| Literature DB >> 29794994 |
Opeyemi Osanaiye1, Attahiru S Alfa2,3, Gerhard P Hancke4.
Abstract
Wireless Sensor Networks (WSNs), in recent times, have become one of the most promising network solutions with a wide variety of applications in the areas of agriculture, environment, healthcare and the military. Notwithstanding these promising applications, sensor nodes in WSNs are vulnerable to different security attacks due to their deployment in hostile and unattended areas and their resource constraints. One of such attacks is the DoS jamming attack that interferes and disrupts the normal functions of sensor nodes in a WSN by emitting radio frequency signals to jam legitimate signals to cause a denial of service. In this work we propose a step-wise approach using a statistical process control technique to detect these attacks. We deploy an exponentially weighted moving average (EWMA) to detect anomalous changes in the intensity of a jamming attack event by using the packet inter-arrival feature of the received packets from the sensor nodes. Results obtained from a trace-driven simulation show that the proposed solution can efficiently and accurately detect jamming attacks in WSNs with little or no overhead.Entities:
Keywords: exponentially weighted moving average; inter-arrival time; jamming attack; wireless sensor networks
Year: 2018 PMID: 29794994 PMCID: PMC6021802 DOI: 10.3390/s18061691
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Cluster-based WSN topology.
Figure 2EWMA DoS jamming detection framework in WSN.
Detection parameters for different jamming attacks.
| Jamming Attacks |
|
| Mean |
| Detection Point (pck no) | |
|---|---|---|---|---|---|---|
| Jamming | Non-Jamming | |||||
| Constant | 20 | 20 | 0.2 | 0.0538 | 0.021 | 21st |
| Periodic | 50 | 50 | 0.2 | 0.0039 | 0.0129 | 51st |
| Reactive | 50 | 50 | 0.2 | 0.00313 | 0.0128 | 51st |
Figure 3EWMA plot of the IAT metric against packet number for constant jamming attack.
Figure 4EWMA plot of the IAT metric against packet number for periodic jamming attack.
Figure 5EWMA plot of the IAT metric against packet number for reactive jamming attack.
Comparison of jamming detection approaches in WSN.
| Approach | Detection Metrics | Jamming Attack Detected | Simulator | Accuracy |
|---|---|---|---|---|
| Error sample acquisition, interference detection and sequential jamming test [ | RSS | Reactive | COTS BTnodes and Tmote Sky nodes | For ≥16 jammed bits: 100% |
| Query-based jamming detection algorithm (QUJDA) [ | PDR, BPR and ECA | Reactive, Random, Constant, Cluster, Deceptive, Listen and Control | OMNET++ | 97% and above for varying jamming attacks. |
| Non-parametric cumulative sum (CUSUM) and weak estimation learning automata (WELA)-based scheme [ | Bad Partial-Packet Ratio, Partial Packet-RSS and Deviation of PPRSS | Reactive | Aqua-sim | High |
| Artificial Bee Colony [ | PDR, Energy, Distance, Packet Loss and RSS | Different Jamming attacks | MATLAB | High |
| Anomaly based Jamming Detection Algorithm (AJDA) [ | PDR, BPR and ECA | Reactive, Random, Constant and Deceptive | OMNET++ | ≥98.75% for varying jamming attacks |
| Our method (EWMA) | IAT | Reactive, Constant and Periodic | Trace-driven | For ≥20 jammed packets: 100% |