Literature DB >> 27886154

On Performance Analysis of Protective Jamming Schemes in Wireless Sensor Networks.

Xuran Li1, Hong-Ning Dai2, Hao Wang3, Hong Xiao4.   

Abstract

Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) systems. An eavesdropping attack is one of the most serious threats to WSNs since it is a prerequisite for other malicious attacks. In this paper, we propose a novel anti-eavesdropping mechanism by introducing friendly jammers to wireless sensor networks (WSNs). In particular, we establish a theoretical framework to evaluate the eavesdropping risk of WSNs with friendly jammers and that of WSNs without jammers. Our theoretical model takes into account various channel conditions such as the path loss and Rayleigh fading, the placement schemes of jammers and the power controlling schemes of jammers. Extensive results show that using jammers in WSNs can effectively reduce the eavesdropping risk. Besides, our results also show that the appropriate placement of jammers and the proper assignment of emitting power of jammers can not only mitigate the eavesdropping risk but also may have no significant impairment to the legitimate communications.

Entities:  

Keywords:  analysis; friendly jamming; security; wireless sensor networks

Year:  2016        PMID: 27886154      PMCID: PMC5190968          DOI: 10.3390/s16121987

Source DB:  PubMed          Journal:  Sensors (Basel)        ISSN: 1424-8220            Impact factor:   3.576


1. Introduction

Cyber Physical Social Sensing (CPSS) has emerged as a promising paradigm to enable the interactions between humans and the physical environment [1,2,3,4]. As a key component of CPSS systems, wireless sensor networks (WSNs) play an important role in sensing, collecting and transmitting confidential information [5,6]. However, WSNs are also susceptible to various malicious attacks due to the vulnerability of sensor nodes [7]. Eavesdropping attack, as one of typical malicious attacks in WSNs has attracted considerable attention recently. It is difficult to detect eavesdropping behaviours since malicious nodes (also called eavesdroppers) passively wiretap the confidential information without disclosure of their existence. Encryption has been typically used to protect the confidential communications in wireless networks. For example, Cellular Message Encryption Algorithm has been used in cellular networks [8] and KASUMI has been used in 3G networks [9] while wireless local area networks (WLANs) have adopted Wired Equivalent Privacy (WEP) [10], Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access II (WPA2) [11]. However, the traditional cryptographic methods may not be feasible to WSNs due to the following constraints: 1) the limited battery power of sensor nodes; (2) the inferior computational capability of sensor nodes and (3) the difficulty of managing distributed sensor nodes in a centralized way, which is however necessary for many encryption algorithms [12]. In this paper, we propose a novel anti-eavesdropping mechanism to protect confidential communications in WSNs. In particular, we deploy a small number of friendly jammers in WSNs, which can generate sufficient interference to prevent eavesdroppers from snooping legitimate communications. We name such schemes as Friendly-Jamming (Fri-Jam) schemes. Recently, [13,14,15,16,17] also proposed a similar approach named Protective Jamming (Pro-Jam) to prohibit the eavesdropping attacks in RFID-like networks. However, Pro-Jam is mainly designed for the environment with a fence at the boundary of the network, where jammers are placed outside the fence. This assumption is impractical to WSNs since eavesdroppers can appear at any location in WSNs. Besides, most of the study on Pro-Jam scheme have been focused on the power assignment in a specific scenario. To the best of our knowledge, there is a lack of performance analysis on friendly-jamming schemes. In this paper, we establish a general analytical model to evaluate the performance of Fri-Jam schemes. The primary contributions of this paper can be summarized as follows. In particular, we propose a general theoretical model to quantify the eavesdropping risk (measured by the eavesdropping probability) and evaluate the impact of Fri-Jam schemes on the legitimate communications (measured by the transmission probability). We consider three types of Fri-Jam schemes: random placement of jammers (named FJ-Ran scheme), regular placement of jammers (named FJ-Reg scheme) and FJ-Reg scheme with power control (named FJ-PC scheme). We compare the eavesdropping probability of WSNs without jammers with that with friendly jammers (FJ-Ran, FJ-Reg and FJ-PC schemes). We find that all of three Fri-Jam schemes can effectively reduce the eavesdropping probability in contrast to no-jamming scenarios. Our results also show that the appropriate placement of friendly jammers in WSNs can significantly reduce the eavesdropping probability whilst there is no significant impairment on legitimate communications. Besides, to adjust emitting power of jammers properly can mitigate the eavesdropping risk while has no significant impairment to the legitimate transmission. The rest of this paper is organized as follows. We summarize the related works in Section 2. Section 3 introduces the models used in this paper. We then analyze the eavesdropping probability of different Fri-Jam schemes in Section 4. We next show the results in Section 5. Finally, Section 6 concludes this paper.

2. Related Work

It is difficult to detect eavesdropping attacks in WSNs since eavesdroppers passively snoop the confidential communications with concealment of their presence. Encryption is one of the most commonly used techniques to protect confidential communications, which is shown to work effectively in WLANs (e.g., WEP [10], WPA and WPA2 [11]), in cellular networks (e.g., CMEA [8] and KASUMI [9]) and in wireless personal area networks (WPANs) [18]. However, applying such cryptography-based techniques help hiding the meaning of the information being transmitted, but not the existence of the information itself. In addition, the techniques are designed to make it computationally difficult for the adversary to understand the true meaning of the information while the adversary is still able to access all the information [19]. Furthermore, it is quite challenging to apply the conventional ciphers (encryption algorithms) to WSNs due to the following inherent constraints of WSNs [12]: (a) the inferior computational capability of wireless nodes; (b) the limited battery power of wireless nodes; (c) the difficulty of managing the distributed sensor nodes in the centralized manner. In addition, the cryptographic authentication and identification in higher layer will introduce a significant computational overhead [20]. There are a number of anti-eavesdropping counter-measures in WSNs. We roughly categorize them into three types: (i) lightweight encryption schemes [21,22,23,24]; (ii) generating artificial noise to limit the amount of information that can be extracted by eavesdroppers [25,26,27]; and (iii) mitigating the eavesdropping risk by controlling the transmitting power [28]. Table 1 summarizes these schemes. In particular, a number of lightweight encryption schemes based on physical layer features of wireless networks have been proposed [21,22,23,24]. The main idea of physical-layer encryption schemes is to exploit the inherent randomness of communication channels so that the amount of information that can be extracted by an eavesdropper is mitigated. However, the encryption schemes are still computational intensive and power-consuming.
Table 1

Comparison of related anti-eavesdropping schemes in WSNs.

EncryptionArtificial NoisePower Control
References [8,9,10,11,18,21,22,23,24] [25,26,27] [28]
Limitationscomputational intensive and power consumingtoo specific (only apply for some specific scenarios)deteriorate legitimate communications
Some recent studies [25,27] exploit the artificial noise generated by RFID readers to alleviate the eavesdropping capability of malicious nodes. However, these schemes can only be applied to the scenarios of Internet-of-Things (IoT) based on RFID. Besides, a transmitting power control method is proposed in [28] to mitigate the eavesdropping risk while to adjust the transmitting power may deteriorate the legitimate communications [29]. Although [15,16,17] also proposed an approach similar to our Fri-Jam schemes, their methods are mainly designed for the IoT scenario, in which jammers are placed outside the fence surrounding the boundary of the network. These schemes are not feasible to WSNs since eavesdroppers can appear at any location in WSNs. Besides, most of the studies on protective jamming schemes [15,16,17] are mainly focused on a specific scenario.

3. System Models

This section first presents three kinds of Fri-Jam schemes in Section 3.1. Then, Section 3.2 gives the channel model used in this paper. Section 3.3 presents the definitions on eavesdropping probability and transmission probability.

3.1. Fri-Jam Schemes

In this paper, we assume that the network is placed in a torus [30]. In this manner, the border effect can be ignored. We consider three types of users in our network: legitimate users, eavesdroppers and friendly jammers. The legitimate users are distributed according to homogeneous Poisson point process (PPP). Legitimate users transmit data packets, which might be passively snooped by eavesdroppers while legitimate users are unaware of the reconnaissance. Similar to [28], we assume that the eavesdropper is located at the center of the network without loss of generality since the network is placed in a symmetric torus. The interference caused by friendly jammers heavily depends on the location of jammers and the emitting power of each jammer. In this paper, we consider two placement strategies of friendly jammers in WSNs: (i) FJ-Reg scheme, in which jammers are regularly placed at deterministic locations and (ii) FJ-Ran scheme, in which jammers are regularly placed at random locations. Specifically, in the FJ-Reg scheme, friendly jammers are regularly placed in a grid manner, as shown in Figure 1. In the FJ-Ran scheme, friendly jammers are randomly distributed according to according to PPP, as shown in Figure 2. In addition to FJ-Reg and FJ-Ran schemes, we also consider adjusting the emitting power of jammers. In particular, we consider a modified FJ-Reg scheme with power control (named FJ-PC scheme) in this paper.
Figure 1

FJ-Reg Scheme: every jammer is placed at a gray square. Note that we only show a part of the whole network.

Figure 2

FJ-Ran Scheme: every jammer is randomly placed according to homogeneous Poisson Point Process (PPP). Note that we only show a part of the whole network.

3.2. Channel Model

We assume that the radio channel experiences Rayleigh fading and path loss. The received power of a receiver (i.e., a legitimate user or an eavesdropper) at a distance r from its nearest transmitter (legitimate user or friendly jammer) is , where h is a random variable following an exponential distribution with mean and α is the path loss factor. More specifically, we denote . We then consider the Signal to Interference plus Noise Ratio (SINR) model. The SINR of the receiver at a random distance r from its transmitter is expressed as where is the noise power, denotes the cumulative interference from all the legitimate users except for the transmitter denoted by , Φ denotes the set of legitimate users, denotes the transmitting power of the legitimate transmitter and denotes the cumulative interference generated by friendly jammers. The value of heavily depends on the placements of friendly jammers, which will be analyzed in Section 4. We then define the eavesdropping condition to determine whether the transmission from a certain legitimate user can be wiretapped by an eavesdropper. Eavesdropping Condition. A confidential transmission can be snooped by an eavesdropper if and only if .

3.3. Problem Definition

Based on the eavesdropping condition, we then define the eavesdropping probability denoted by as follows. Eavesdropping Probability is the probability that at least one transmission has been wiretapped by an eavesdropper. From the definition we know is the probability to show how likely is any transmission eavesdropped. In order to derive , we need to calculate the probability that one transmission has been eavesdropped, which is denoted by . Considering the situation that no transmission being eavesdropped will be easier than considering all the situations that a certain number of transmissions being eavesdropped. Then, we find that can be expressed by as follows, where N is the expected number of legitimate users in the network. Another concern of this paper is to investigate the impacts of our Fri-Jam schemes on the legitimate communications. Thus, we define the transmission probability denoted by as follows. Transmission Probability is the probability that a legitimate user (transmitter) can successfully transmit with another legitimate user (receiver). To ensure the legitimate transmission, we require at the legitimate receiver, where β is the threshold value of the receiving power for a successful reception. Thus, we have . Following a similar approach to [31], we can obtain .

4. Analysis on Eavesdropping Probability

We first present the analytical results on the eavesdropping probability of Non-Jam scheme in Section 4.1 and then present the results on the eavesdropping probability of Fri-Jam schemes in Section 4.2.

4.1. Analysis of Non-Jam Scheme

According to the definition of the eavesdropping probability , we need to derive the probability that one transmission has been eavesdropped first. In particular, we have of Non-Jam scheme as follows. In Non-Jam scheme, the eavesdropping probability where We denote the distance between the eavesdropper and its nearest transmitter by r. Since the transmitters are distributed according to PPP, the probability density function (PDF) of r can be derived as the following steps. Firstly, we have the probability that no transmitter is closer than R given by Then, the cumulative distribution function (CDF) of r is . We next have the PDF of r as follows, Since the channel gain is h, the SINR at eavesdropper is where . Then, the eavesdropping probability that one transmission has been eavesdropped is Since h is a random variable following an exponential distribution with mean , the probability becomes where denotes the Laplace transform. More specifically, we have Replacing variable μ with , we then have where . ☐ It is shown in Theorem 1 that the eavesdropping probability heavily depends on the channel conditions (such as the path loss and Rayleigh fading).

4.2. Analysis of Fri-Jam Schemes

Recall that we consider three Fri-Jam schemes: FJ-Reg, FJ-Ran and FJ-PC schemes. Thus, we categorize our analysis into the following cases.

4.2.1. Case I: FJ-Reg Scheme

We first analyze the case of FJ-Reg, in which all the jammers are regularly placed in grid manner as shown in Figure 1. We denote the expectation of the cumulative interference generated by jammers by , which is given by Lemma 1. The expectation of the cumulative interference of regular placed jammers is We present the proof in Appendix A. We then derive the probability that one transmission has been eavesdropped, which is given by Theorem 2. In FJ-Reg scheme, the probability where First, the SINR at a random distance r from its nearest transmitter can be expressed as . Then, from the definition of , we have According to the channel model (given in Section 3.2), we have where , and is given by Equation (8). ☐ It is shown in Theorem 2 that the probability heavily depends on the path loss factor α, the Rayleigh fading factor μ, the noise σ and the placement parameter d. Section 5 will give the numerical results that will further confirm this observation.

4.2.2. Case II: FJ-Ran Scheme

We then analyze the case of FJ-Ran, in which all the jammers are randomly distributed in the network. Recall that both jammers and legitimate users are distributed according to PPP while they have the different distribution parameters. In particular, we denote the density of legitimate users by and the density of friendly jammers by . Based on the well-known stochastic geometric results [31], we can obtain Theorem 3 on the probability that one transmission has been eavesdropped as follows. In FJ-Ran scheme, the probability where According to the channel model defined in Section 3.2, we have the Following the similar analysis procedure to [31], we then have Substituting in Equation (10) by RHS of Equation (11), we finally prove the above result. ☐ It is shown in Theorem 3 that the probability heavily depends on both the node density of legitimate users and the node density of jammers, and the channel conditions.

4.2.3. Case III: FJ-PC Scheme

We next analyze the case of FJ-PC scheme, in which jammers are placed in grid as the same as FJ-Reg scheme. We then assign the emitting power of jammers according to the different layers (as shown in Figure 1). We denote the layer number by k, which is ranging from 1 to n. The emitting power of jammers at the same layer is assigned with the same value. Specifically, we assign the emitting power at jammers in FJ-Reg scheme according to the following rule. We assign the emitting power of jammers at the kth layer according to the following equation: where In FJ-PC scheme, the transmission probability of a legitimate user cannot be derived directly by using the existing approaches in [31,32,33,34] since the cumulative interference from jammers in FJ-PC scheme is quite different from that in FJ-Reg scheme. In particular, we have the following lemma to calculate the average cumulative interference. In FJ-PC scheme, the average cumulative interference from power controlled jammers to a legitimate transmitter is where We present the proof in Appendix B. We then derive the transmission probability of a legitimate user, which is given by Theorem 4. In FJ-PC scheme, the transmission probability where The SINR of the receiver at a random distance r from its nearest transmitter can be expressed as , where is the cumulative interference caused by power controlled jammers on the recevier. Then, from the definition of , we have According to the channel model (given in Section 3.2), we have where , and is given by Equation (8). ☐ We then have the eavesdropping probability in FJ-PC scheme as the following theorem. In FJ-PC scheme, the eavesdropping probability where The derivation of eavesdropping probability in FJ-PC scheme is similar to the derivation of Equation (15) in Theorem 4 and the main difference is the cumulative interference from jammers. In particular, the calculation of interference from nth layer jammers in FJ-PC scheme is similar to Equation (A3) in Appendix A, which is shown in the following equation: Then we have the averaged cumulative interference from all the jammers as follows, ☐ According to the definition of the probability of eavesdropping attack , we have where can be replaced by the different values as specified in Non-Jam scheme, FJ-Reg scheme, FJ-Ran scheme and FJ-PC Scheme, which can be obtained by Theorem 1, Theorem 2, Theorem 3 and Theorem 5, respectively. In the next section, we will present numerical results of based on the above schemes.

5. Numerical Results

In this section, we first present the numerical results of the probability of eavesdropping attacks with comparisons among different schemes in Section 5.1. Then we will show the impacts of friendly jammers on the legitimate communications in Section 5.2.

5.1. Comparisons of Different Schemes

In the first set of results, we compare the probability of eavesdropping attacks of FJ-Ran scheme with that of Non-Jam scheme. Note that the larger node density in FJ-Ran scheme and the smaller d in FJ-Reg scheme imply the higher cost (i.e., more jammers are deployed in the network). As shown in Figure 3, the results of Non-Jam scheme are shown in a dash curve and the results of FJ-Ran scheme are shown in solid curves with markers, where we choose the different values of node density of friendly jammers (ranging from 0.2 to 2.0) and the value of node density of legitimate user is 0.5. It is shown in Figure 3 that the Non-Jam scheme always has higher values of than the FJ-Ran scheme, implying that using friendly jammers in WSN can effectively reduce the probability of eavesdropping attacks.
Figure 3

Probability of eavesdropping attacks with FJ-Ran scheme (PPP) versus Non-Jam scheme when with SINR threshold T ranging from to .

It is also shown in Figure 3 that the probability of eavesdropping attacks decreases with the increment of jammers density , implying that adding more jammers can further improve the effect of mitigating eavesdropping attacks. For example, when and the threshold (as shown in Figure 3b), of the Non-Jam scheme is 0.719 while of FJ-Ran scheme is reduced to 0.393 with jammers density and 0.211 with jammers density . In the second set of results, we compare the probability of eavesdropping attacks of the FJ-Reg scheme with that of the Non-Jam scheme. Figure 4 shows the results, where a dash curve represents of the Non-Jam scheme and solid curves with markers depict the results of FJ-Reg scheme. Similar to Figure 3, we find that using friendly jammers can always reduce the eavesdropping probability compared with the Non-Jam scheme. Moreover, it is shown in Figure 4 that the probability of eavesdropping attacks heavily depends on both the channel conditions and system parameter d. Specifically, it is shown in Figure 4b that the probability of eavesdropping attack decreases with the decreased values of d. In fact, the d in FJ-Reg scheme plays a similar role to jammer density in FJ-Ran scheme. In other words, decreasing d is equivalent to the effect of increasing jammer density . Take Figure 4b as an example again. When the threshold is and , of Non-Jam scheme is 0.7176 while becomes 0.072 with , implying that using more friendly jammers can further reduce the eavesdropping probability.
Figure 4

Probability of eavesdropping attacks with FJ-Reg scheme (Grid) versus Non-Jam scheme when with SINR threshold T ranging from to .

In the third set of results, we compare the probability of eavesdropping attacks of FJ-PC scheme with that of Non-Jam scheme. Figure 5 shows the results, where a dash curve represents of Non-Jam scheme and solid curves with markers depict the results of FJ-PC scheme. Similar to Figure 3 and Figure 4, we find that using friendly jammers can always reduce the eavesdropping probability compared with the Non-Jam scheme. Furthermore, we also find that the FJ-PC scheme can further reduce the eavesdropping probability compared with FJ-Reg scheme. This is due to the power assigning strategy in our FJ-PC scheme. In particular, the eavesdropping capability of the eavesdropper is significantly weakened by the jammers in the first layer, which have been assigned with higher power as they are much closer to the eavesdropper than other jammers in other layers. Another benefit of the FJ-PC scheme is that it has less impairment to legitimate communications compared with FJ-Reg and FJ-Ran schemes. The following results will further confirm this observation.
Figure 5

Probability of eavesdropping attacks with FJ-PC scheme versus Non-Jam scheme when with SINR threshold T ranging from to .

5.2. Impacts of Friendly Jammers on Legitimate Transmissions

Another concern is to investigate whether friendly jammers will significantly affect the legitimate transmissions. In order to differentiate the effect with jammers and the effect without jammers in terms of the eavesdropping probability and the transmission probability, we define the eavesdropping deviation and the transmission deviation as follows. Eavesdropping deviation is equal to the difference between the eavesdropping probability without jammers and the eavesdropping probability with jammers. Transmission deviation is equal to the difference between the transmission probability without jammers and the transmission probability with jammers. We then derive the eavesdropping deviation and the transmission deviation in the first case of comparing FJ-Ran scheme with Non-Jam scheme. In particular, we have , where denotes the eavesdropping probability of Non-Jam scheme and denotes the eavesdropping probability of FJ-Ran scheme. Besides, we have , where denotes the transmission probability of Non-Jam scheme and denotes the transmission probability of FJ-Ran scheme. Note that can be calculated by [31] and we omit the detailed derivations in this paper. Table 2 shows the comparison results. As shown in Table 2, the eavesdropping deviation is much larger than the transmission deviation at the same network settings, implying that using jammers in WSNs will not significantly affect the legitimate communications compared with the reductions on the eavesdropping probability. For example, when , while there is less than reduction on the transmission probability (i.e., ).
Table 2

Eavesdropping deviation and transmission deviation of comparing FJ-Ran scheme with Non-Jam scheme when and .

Density λ2Eavesdropping deviation DE(Ran)Transmission deviation DC(Ran)
0.20.11200.0303
0.80.33160.0718
1.40.44700.0880
2.00.51780.0963
Similarly, we derive the eavesdropping deviation and the transmission deviation in the second case of comparing FJ-Reg scheme with Non-Jam scheme. Table 3 shows the comparison results. It is shown in Table 3 that FJ-Reg scheme can also significantly reduce the eavesdropping probability with only minor influence on the legitimate transmissions (e.g., the reduction of is while the reduction of is only when ).
Table 3

Eavesdropping deviation and transmission deviation of comparing FJ-Reg scheme with Non-Jam scheme when and .

Distance dEavesdropping deviation DE(Reg)Transmission deviation DC(Reg)
0.20.66500.1143
0.40.51950.0977
0.60.34670.0742
0.80.20540.0500
We next derive the eavesdropping deviation and the transmission deviation in the third case of comparing the FJ-PC scheme with the Non-Jam scheme. Table 4 shows the comparison results. It is shown in Table 4 that the FJ-PC scheme can significantly reduce the eavesdropping probability with only minor influence on the legitimate transmissions. For example, the is 0.6128 and is 0.1729 in the Non-Jam scheme and they become 0.1770 and 0.1367, respectively when FJ-PC scheme with is applied. At this time, the reduction of is while the reduction of is only when implying that the FJ-PC scheme can significantly reduce the eavesdropping probability while maintaining the minor impairment to the legitimate communications.
Table 4

Eavesdropping deviation and transmission deviation of comparing FJ-PC scheme with Non-Jam scheme when , and .

Distance dEavesdropping deviation DE(PC)Transmission deviation DC(PC)
0.40.49090.0594
0.50.43580.0362
0.60.37880.0217
0.70.32340.0132

6. Conclusions

Wireless sensor networks (WSNs) are serving as a crucial component in cyber-physical social sensing systems. The security of WSNs has received extensive attention recently. One of the serious security threats in WSNs is eavesdropping attacks. In this paper, a novel anti-eavesdropping scheme has been proposed to alleviate eavesdropping attacks in WSNs. In particular, we deploy a number of friendly jammers that emit artificial noise to mitigate the eavesdropping capability of adversaries. More specifically, we consider three types of jamming schemes, such as regular placement of jammers (FJ-Reg), random placement of jammers (FJ-Ran) and regular placement of jammers with power control (FJ-PC). We establish a theoretical model to evaluate the performance of these jamming schemes. Our results show that to introduce friendly jammers in WSNs can significantly reduce the eavesdropping probability without the significant influence on the legitimate communications with the appropriate placement of jammers and the proper assignment of emitting power of jammers.
  1 in total

Review 1.  The past, present and future of cyber-physical systems: a focus on models.

Authors:  Edward A Lee
Journal:  Sensors (Basel)       Date:  2015-02-26       Impact factor: 3.576

  1 in total
  3 in total

1.  A Methodology for the Design of Application-Specific Cyber-Physical Social Sensing Co-Simulators.

Authors:  Borja Bordel Sánchez; Ramón Alcarria; Álvaro Sánchez-Picot; Diego Sánchez-de-Rivera
Journal:  Sensors (Basel)       Date:  2017-09-22       Impact factor: 3.576

2.  Random Access Performance of Distributed Sensors Attacked by Unknown Jammers.

Authors:  Dae-Kyo Jeong; Jung-Hwa Wui; Dongwoo Kim
Journal:  Sensors (Basel)       Date:  2017-11-18       Impact factor: 3.576

3.  A Novel Friendly Jamming Scheme in Industrial Crowdsensing Networks against Eavesdropping Attack.

Authors:  Xuran Li; Qiu Wang; Hong-Ning Dai; Hao Wang
Journal:  Sensors (Basel)       Date:  2018-06-14       Impact factor: 3.576

  3 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.