantage can be achieved with DS-SSR and SMAC.

KEYWORDS-DSSS; index; SMAC; jamming. I.

INTRODUCTION

Wireless sensor networking is an emerging technology that has a wide range of potential applications including environment monitoring, smart spaces, medical systems and robotic exploration. Such a network normally consists of a large number of distributed nodes that organize themselves into a multi-hop wireless network. Each node has one or more sensors, embedded processors and low-power radios, and is normally battery operated. Typically, these nodes coordinate to perform a common task. Jamming is one such denial of service attack which prevents the network from performing its basic functions. Jamming is defined as interfering with the legitimate frequency of sensor nodes. Hence anti jamming techniques are essential in order to ensure timely delivery of information and to increase the performance of the network. There are various types of jamming such as sweep jamming, spot jamming, barrage jamming, deceptive jamming etc., [1] and many countermeasures are also proposed against jamming. Generally the countermeasures are classified into proactive techniques that are used to prevent jamming and reactive techniques that are used to overcome jamming. Direct Sequence Spread Spectrum (DSSS), Frequency Hopping Spread Spectrum (FHSS) etc., [2] are few proactive techniques and wormhole based anti jamming technique, hybrid model of defense etc., are few reactive anti jamming techniques. Energy efficient attacks target the Medium Access Control (MAC) protocol of WSNs. These attacks perform statistical analysis to select the proper time to jam in and sleep otherwise. An energy efficient jammer will not waste energy while preventing network communication for a long time compared to other jammer styles. This paper is ordered as follows section II gives related works. Section III provides in detail about proposed modification to physical layer and SMAC protocol. Section IV provides the conclusion and suggestions for future work.

II. RELATED WORKS In cagalj M et al (2005)[3] used Wormhole threat as a solution to bring out the message out of jammed area. This is done using three techniques namely (i) Wired pair of sensors, (ii) frequency hopping and (iii) uncorrelated channel hopping. In the first technique pair of sensor nodes is connected using wires and are deployed. The drawback of the technique is that it is complex and costly. In the second technique frequency hopping (FH) enabled nodes are deployed and then it is paired. The drawback of this technique is that it requires www.ijesi.org

41 | Page


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
G0261041046 by Invention Journals - Issuu