This Article 
 Bibliographic References 
 Add to: 
Wormhole-Based Antijamming Techniques in Sensor Networks
January 2007 (vol. 6 no. 1)
pp. 100-114
Due to their very nature, wireless sensor networks are probably the category of wireless networks most vulnerable to "radio channel jamming”-based Denial-of-Service (DoS) attacks. An adversary can easily mask the events that the sensor network should detect by stealthily jamming an appropriate subset of the nodes; in this way, he prevents them from reporting what they are sensing to the network operator. Therefore, even if an event is sensed by one or several nodes (and the sensor network is otherwise fully connected), the network operator cannot be informed on time. We show how the sensor nodes can exploit channel diversity in order to create wormholes that lead out of the jammed region, through which an alarm can be transmitted to the network operator. We propose three solutions: The first is based on wired pairs of sensors, the second relies on frequency hopping, and the third is based on a novel concept called uncoordinated channel hopping. We develop appropriate mathematical models to study the proposed solutions.

[1] BTnodes, http:/, 2006.
[2] I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A Sur-vey on Sensor Networks,” IEEE Comm. Magazine, vol. 40, no. 8, 2002.
[3] A.D. Wood and J.A. Stankovic, “Denial of Service in Sensor Networks,” Computer, vol. 35, no. 10, pp. 54-62, Oct. 2002.
[4] L. Eschenauer and V. Gligor, “A Key Management Scheme for Distributed Sensor Networks,” Proc. ACM Conf. Computer and Comm. Security, 2002.
[5] Y. Hu, A. Perrig, and D. Johnson, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks,” Proc. INFOCOM, 2003.
[6] W. Kaiser, G. Pottie, M. Srivastava, G.S. Sukhatme, J. Villasenor, and D. Estrin, “Networked Infomechanical Systems (NIMS) for Ambient Intelligence,” Ambient Intelligence, 2004.
[7] C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Elsevier's AdHoc Networks J., special issue on sensor network applications and protocols, vol. 1, nos. 2-3, pp. 293-315, Sept. 2003.
[8] M. Leopold, M.B. Dydensborg, and P. Bonnet, “Bluetooth and Sensor Networks: A Reality Check,” Proc. First ACM Conf. Networked Sensor Systems (SenSys), 2003.
[9] J. McCune, E. Shi, A. Perrig, and M.K. Reiter, “Detection of Denial-of-Message Attacks on Sensor Network Broadcasts,” Proc. IEEE Symp. Security and Privacy, May 2005.
[10] G. Noubir and G. Lin, “Low_Power DoS Attacks in Data Wireless LANs and Countermeasures,” SIGMOBILE Mobile Computing Comm. Rev., vol. 7, no. 3, pp. 29-30, 2003.
[11] G. Sharma and R.R. Mazumdar, “Hybrid Sensor Networks: A Small World,” Proc. MobiHoc '05, 2005.
[12] H. Solomon, Geometric Probability. SIAM, 1978.
[13] A.D. Wood, J.A. Stankovic, and S.H. Son, “JAM: A Jammed_Area Mapping Service for Sensor Networks,” Proc. Real-Time Systems Symp. (RTSS), 2003.
[14] W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks,” Proc. MobiHoc '05, pp. 46-57, 2005.
[15] W. Xu, T. Wood, and Y.W. Trappe, “Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service,” Proc. ACM Workshop Wireless Security (WiSe), 2004.

Index Terms:
Wireless sensor networks, security, jamming DoS attacks, wormholes, probabilistic analysis, simulations.
Mario Cagalj, Srdjan Capkun, Jean-Pierre Hubaux, "Wormhole-Based Antijamming Techniques in Sensor Networks," IEEE Transactions on Mobile Computing, vol. 6, no. 1, pp. 100-114, Jan. 2007, doi:10.1109/TMC.2007.18
Usage of this product signifies your acceptance of the Terms of Use.