The Community for Technology Leaders
RSS Icon
Issue No.05 - May (2012 vol.11)
pp: 793-806
Ying Xuan , University of Florida, Gainesville
Yilin Shen , University of Florida, Gainesville
Nam P. Nguyen , University of Florida, Gainesville
My T. Thai , University of Florida, Gainesville
During the last decade, Reactive Jamming Attack has emerged as a great security threat to wireless sensor networks, due to its mass destruction to legitimate sensor communications and difficulty to be disclosed and defended. Considering the specific characteristics of reactive jammer nodes, a new scheme to deactivate them by efficiently identifying all trigger nodes, whose transmissions invoke the jammer nodes, has been proposed and developed. Such a trigger-identification procedure can work as an application-layer service and benefit many existing reactive-jamming defending schemes. In this paper, on the one hand, we leverage several optimization problems to provide a complete trigger-identification service framework for unreliable wireless sensor networks. On the other hand, we provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios. Theoretical analysis and simulation results are included to validate the performance of this framework.
Reactive jamming, jamming detection, trigger identification, error-tolerant nonadaptive group testing, optimization, NP-hardness.
Ying Xuan, Yilin Shen, Nam P. Nguyen, My T. Thai, "A Trigger Identification Service for Defending Reactive Jammers in WSN", IEEE Transactions on Mobile Computing, vol.11, no. 5, pp. 793-806, May 2012, doi:10.1109/TMC.2011.86
[1] D.Z. Du and F. Hwang, Pooling Designs: Group Testing in Molecular Biology. World Scientific, 2006.
[2] M. Goodrich, M. Atallah, and R. Tamassia, "Indexing Information for Data Forensics," Proc. Third Applied Cryptography and Network Security Conf. (ACNS), 2005.
[3] R. Gupta, J. Walrand, and O. Goldschmidt, "Maximal Cliques in Unit Disk Graphs: Polynomial Approximation," Proc. Int'l Network Optimization Conf. (INOC), 2005.
[4] V. Guruswami and C.P. Rangan, "Algorithmic Aspects of Clique-Transversal and Clique-Independent Sets," Discrete Applied Math., vol. 100, pp. 183-202, 2000.
[5] W. Hang, W. Zanji, and G. Jingbo, "Performance of DSSS Against Repeater Jamming," Proc. IEEE 13th Int'l Conf. Electronics, Circuits and Systems (ICECS), 2006.
[6] P. Tague, S. Nabar, J.A. Ritcey, and R. Poovendran, "Jamming-Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection," IEEE/ACM Trans. Networking, vol. 19, no. 1, pp. 184-194, Feb. 2011.
[7] I. Shin, Y. Shen, Y. Xuan, M.T. Thai, and T. Znati, "Reactive Jamming Attacks in Multi-Radio Wireless Sensor Networks: An Efficient Mitigating Measure by Identifying Trigger Nodes," Proc. Second ACM Int'l Workshop Foundations of Wireless Ad Hoc and Sensor Networking and Computing (FOWANC), in conjunction with MobiHoc, 2009.
[8] O. Sidek and A. Yahya, "Reed Solomon Coding for Frequency Hopping Spread Spectrum in Jamming Environment," Am. J. Applied Sciences, vol. 5, no. 10, pp. 1281-1284, 2008.
[9] M. Strasser, B. Danev, and S. Capkun, "Detection of Reactive Jamming in Sensor Networks," ACM Trans. Sensor Networks, vol. 7, pp. 1-29, 2010.
[10] H. Wang, J. Guo, and Z. Wang, "Feasibility Assessment of Repeater Jamming Technique for DSSS," Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), 2007.
[11] A.D. Wood, J. Stankovic, and S. Son, "A Jammed-Area Mapping Service for Sensor Networks," Proc. IEEE 24th Real-Time Systems Symp. (RTSS), 2003.
[12] W. Xu, K. Ma, W. Trappe, and Y. Zhang, "Jamming Sensor Networks: Attack and Defense Strategies," IEEE Network, vol. 20, no. 3, pp. 41-47, May/June 2006.
[13] W. Xu, T. Wood, W. Trappe, and Y. Zhang, "Channel Surfing and Spatial Retreats: Defenses Against Wireless Denial of Service," Proc. ACM Workshop Wireless Security, pp. 80-89, 2004.
[14] M. Li, I. Koutsopoulos, and R. Poovendran, "Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks," Proc. IEEE INFOCOM, 2007.
[15] R.A. Poisel, Modern Communications Jamming Principles and Techniques. Artech House, 2004.
[16] W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks," Proc. ACM MobiHoc, 2005.
[17] M. Cakiroglu and A.T. Ozcerit, "Jamming Detection Mechanisms for Wireless Sensor Networks," Proc. Third Int'l Conf. Scalable Information Systems (InfoScale), 2008.
[18] M. Cagalj, S. Capkun, and J.P. Hubaux, "Wormhole-Based Antijamming Techniques in Sensor Networks," IEEE Trans. Mobile Computing, vol. 6, no. 1, pp. 100-114, Jan. 2007.
[19] Y.-X. Chen and D.-Z. Du, "New Constructions of One- and Two-Stage Pooling Designs," J. Computational Biology, vol. 15, pp. 195-205, 2008.
[20] M.G. Garey and D.S. Johnson, "The Rectilinear Steiner Tree Problem is NP-Complete," SIAM J. Applied Math., vol. 32, pp. 826-834, 1977.
[21] L.G. Valiant, "Universality Considerations in VLSI Circuits," IEEE Trans. Computers, vol. 30, no. 2, pp. 135-140, Feb. 1981.
[22] K. Pelechrinis, I. Koutsopoulos, I. Broustis, and S.V. Krishnamurthy, "Lightweight Jammer Localization in Wireless Networks: System Design and Implementation," Proc. IEEE 28th Conf. Global Telecomm. (GlobeCom '09), 2009.
[23] H. Liu, W. Xu, Y. Chen, and Z. Liu, "Localizing Jammers in Wireless Networks," Proc. IEEE Int'l Conf. Pervasive Computing and Comm. (PWN), 2009.
[24] Z. Liu, H. Liu, W. Xu, and Y. Chen, "Wireless Jamming Localization by Exploiting Nodes' Hearing Ranges," Proc. Int'l Conf. Distributed Computing in Sensor Systems (DCOSS), 2010.
[25] H. Kaplan, M. Katz, G. Morgenstern, and M. Sharir, "Optimal Cover of Points by Disks in a Simple Polygon," Proc. 18th Ann. European Symp. Algorithms, 2010.
3 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool