Tackling Jamming Attacks in IoT

  • N. Ambika


Internet-of-things has brought in solutions for many problems. These devices work on sensor technology. They aim in sensing and making suitable adjustments in environment to improve the environment. These unsupervised devices are liable to different kinds of attacks. The proposed paper provides solution for reactive jamming attack. The previous contribution aims at using artificial noise to distract the adversary and accomplishes the transmission task. The proposed work tries to bring in the jammer in confidence by using the cooperation of all the devices in the network. Comparing with the previous work the proposed work conserves 7.89% of energy, increases the confidence of jammer by5.66% and increases communication overhead by 7.46%.


Jamming attack Internet of things Cooperative strategy Security 


  1. Ahmad, M. (2014). Reliability models for the Internet of Things: A paradigm shift. In IEEE international symposium on software reliability engineering workshops, Naples, Italy.Google Scholar
  2. Alaba, F. A., Othman, M., Hashem, I. A. T., & Alotaibi, F. (2017). Internet of Things security: A survey. Journal of Network and Computer Applications, 10–28.Google Scholar
  3. Al-Ali, et al. (2017). A smart home energy management system using IoT and big data analytics approach. IEEE Transactions on Consumer Electronics, 63(4), 426–434.CrossRefGoogle Scholar
  4. Alam, M. R., Reaz, M. B. I., & Ali, M. M. (2012). SPEED: An inhabitant activity prediction algorithm for smart homes. IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and Humans, 42, 985–990.CrossRefGoogle Scholar
  5. Alam, M., Shakil, K. A., Javed, M. S., Ansari, M., & Ambreen. (2014). Detect and filter traffic attack through cloud trace back and neural network. In International Conference of Data Mining and Knowledge Engineering ( ICDMKE). London, UK: Imperial College.Google Scholar
  6. Andrea, I., Chrysostomou, C., & Hadjichristofi, G. (2015). Internet of Things: Security vulnerabilities and challenges. In IEEE Symposium on Computers and Communication (ISCC), IEEE (pp. 180–187).Google Scholar
  7. Arcelus, A., Jones, M. H., Goubran, R., & Knoefel, F. (2007). Integration of smart home technologies in a health monitoring system for the elderly. In 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07), Niagara Falls, ON, Canada (Vol. 2, pp. 820–825).Google Scholar
  8. Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54, 2787–2805.zbMATHCrossRefGoogle Scholar
  9. Babar, S. D., Prasad, N. R., & Prasad, R. (2013). Jamming attack: Behavioral modelling and analysis. In International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE) (pp. 1–5).Google Scholar
  10. Bhattacharya, S., & Başar, T. (2010). Game-theoretic analysis of an aerial jamming attack on a UAV communication network. In American control conference, Baltimore, MD, USA (pp. 818–823).Google Scholar
  11. Brown, T. X., James, J. E., & Sethi, A. (2006). Jamming and sensing of encrypted wireless ad hoc networks. In 7th ACM international symposium on Mobile ad hoc networking and computing, Florence, Italy (pp. 120–130).Google Scholar
  12. Chiu, W.-Y., Sun, H., Thompson, J., Nakayama, K., & Zhang, S. (2017). IoT and information processing in smart energy applications. IEEE Communications Magazine, 55, 44.CrossRefGoogle Scholar
  13. Deng, J., Han, R., & Mishra, S. (2005). Defending against path-based DoS attacks in wireless sensor networks. In 3rd ACM workshop on Security of ad hoc and sensor networks , Alexandria, VA, USA (pp. 89–96).Google Scholar
  14. Fadele, A. A., Othman, M., Hashem, I. A. T., Yaqoob, I., Imran, M., & Shoaib, M. (2018). A novel countermeasure technique for reactive jamming attack in internet of things. Multimedia Tools and Applications, 1–22.Google Scholar
  15. Farash, M. S., Kumari, S., & Bakhtiari, M. (2016). Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography. Multimedia Tools and Applications, 75(8), 4485–4504.Google Scholar
  16. Gai, K., Qiu, M., Ming, Z., Zhao, H., & Qiu, L. (2017). Spoofing-jamming attack strategy using optimal power distributions in wireless smart grid networks. IEEE Transactions on Smart Grid, 2431–2439.Google Scholar
  17. Grover, K., Lim, A., & Yang, Q. (2014). Jamming and anti-jamming techniques in wireless networks: A survey. International Journal of Ad Hoc and Ubiquitous Computing, 197–215.Google Scholar
  18. Hamieh, A., & Ben-Othman, J. (2009). Detection of jamming attacks in wireless ad hoc networks using error distribution. In IEEE international conference on communications, Dresden, Germany (pp. 1–6).Google Scholar
  19. Hamza, T., Kaddoum, G., Meddeb, A., & Matar, G. (2016). A survey on intelligent MAC layer jamming attacks and countermeasures in WSNs. In 84th vehicular technology conference (pp. 1–5).Google Scholar
  20. Han, G., Liu, L., Zhang, W., & Chan, S. (2018). A hierarchical jammed-area mapping service for ubiquitous communication in smart communities. IEEE Communications Magazine, 92–98.Google Scholar
  21. Hegde, S., & Kumar, S. G. (2017). IoT approach to save life using GPS for the traveller during accident. In IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), Chennai, India (pp. 2424–2428).Google Scholar
  22. Jabarullah, B. M., Saxena, S., Kennedy Babu, C. N., & Alam, M. (2012). Hybrid approach of face recognition. Cyber Times International Journal of Technology & Management, 6(1), 6–12.Google Scholar
  23. Jisha, R. C., Jyothindranath, A., & Kumary, L. S. (2017). Iot based school bus tracking and arrival time prediction. In International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India.Google Scholar
  24. Khanna, A., & Anand, R. (2016). IoT based smart parking system. In International Conference on Internet of Things and Applications (IOTA), Pune, India (pp. 266–270).Google Scholar
  25. Kodali, R. K., Jain, V., Bose, S., & Boppana, L. (2016). IoT based smart security and home automation system. In International conference on computing, communication and automation (ICCCA), Noida, India (pp. 1286–1289).Google Scholar
  26. Lee, T. H., Wen, C. H., Chang, L. H., Chiang, H. S., & Hsieh, M. C. (2014). A lightweight intrusion detection scheme based on energy consumption analysis in 6LowPAN. Advanced Technologies, Embedded and Multimedia for Human-Centric Computing, 1205–1213.Google Scholar
  27. Li, M., Koutsopoulos, I., & Poovendran, R. (2007). Optimal jamming attacks and network defense policies in wireless sensor networks. In 26th IEEE international conference on computer communications, Barcelona, Spain (pp. 1307–1315).Google Scholar
  28. Li, L., Jin, Z., Li, G., Zheng, L., & Wei, Q. (2012a). Modeling and analyzing the reliability and cost of service composition in the IoT: A probabilistic approach. In IEEE 19th International Conference on In Web Services (pp. 584–591).Google Scholar
  29. Li, W., Miao, Y., Tang, Y. W., Liu, D., & Hu, B. (2012b). IOT system reliability testing and evaluate technology. Software, 1.Google Scholar
  30. Liu, S. J., & Zhu, G. Q. (2014). The application of GIS and IOT technology on building fire evacuation. Procedia Engineering, 71, 577–582.CrossRefGoogle Scholar
  31. Lopez, D. A. R., Lopez, J. R. R., Prieto, M. A. Z., & Quinde, L. D. S. (2017). Towards a method for the integration of IoT and GIS applications deployed on cloud platforms. In International Conference on Information Systems and Computer Science (INCISCOS), Quito, Ecuador.Google Scholar
  32. Mala, N. S., Thushara, S. S., & Subbiah, S. (2017). Navigation gadget for visually impaired based on IoT. In 2nd International Conference on Computing and Communications Technologies (ICCCT), Chennai, India.Google Scholar
  33. Mano, L. Y., Faiçal, B. S., Nakamura, L. H., Gomes, P. H., Libralon, G. L., Meneguete, R. I., & Ueyama, J. (2016). Exploiting IoT technologies for enhancing Health Smart Homes through patient identification and emotion recognition. Computer Communications, 89, 178–190.CrossRefGoogle Scholar
  34. Masek, P., et al. (2016). A harmonized perspective on transportation management in Smart Cities: The novel IoT-driven environment for road traffic modeling. Sensors, 16(11), 1872.CrossRefGoogle Scholar
  35. Mat, I., Kassim, M. R. M., Harun, A. N., & Yusoff, I. M. (2016). IoT in precision agriculture applications using wireless moisture sensor network. In IEEE Conference on Open Systems (ICOS), Langkawi, Malaysia (pp. 24–29).Google Scholar
  36. Melis, A., Prandini, M., Sartori, L., & Callegati, F. (2016). Public transportation, IoT, trust and urban habits. In International conference on internet science (pp. 318–325).CrossRefGoogle Scholar
  37. Mitton, N., Papavassiliou, S., Puliafito, A., & Trivedi, K. S. (2012). Combining cloud and sensors in a smart city environment. EURASIP Journal on Wireless Communications and Networking, 1–10.Google Scholar
  38. Muhammad, G., Rahman, S. M. M., Alelaiwi, A., & Alamri, A. (2017). Smart health solution integrating IoT and cloud: A case study of voice pathology monitoring. IEEE Communications Magazine, 55(1), 69–73.CrossRefGoogle Scholar
  39. Narayanan, R. P., Sarath, T. V., & Vineeth, V. V. (2016). Survey on motes used in wireless sensor networks: Performance & Parametric Analysis. Wireless Sensor Network, 08, 51–60.CrossRefGoogle Scholar
  40. Noubir, G., Rajaraman, R., Sheng, B., & Thapa, B. (2011). On the robustness of IEEE 802.11 rate adaptation algorithms against smart jamming. In Fourth ACM conference on Wireless network security (pp. 97–108).CrossRefGoogle Scholar
  41. Pang, L., & Xue, Z. (2017). A novel anti-jamming method in wireless sensor networks: Using artificial noise to actively interfere the intelligent jammer. In 4th international conference on systems and informatics (pp. 954–959).Google Scholar
  42. Popović, T., Latinović, N., Pešić, A., Zečević, Ž., Krstajić, B., & Djukanović, S. (2017). Architecting an IoT-enabled platform for precision agriculture and ecological monitoring: A case study. Computers and Electronics in Agriculture, 140, 255–265.CrossRefGoogle Scholar
  43. Rathore, M. M., Ahmad, A., Paul, A., Wan, J., & Zhang, D. (2016). Real-time medical emergency response system: Exploiting IoT and big data for public health. Journal of Medical Systems, 40(12), 283.CrossRefGoogle Scholar
  44. Raya, M., & Hubaux, J. P. (2007). Securing vehicular ad hoc networks. Journal of Computer Security, 15, 39–68.CrossRefGoogle Scholar
  45. Ren, K., & Wang, Q. (2013). Opportunistic spectrum access: From stochastic channels to non-stochastic channels. IEEE Wireless Communications, 128–135.Google Scholar
  46. Riedel, T., Fantana, N., Genaid, A., Yordanov, D., Schmidtke, H. R., & Beigl, M. (2010). Using web service gateways and code generation for sustainable IoT system development. Internet of Things, 1–8.Google Scholar
  47. Sampath, A., Dai, H., Zheng, H., & Zhao, B. Y. (2007). Multi-channel jamming attacks using cognitive radios. In 16th international conference on computer communications and networks, Honolulu, HI, USA (pp. 352–357).Google Scholar
  48. Sanguanpong, S. (2018). Secrecy outage performance analysis for energy harvesting sensor networks with a jammer using relay selection strategy. In Special section on security and trusted computing for industrial Internet of Things (pp. 23406–23419).Google Scholar
  49. Sciancalepore, S., Oligeri, G., & Di Pietro, R. (2018). Strength of Crowd (SOC)—Defeating a reactive jammer in IoT with decoy messages. Sensors, 18, 3492.CrossRefGoogle Scholar
  50. Shakil, K. A., Zareen, F. J., Alam, M., & Jabin, S. (2017). BAMHealthCloud: A biometric authentication and data management system for healthcare data in cloud. Journal of King Saud University – Computer and Information Sciences.Google Scholar
  51. Shrouf, F., Ordieres, J., & Miragliotta, G. (2014). Smart factories in industry 4.0: A review of the concept and of energy management approached in production based on the Internet of Things paradigm. In IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), Bandar Sunway, Malaysia (pp. 697–701).Google Scholar
  52. Sivaraman, V., Gharakheili, H. H., Vishwanath, A., Boreli, R., & Mehani, O. (2015). Network-level security and privacy control for smart-home IoT devices. In IEEE 11th International conference on wireless and mobile computing, networking and communications (WiMob), Abu Dhabi, United Arab Emirates (pp. 163–167).Google Scholar
  53. Stankovic, J. A. (2014). Research directions for the Internet of Things. IEEE Internet of Things Journal, 1(1), 3–9.MathSciNetCrossRefGoogle Scholar
  54. Sufyan, N., Saqib, N. A., & Zia, M. (2013). Detection of jamming attacks in 802.11 b wireless networks. EURASIP Journal on Wireless Communications and Networking, 208.Google Scholar
  55. Sutar, S. H., Koul, R., & Suryavanshi, R. (2016). Integration of Smart Phone and IOT for development of smart public transportation system. In International Conference on Internet of Things and Applications (IOTA), Pune, India (pp. 73–78).Google Scholar
  56. Toledo, A. L., & Wang, X. (2008). Robust detection of MAC layer denial-of-service attacks in CSMA/CA wireless networks. IEEE Transactions on Information Forensics and Security, 347–358.Google Scholar
  57. Wei, X., Hu, Y., Fan, J., & Kan, B. (2014). A jammer deployment method for multi-hop wireless network based on degree distribution. In Ninth International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA) (pp. 261–266).Google Scholar
  58. Wilhelm, M., Martinovic, I., Schmitt, J. B., & Lenders, V. (2011). Short paper: Reactive jamming in wireless networks: How realistic is the threat? In Fourth ACM conference on Wireless network security, Hamburg, Germany (pp. 47–52).CrossRefGoogle Scholar
  59. Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing (pp. 46–57). ACM.Google Scholar
  60. Yang, L., Yang, S. H., & Plotnick, L. (2013). How the Internet of Things technology enhances emergency response operations. Technological Forecasting and Social Change, 80(9), 1854–1867.CrossRefGoogle Scholar
  61. Yu, L., Lu, Y., & Zhu, X. (2012). Smart hospital based on Internet of Things. Journal of Networks, 7(10), 1654.CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • N. Ambika
    • 1
  1. 1.Department of Computer ApplicationsSSMRV CollegeBangaloreIndia

Personalised recommendations