10-06-2013, 03:41 PM
A Defense Technique for Jamming Attacks in Wireless Sensor Networks
Based On SI
Defense Technique.pdf (Size: 408.53 KB / Downloads: 21)
Abstract
Jamming can interrupt wireless transmission and
occur by mistake in form of interference, noise or as collision at
the receiver or in the circumstance of an attack. In this paper,
we propose a swarm based defense technique for jamming
attacks in wireless sensor networks. Swarm intelligence
algorithm is proficient enough to adapt change in network
topology and traffic. The sender and receiver change channels
in order to stay away from the jammer, in channel hoping
technique. The jammers remain on a single channel, hoping to
disrupt any fragment that may be transmitted in the pulse
jamming technique. Using the swarm intelligence technique, the
forward ants either unicast or broadcast at each node
depending on the availability of the channel information for end
of the channel. If the channel information is available, the ants
randomly choose the next hop. As the backward ants reaches
the source, the data collected is verified which channel there is
prevalence of attacker long time, and those are omitted.
Simultaneously the forward ants are sent through other
channels which are not detected before for attacks. This scheme
helps limit the channel maintenance overhead. By simulation
results, it is clear that this swarm based defense technique for
jamming attack is most effective.
INTRODUCTION
A. Wireless Sensor Networks (WSN)
A wireless sensor network (WSN) constitutes a set of
light-weight devices called sensor nodes. It has least energy
resources for carrying out the process such as environment
sensing, information processing, and communication [1]. A
sensor network consists of wireless ad hoc network which
means that each sensor supports a multi-hop routing
algorithm (quite a few nodes forwards data packets to a base
station). Each node in the sensor network is equipped with a
radio transceiver or wireless communication device,
microcontroller and an energy source (battery) in addition to
one or more sensors [2].The wireless sensor network field
provides prosperous, multi-disciplinary area of research
where a various tools and concepts are engaged for
addressing diverse set of application. The moving intruders
in battle field are detected using wireless sensor networks.
However, now wireless sensor network is used in civilian
application field, which includes environment and habitat
monitoring, health care applications, home automation, and
traffic control [3].
RELATED WORK
A. Attack Detection Techniques in WSN
Waldir Ribeiro Pires Junior et al [6] have proposed
protocols for detecting suspicious transmissions and the
consequent identification of malicious nodes and for
disseminating this information in the network. They
evaluated the detection rate and the efficiency of their
solution along a number of parameters. They provided a
solution to identify malicious nodes in wireless sensor
networks through detection of malicious message
transmissions in a network. A message transmission is
considered suspicious if its signal strength is incompatible
with its originator’s geographical position.
Devesh C. Jinwala et al [8] have proposed a novel
design of link layer security architecture for WSNs. The
principal characteristic of the design is the flexible and
configurable architecture, with respect to the actual security
attributes demanded by the application. Their design is based
on the premise that when the link layer architecture is
implemented in software, flexibility and seamless integration
of the application code become the prime advantages. They
also emphasize that with the increasing computational,
storage and bandwidth resources of the sensor nodes.
SWARM BASED DEFENSE TECHNIQUE
A. Swarm Intelligence (SI)
Swarm intelligence (SI) is the interaction of simple
agents in order to achieve a universal goal. Using social
insect metaphor for solving various problems is the main
basis of swarm intelligence. Ants, bees, and termites are the
insects which live in colonies. Every insect in colony have
their own plans. The combination of their activities does not
have any supervisor. A worker in insect colony does not
execute all tasks but rather specializes in particular task.
SIMULATION RESULTS
A. Simulation Model and Parameters
The Network Simulator (NS2) [16], is used to simulate the
proposed architecture. The IEEE 802.15.4 MAC layer is used
for communication among the devices, providing access to
the physical channel for all types of transmissions and
appropriate security mechanisms. IEEE 802.15.4 provisions
16 channels separated by 5 MHz, and the Chipcon CC2420
allows dynamic selection of the same [12]. The IEEE
802.15.4 specification supports two PHY options based on
direct sequence spread spectrum (DSSS), which allows the
use of low-cost digital IC realizations. The PHY adopts the
same basic frame structure for low-duty-cycle low-power
operation, except that the two PHYs adopt different
frequency bands: low-band (868/915 MHz) and high band
(2.4 GHz). The PHY layer uses a common frame structure,
containing a 32-bit preamble, a frame length.
CONCLUSION
In this paper, we propose a swarm based defense technique
for jamming attacks in wireless sensor networks. Swarm
intelligence algorithm is proficient enough to adapt change in
network topology and traffic. The sender and receiver change
channels in order to stay away from the jammer, in channel
hoping technique. The jammers remain on a single channel,
hoping to disrupt any fragment that may be transmitted in the
pulse jamming technique. Using the swarm intelligence
technique, the forward ants either unicast or broadcast at each
node depending on the availability of the channel information
for end of the channel. If the channel information is
available, the ants randomly choose the next hop. As the
backward ants reaches the source, the data collected is
verified which channel there is prevalence of attacker long
time, and those are omitted. Simultaneously the forward ants
are sent through other channels which are not detected before
for attacks