4.7 Article

Stealth Jamming Attack in WSNs: Effects and Countermeasure

期刊

IEEE SENSORS JOURNAL
卷 18, 期 17, 页码 7106-7113

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JSEN.2018.2852358

关键词

Wireless sensor network; routing protocol; security; interference channels; cross-layer design

向作者/读者索取更多资源

This paper explores a novel type of attack in wireless sensor networks-Stealth Jamming (SJAM), in which malicious nodes periodically generate bogus traffic in order to trigger false route breakages. More precisely, they target a relatively unexplored weakness inherent in the route maintenance mechanism of ad hoc protocols used by trust-aware routing schemes. Missing a certain number of transmission attempts at the data link layer is typically considered as the link, and consequently route breakage. In this attack, malicious nodes silently listen to the wireless channel, and if the busy airtime (indicative of wireless congestion) exceeds a certain threshold, it starts injecting gratuitous fake broadcast messages for a brief duration, thereby leading to excessive collisions for a transient period and leading to failed transmissions and route breakages, significantly degrading network performance. SJAM is difficult to detect, because the malicious nodes are active only if congestion exceeds a threshold and then only periodically. It is difficult to discern these attacks from genuine route breakages, which are also quite common. In this paper, we explore this type of attack and propose an intelligent crass-layered scheme for mitigating these attacks, thereby improving route stability, throughput, and delay performance. We discuss how enhanced route maintenance in existing trust-aware routing solutions ensures wide applicability of the solution. Simulation results demonstrate the improved network performance when compared with the state-of-the-art solutions.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据