Skip to main content

On Trigger Detection against Reactive Jamming Attacks: A Localized Solution

  • Conference paper
Information Security Applications (WISA 2012)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7690))

Included in the following conference series:

  • 1011 Accesses

Abstract

Reactive jamming attacks have been considered as the most critical and fatally adversarial threats to subvert or disrupt the networks since they attack the broadcast nature of transmission mediums by injecting interfering signals. Existing countermeasures against reactive jamming attacks, i.e. frequency hopping or channel surfing, requires excessive computational capabilities, which are infeasible for low cost resource constraint Wireless Sensor Networks (WSNs). To overcome the problems for normal lower power sensors, we propose an efficient localized jamming-resistant approach against reactive jamming attacks by identifying trigger nodes whose transmissions invoke the jammer. By constraining the trigger nodes to be receivers only, we can avoid invoking the jammers and completely nullify the reactive jamming attack. The triggers identification approach utilizes a hexagon tiling coloring and sequential Group Testing (GT), which does not demand any sophisticated hardware. Theoretical analyses and simulation results endorse the suitability of our localized algorithm in terms of time and message complexity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bellardo, J., Savage, S.: 802.11 Denail-of-Service Sttacks: Real Vulnerabilities and Practical Solutions. In: Proceedings of the 12th Conference on USENIX Security Symposium (2003)

    Google Scholar 

  2. Sidek, O., Yahya, A.: Reed Solomon Coding for Frequency Hopping Spread Spectrum in Jamming Environment. American Journal of Applied Sciences (2008)

    Google Scholar 

  3. Chiang, T., Hu, Y.: Dynamic Jamming Mitigation for Wireless Broadcast Networks. In: INFOCOM (2008)

    Google Scholar 

  4. Desmedt, Y., Safavi-Naini, R., Wang, H., Charnes, C., Pieprzyk, J.: Broadcast Anti-Jamming Systems. Computer Networks, 349–355 (1999)

    Google Scholar 

  5. Ling, Q., Ren, J., Li, T.: Message-Driven Frequency Hopping — Design and Analysis. In: Li, Y., Huynh, D.T., Das, S.K., Du, D.-Z. (eds.) WASA 2008. LNCS, vol. 5258, pp. 373–384. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  6. Wood, A., Stankovic, J., Son, S.: A Jammed-Area Mapping Service for Sensor Networks. In: Proceedings of the 24th IEEE International Real-Time System Symposium, vol. 78, pp. 286–297 (2003)

    Google Scholar 

  7. Strasser, M., Popper, C., Capkun, S., Cagalj, M.: Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy, pp. 80–89 (2008)

    Google Scholar 

  8. Xu, W., Wood, T., Trappe, W., Zhang, Y.: Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service. In: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 80–89 (2004)

    Google Scholar 

  9. Xu, W., Trappe, W., Zhang, Y.: Channel Surfing: Defending Wireless Sensor Networks from Interference. In: Proceedings of the 6th International Conference on Information Processing in Sensor Networks, pp. 499–508 (2007)

    Google Scholar 

  10. Shin, I., Shen, Y., Xuan, Y., Thai, M., Znati, T.: Reactive Jamming Attacks in Multi-Radio Wireless Sensor Networks: an Efficient Mitigating Measure by Identifying Trigger Nodes. In: Proceedings of the 2nd ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing, FOWANC 2009, pp. 87–96 (2009)

    Google Scholar 

  11. Xuan, Y., Shin, I., Thai, M.: On Trigger Detection against Reactive Jamming Attacks: A Clique-Independent Set Based Approach. In: Performance Computing and Communications Conference (IPCCC), pp. 223–230 (2009)

    Google Scholar 

  12. Xu, W., Trappe, W., Zhang, Y., Wood, T.: The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In: Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 46–57 (2005)

    Google Scholar 

  13. Sen, A., Roxborough, T., Sinha, B.: On an Optimal Algorithm for Channel Assignment in Cellular Networks. In: IEEE International Conference on Communications (1999)

    Google Scholar 

  14. Niculescu, D., Nath, B.: Ad Hoc Positioning System (APS) using AOA. In: Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2003 (2003)

    Google Scholar 

  15. Niculescu, D., Nath, B.: Ad Hoc Positioning System (APS) using AOA. In: GLOBECOM 2001 (2001)

    Google Scholar 

  16. Thai, M., Tiwari, R., Du, D.: On Construction of Virtual Backbone in Wireless Ad Hoc Networks with Unidirectional Links. IEEE Transactions on Mobile Computing, TMC (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shin, I., Kim, S., Seo, J. (2012). On Trigger Detection against Reactive Jamming Attacks: A Localized Solution. In: Lee, D.H., Yung, M. (eds) Information Security Applications. WISA 2012. Lecture Notes in Computer Science, vol 7690. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35416-8_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35416-8_22

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35415-1

  • Online ISBN: 978-3-642-35416-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics