| Literature DB >> 22319316 |
Abstract
To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute.Entities:
Keywords: attack tolerant routing; jamming attack; multiple paths; ubiquitous networking system
Year: 2010 PMID: 22319316 PMCID: PMC3274237 DOI: 10.3390/s100403626
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1.An example of a ubiquitous networking system.
Figure 2.Existing jamming defenses and DMP.
Comparison of DMP with relative evasion approaches.
| Spectrum Spreading [ | Physical Layer | It is too energy-consuming to be widely deployed in resource-constrained sensors. |
| Channel Hopping [ | Link Layer | The jammer can also change the jamming channel continuously and then it enlarges the channel switching overhead on nodes on the entire network. |
| Retreat [ | Network Layer | It is limit to mobile environment. |
| JAM [ | Network Layer | It simply focused on a mapping service for the jamming area, thus the best single route detouring the jamming zone can easily become congested again. |
| DMP | Network Layer | As a general approach irrelative with specific protocols on physical and link layer, it can enhance the robustness against jamming on existing routing protocols. |
Algorithm selecting forward nodes at detour node.
| 1: | |
| 2: | |
| 3: | |
| 4: | |
| 5: | add |
| 6: | |
| 7: | |
| 8: | sort |
| 9: | |
| 10: | |
| 11: | pop the first node |
| 12: | add |
| 13: | |
| 14: | detour normal traffic evenly to |
| 15: | |
| 16: | |
| 17: | route the traffic according to the general routing protocol |
| 18: |
Set of nodes in jamming area
: Set of forward nodes
: Set of neighbor zones
: Set of forward zones
: Next-hop node in general route
: A zone
: A current zone where the detour node is performing DMP
: A zone in which the pervious detour node is included, when the traffic is forwarded to the current detour node
: A forward node
: Distance of zone from the destination zone
α: The number of forward nodes given as a system parameter. The detour nodes evenly forward normal traffic on the determined α forward nodes.
Figure 3.An example of forward zones according to victim zones (destination zone 1, victim zone is 22, 23 and 32 for each respective case.).
Figure 4.Rerouting example with extended RDSR in the jamming attack with α = 2.
Figure 5.Performance comparison of (a) PDR and (b) delay according to number of normal flows.
Figure 6.Performance comparison of (a) PDR and (b) delay according to number of attack flows.
Figure 7.Performance comparison of (a) PDR and (b) delay according to interval of an attack flow.
Figure 8.Performance comparison of (a) PDR and (b) delay according to number of forward nodes.
Figure 9.The performance improvement of DMP compared to JAM, according to (a) number of normal flows, (b) number of attack flows, (c) interval of an attack flow and (d) number of forward nodes.