scholarly journals On Optimal Antijamming Strategies in Sensor Networks

2012 ◽  
Vol 8 (4) ◽  
pp. 793194
Author(s):  
Yanmin Zhu ◽  
Yuan Jiang

Physical layer radio jamming is a serious security threat to a wireless sensor network since the network relies on open wireless radio channels. A radio jammer is typically strategic and chooses its jamming strategy in response to the possible defense strategy taken by the sensor network. In this paper we model the interaction between the sensor network and the attacker as a noncooperative nonzero-sum static game. In such a game, the sensor network has a set of strategies of controlling its probability of wireless channel access and the attacker manipulates its jamming by controlling its jamming probability after sensing a transmission activity. We propose an algorithm for computing the optimal strategies for jamming attack and network defense. A critical issue is that there may exist a number of possible strategy profiles of Nash equilibria. To address this issue, we further propose to choose realistic Nash equilibria by applying the Pareto dominance and risk dominance. Our numerical results demonstrate that the strategies chosen by the Pareto dominance and risk dominance achieve the expected performance. Our results presented in the paper provide valuable defense guidance for wireless sensor networks against jamming attacks.

Author(s):  
Osama Mahfooz ◽  
Mujtaba Memon ◽  
Javier Poncela

<span>Wireless sensor networks are the communication of small<span> sensing el- ements which collaborate with each other to collect<span> process and communicate over wireless channel information<span> about some physical phenomena. These self- managing,<span> highly robust and energy efficient networks can be excellent<span> means for monitoring underground mining, wildlife and<span> various physical infrastruc- tures such as bridges, pipelines,<span> and buildings. This paper introduces wireless sensor<span> networks to address specific problems in agriculture system<span> of agricul- tural countries like Pakistan and discusses WSN’s<span> usefulness to overcome those problems.<br /><br class="Apple-interchange-newline" /></span></span></span></span></span></span></span></span></span></span></span>


Author(s):  
SUPREETHA PATEL T P ◽  
K.N. SHREENATH

In recent days, reactive jamming attack has emerged as a great security threat to wireless sensor network [WSN]. Several strategies are developed to identify the trigger nodes, whose legitimate transmission activates any reactive jammer. After identifying the trigger node, the node will be shut down to deactivate the jammer and its routing information is deleted from the routing table, then the node can’t be used again in the network. Since the node can’t be used again in the network it is one of the major drawbacks. Hence to overcome the problem, In this paper we propose a novel approach, where the identified trigger nodes are put in to the scanning mode, so that we can reuse the trigger nodes, after deactivating the jammer node in the network.


Author(s):  
ANNAPOORNA B.R ◽  
MRS.SHANTHI M. B ◽  
DR.JITENDRANATH MUNGARA

Wireless Sensor Networks are exposed to serious security threat called jamming. This type of attacks with wireless transmission can be used as a catalyst for rising Denial-of-service attacks. This paper considers the problem of jamming under an internal threat model, where the attacker who is aware of all the network secrets and the details of implementation which results in the difficulty of detection. Jamming is broken down in to layers and this paper focuses on jamming at the Transport/Network layer. To overcome these attacks, we develop three schemes that prevent the attacker from attacking the packets. Then we evaluate the security of our schemes.


2014 ◽  
Vol 8 (1) ◽  
pp. 658-663
Author(s):  
Jianjun Lang ◽  
Qigang Jiang

Wireless sensor network (WSN) consists of massive small sensor nodes which are located in monitoring region, the target of which is to cooperatively sense, collect and process the information of objects in the coverage area, then send the information to the observer through wireless communication. It can be widely used in military applications, medical treatment, traffic, environment monitoring and so on. Medium Access Control (MAC) Protocol, which decides how to share the wireless channel, allocates the limited communication resource among nodes and a good MAC protocol can save lots of energy and reduce collision. Firstly the thesis analyzed the research background and the current situation at home and abroad, and then discussed the structural characteristics of wireless sensor networks and other content, in which indicating the energy consumption of the wireless sensor network; Then, the thesis compared and analyzed the MAC protocols of the wireless sensor Network, focusing on competition-based MAC protocol S-MAC protocol in detail. From the shortcomings of the thesis proposed a new study of the improved protocol basing on the random work sleep scheduling mechanism; Finally, the thesis simulated the improving the MAC protocol, showing that the performances of the improved protocol are better than the original in improving energy efficiency, delay, throughput and so on from the analysis of simulation results.


2018 ◽  
Vol 7 (2.26) ◽  
pp. 25
Author(s):  
E Ramya ◽  
R Gobinath

Data mining plays an important role in analysis of data in modern sensor networks. A sensor network is greatly constrained by the various challenges facing a modern Wireless Sensor Network. This survey paper focuses on basic idea about the algorithms and measurements taken by the Researchers in the area of Wireless Sensor Network with Health Care. This survey also catego-ries various constraints in Wireless Body Area Sensor Networks data and finds the best suitable techniques for analysing the Sensor Data. Due to resource constraints and dynamic topology, the quality of service is facing a challenging issue in Wireless Sensor Networks. In this paper, we review the quality of service parameters with respect to protocols, algorithms and Simulations. 


2017 ◽  
Vol 13 (05) ◽  
pp. 122 ◽  
Author(s):  
Bo Feng ◽  
Wei Tang ◽  
Guofa Guo

In wireless sensor networks, the nodes around the base station have higher energy consumption due to the forwarding task of all the detected data. In order to balance the energy consumption of the nodes around the base station, a reasonable and effective mechanism of node rotation dormancy is put forward. In this way, a large number of redundant nodes in the network are in a dormant state, so as to reduce the load of important nodes around the base station. The problems of the redundant nodes in the sensor network are analyzed, and a new method is proposed to distinguish the redundant nodes based on local Delaunay triangulation and multi node election dormancy mechanism. The experimental results showed that this method could effectively distinguish the redundant nodes in the network; at the same time, through the multi round election mechanism, parts of redundant nodes are made dormant. In summary, they can reduce the network energy consumption on the condition of guaranteeing the original coverage.


2018 ◽  
Vol 7 (2.23) ◽  
pp. 59 ◽  
Author(s):  
Surinder Singh ◽  
Hardeep Singh Saini

The wireless sensor network has group of sensors which can sense the data and route this data to base station. As there is no physical connection between sensor and base station the important data can be routed without wires. The broadcast nature of wireless sensor network makes it prone to security threat to the valuable data. The attacker node can detect the data by creating their own data aggregation and routing mechanism .The number of attacks can be possible on the network layer. Out of these attacks wormhole is one of the major attack which can change the routing method of the whole wireless sensor network. In this attack,the attacker node can control the packet transmission of whole network and route it to the tunnel of nodes. The major drawback of this attack is to increase the packet drop and disturbing the routing mechanism. A number of security techniques are developed by the researcher to reduce the packet drop ratio and secure the routing mechanism of the network. Out of all thesetechniquesfew related to packet drop ratio are discussed in this paper. TheLightweight countermeasure for the wormhole attack (LITEWORP) based on Dynamic Source routing (DSR) protocol security technique,Delay Per Hop Indication (Delphi) based on AODV(Avoidance Routing Protocol) Protocol security technique and MOBIWORP based on DSRprotocol security technique reduce the packet loss percentage 40%,43% and 35% respectively.   


2017 ◽  
Vol 13 (04) ◽  
pp. 45 ◽  
Author(s):  
Liping LV

<p class="0abstract"><span lang="EN-US">Wireless sensor network is a new field of computer science and technology research. It has a very broad application prospects. In order to improve the network survival time, it is very important to design efficient energy-constrained routing protocols. In this paper, we studied the characteristics of wireless sensor networks, and analyzed the design criteria of sensor network routing algorithms. In view of the shortcomings of traditional algorithms, we proposed an energy-aware multi-path algorithm. When selecting a data transmission path, the energy-aware multi-path algorithm can avoid nodes with low energy levels. At the same time, it takes the remaining energy of the node and the number of hops as one of the measures of the path selection. The multi-path routing algorithm realized the low energy consumption of the data transmission path, thus effectively prolonging the network lifetime. Compared with the traditional algorithm, the results show that our method has high reliability and energy efficiency.</span></p>


2017 ◽  
Vol 13 (07) ◽  
pp. 36
Author(s):  
Yuxia Shen

<p><span style="font-size: medium;"><span style="font-family: 宋体;">In wireless sensor networks, for improving the time synchronization perfromance of online monitoring and application of ZigBee protocol, a scheme is designed. For this objective, first of all, the ZigBee protocol specification is summarized, a profound analysis of the hardware abstraction architecture of TinyOS operating system is made; the advantages of the ZigBee protocol compared with the traditional radio technology are comparatively analyzed. At the same time, the node design block diagram based on CC2430 and related development system is provided. In the TinyOS2.x operating system, we analyze CC2430 application program abstract architecture, and on this basis, give the realization process of program design. The research results showed that we achieve an on-line monitoring system based on ZigBee protocol, which has realistic significance of applying ZigBee protocol in wireless sensor network of electrical equipment online monitoring. Based on the above research, it is concluded that the online monitoring system can collect the temperature parameters of the monitored object in real time that it can be widely applied in wireless sensor networks.</span></span></p>


Sign in / Sign up

Export Citation Format

Share Document