Modeling of Wireless Sensor Networks Jamming Attack Strategies

Authors

  • Chukwuemeka Duru Imo State University PMB 2000 Owerri, Imo State Nigeria
  • Azubuike Aniedu Nnamdi Azikiwe University PMB 5025 Awka, Anambra State Nigeria
  • Onyeyili Tochukwu Innocent Nnamdi Azikiwe University PMB 5025 Awka, Anambra State Nigeria
  • Alagbu Ekene E.O Nnamdi Azikiwe University PMB 5025 Awka, Anambra State Nigeria

Keywords:

Jamming attack, Media Access Control, Denial of Service Attack, Sensors

Abstract

Jamming attacks like constant jamming, deceptive jamming, random jamming and reactive jamming disrupt the normal operation of nodes in wireless sensor networks thereby drastically affecting the network throughput, delay and energy consumption by sending random signals in the network without following the underlying Media Access Control rules. These signals collide with the legitimate signals causing undue traffic in the network leading to Denial of Service Attack. This work provides a model for the different jamming attacks experienced in wireless sensor networks using Unified Modeling Language. Modeling the different jamming attacks would help in better description of their behavior and strategy. Established models can be employed in the design of jamming detection and mitigation framework for DoS attacks mitigation in wireless sensor networks that involve sensors which are known to have limited and constrained resources.

References

. Abror Abduvaliyev, Al-Sakib Khan Pathan, Jianying Zhou, Rodrigo Roman, and Wai-Choong Wong, "On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks," IEEE Communications Surveys & Tutorials, vol. 15, no. 3, pp. 1223-12237, 2013.

. R Swetha, Amarnath V Santhosh, and Sofia Anita, "Wireless Sensor Network : A Survey," International Journal of Advanced Research in Computer and Communication Engineering, pp. 2292–2330, 2018.

. Babak D. Beheshti, "A Framework for Wireless Sensor Network Security," in IEEE Long Island Systems, Applications and Technology Conference (LISAT), Farmingdale, NY, USA, 2016, pp. 1-4.

. Bo Yu Lu-Yong Zhang, "An Improved Detection Method for Different Types of Jamming Attacks in Wireless Networks," in The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014), Shanghai, China, 2014, pp. 553-558.

. Jennifer Yick, Biswanath Mukherjee, and Dipak Ghosal, "Wireless sensor network survey," Computer Network, vol. 52, pp. 2292–2330, 2008.

. Qiuwei Yang, Xiaogang Zhu, Hongjuan Fu, and Xiqiang Che, "Survey of Security Technologies on Wireless Sensor Networks," Journal of Sensors, pp. 1-9, 2015.

. Aykut Karakaya and Sedat Akleylek, "A Survey on Security Threats and Authentication Approaches in Wireless Sensor Networks," in 6th International Symposium on Digital Forensic and Security (ISDFS), Antalya, Turkey, 2018, pp. 1-4.

. Aashima Singla and Ratika Sachdeva, "Review on Security Issues and Attacks in Wireless Sensor Networks," International Journal of Advanced Research in Computer Science and Software Engineering, p. 2, 2013.

. Pavan Bhat. (2011, Aug.) sensors-and-networks.blogspot. [Online]. http://sensors-and-networks.blogspot.com/2011/08/physical-layer-for-wireless-sensor.html

. Alhameed Ahmad Abed Alkhatib and Gurvinder Singh Baicher, "Wireless Sensor Network Architecture," in International conference on computer networks and communication systems, Singapore, 2012, p. 4.

. Sunil Ghildiyal, Amit Kumar Mishra, Ashish Gupta, and Neha Garg, "Analysis of Denial of Service (DoS) Attacks in Wireless Sensor Networks," International Journal of Research in Engineering and Technology, p. 5, 2014.

. Opeyemi Osanaiye, Attahiru S. Alfa, and Gerhard P. Hanck, "A Statistical Approach to Detect Jamming Attacks in Wireless Sensor Networks," Sensors, pp. 1-15, 2018.

. Manos Antonakakis et al., Understanding the Mirai Botnet. Vancouver, BC: USENIX} Association, 2017.

. Mingyan Li, Iordanis Koutsopoulos, and Radha Poovendran, "Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks," IEEE Transactions on Mobile Computing , pp. 1119-1133, 2010.

. Behrouz A. Forouzan, Data Communication and Networking. New York, USA: McGraw Hill, 2007.

. Sachin D. Babar, Neeli R. Prasad, and Ramjee Prasad, "Jamming Attack: Behavioral Modelling and Analysis," in Wireless VITAE 2013, Atlantic City, NJ, USA, 2013, pp. 1-5.

Downloads

Published

2020-04-12

How to Cite

Duru, C. ., Aniedu, A. ., Innocent, O. T. ., & Ekene E.O, A. . (2020). Modeling of Wireless Sensor Networks Jamming Attack Strategies. American Scientific Research Journal for Engineering, Technology, and Sciences, 67(1), 48–65. Retrieved from https://asrjetsjournal.org/index.php/American_Scientific_Journal/article/view/5728

Issue

Section

Articles