Jammed Node Detection and Routing in a Multihop Wireless Sensor Network Using Hybrid Techniques
- 24 Downloads
Wireless sensor networks are susceptible to various Denial-of-Service attacks due to their open deployment. Jamming attack at the physical layer is a type of Denial-of-Service attack in which an adversary node prevents channel access or disrupts the communication between the nodes by emitting noise signals. Due to this, the compromised nodes are interrupted either from sending out packets or receiving packets. As these nodes are unaware of the intrusion, they continuously attempt to access the jammed channel and retransmit lost packets resulting in energy drainage. This energy depletion though primarily leads to node failure, it ultimately reduces network lifetime enforcing intrusion detection. With this intention, a hybrid algorithm based on Fuzzy logic and Ant Colony Optimization for detection of jamming attack is proposed. Detection of jammed node is through fuzzy logic and thereon for successful data routing, Ant Colony Optimization is used. The proposal is simulated in MATLAB and the results are compared with the Ant Colony Optimization technique proposed earlier. The results confirm the supremacy of the proposed hybrid optimization technique over the Ant Colony Optimization.
KeywordsWireless sensor network Security Jamming attack Fuzzy inference system Ant colony optimization
- 4.Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing, MobiHoc (pp 46–57). https://doi.org/10.1145/1062689.1062697.
- 5.Poisel, R. A. (2004). Modern communications jamming principles and techniques. Norwood: Artech House.Google Scholar
- 6.Poisel, R. A. (2008). Foundations of communications electronic warfare. Norwood: Artech House.Google Scholar
- 8.Xu, W., et al. (2004).Channel surfing and spatial retreats: Defenses against wireless denial of service. In Proceedings of ACM workshop (pp. 80–89). https://doi.org/10.1145/1023646.1023661.
- 10.Wood, D., Stankovic, J. A., & Son, S. H. (2003). JAM: A jammed-area mapping service for sensor networks. In Proceedings of 24th IEEE international real-time system symposium (pp. 286–297). https://doi.org/10.1109/real.2003.1253275.
- 13.Hemavathi, N., & Sudha, S. (2014). A fuzzy based predictive cluster head selection scheme for wireless sensor networks. In the proceedings of 8th international conference on sensing technologgy and International Journal on Smart Sensing and Intelligent Systems, 560–567.Google Scholar
- 14.Nagpal, S. K., & Sudha, S. (2015). Two-level fuzzy based fire prediction scheme using wireless sensor network. In Proceedings of IEEE international conference on advances in computing and communication. https://doi.org/10.1109/icacce.2015.105.
- 15.Misra, S., Singh, R., & Mohan, S. V. (2010) Information warfare-worthy jamming attack detection mechanism for wireless sensor networks using a fuzzy interference system. http://cache.jourlib.org/cache?m=8F63B2294C981FDBD15CD6A8F2F768F1.pdfSensors. https://doi.org/10.3390/s100403444.
- 17.Dorigo, M., & di Caro, G. (1999). Ant colony optimization: A new meta-heuristic. In Proceedings of congress on evolutionary computation (pp. 1470–1477). https://doi.org/10.1109/cec.1999.782657.
- 19.Umamaheswari, D., Meenalochani, M., & Sudha, S (2016). Influence of the cluster head position on the lifetime of wireless sensor network—A case study. In 2nd IEEE international conference on next generation computing technologies (NGCT). https://doi.org/10.1109/ngct.2016.7877445.
- 21.Meenalochani M, Sudha S (2014) Fuzzy based estimation of received signal strength in a wireless sensor network. In Proceedings of the 3rd ACM international symposium on women in computing and informatics (pp. 624–628). https://doi.org/10.1145/2791405.2791543.