| Literature DB >> 31159187 |
Carolina Del-Valle-Soto1, Carlos Mex-Perera2, Ivan Aldaya3, Fernando Lezama4, Juan Arturo Nolazco-Flores5, Raul Monroy6.
Abstract
In this work, two new self-tuning collaborative-based mechanisms for jamming detection are proposed. These techniques are named (i) Connected Mechanism and (ii) Extended Mechanism. The first one detects jamming by comparing the performance parameters with respect to directly connected neighbors by interchanging packets with performance metric information, whereas the latter, jamming detection relays comparing defined zones of nodes related with a collector node, and using information of this collector detects a possible affected zone. The effectiveness of these techniques were tested in simulated environment of a quadrangular grid of 7 × 7, each node delivering 10 packets/sec, and defining as collector node, the one in the lower left corner of the grid. The jammer node is sending packets under reactive jamming. The mechanism was implemented and tested in AODV (Ad hoc On Demand Distance Vector), DSR (Dynamic Source Routing), and MPH (Multi-Parent Hierarchical), named AODV-M, DSR-M and MPH-M, respectively. Results reveal that the proposed techniques increase the accurate of the detected zone, reducing the detection of the affected zone up to 15% for AODV-M and DSR-M and up to 4% using the MPH-M protocol.Entities:
Keywords: detection and mitigation jamming; performance metrics; wireless sensor networks
Year: 2019 PMID: 31159187 PMCID: PMC6603528 DOI: 10.3390/s19112489
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Network grid.
Simulation and real network parameters. CSMA/CA, carrier sense multiple access with collision avoidance [31].
| Parameter | Value |
|---|---|
|
| |
| Sensitivity threshold receiver | −94 dBm |
| Transmission power | 4.5 dBm |
| Propagation model | Free Space |
|
| |
| Waiting time for ACK packet | 30 ms |
| Maximum retransmission number | 3 |
| Maximum retry number | 5 |
| Maximum number of tries to reach a node from the collector | 9 |
| Packet error rate | 1% |
| Average frame length | 22 bytes |
| Maximum number of backoffs | 4 |
| MAC protocol | IEEE 802.15.4 |
| MAC layer | CSMA/CA |
|
| |
| Number of nodes | 49 |
| Maximum number of neighbors | 16 |
| Discovery neighbor time | 30 s |
| Update time neighbors table | 30 ms |
| Maximum data rate | 250 kbps |
| Routing | Hierarchical |
| Scenario | Static nodes |
Figure 2Three scenarios using the detection technique over MPH protocol.
Detection of affected zone and false positives.
| Position | Scenario 1 | Scenario 2 | Scenario 3 | |||
|---|---|---|---|---|---|---|
| Affected Area | False Positives | Affected Area | False Positives | Affected Area | False Positives | |
| Near | 100% | 18% | 75% | 29% | 100% | 8% |
| Middle | 100% | 8% | 100% | 22% | 100% | 4% |
| Far | 100% | 8% | 75% | 39% | 100% | 4% |
Figure 3Connected vs extended mechanisms over MPH protocol under the Scenario 3.
Figure 4Connected vs extended mode under maximum packet loss.
Figure 5Connected vs extended mode under high traffic.
Energy Model [36].
| Voltage (mV) | Current (mA) | Time (ms) | Energy (J) | |
|---|---|---|---|---|
| Start-up mode | 120 | 12 | 0.2 |
|
| MCU (32-MHz clock) | 75 | 7.5 | 1.7 |
|
| CSMA/CA algorithm | 270 | 27 | 1.068 |
|
| Switch from RX to TX | 140 | 14 | 0.2 |
|
| Switch from TX to RX | 250 | 25 | 0.2 |
|
| Radio in RX mode | 250 | 25 | 4.1915 |
|
| Radio in TX mode | 320 | 32 | 0.58 |
|
| Shut down mode | 75 | 7.5 | 2.5 |
|
Energy consumption for each detection mechanism.
| Type of Energy | Connected Mechanism Energy (J) | Extended Mechanism Energy (J) |
|---|---|---|
|
| 0.0172 | 0.0144 |
|
| 0.1338 | 0.0960 |
|
| 0.8021 | 0.7982 |
|
| 0.0509 | 0.0411 |
|
| 0.2156 | 0.2268 |
|
| 0.1062 | 0.0923 |
|
| 0.0809 | 0.0749 |
Figure 6Network links with irregular traffic.
Figure 7Comparison of energy per node under stable and attacked conditions.
Figure 8Comparison for AODV, DSR, and MPH protocols under Scenario 3.
Performance metrics under attack and Scenario 3 when the jammer is in the middle of the topology.
| Retransmissions | CSMA Retries | Delay End-to-End (sec) | Resilience Capacity (%) | Affected Nodes | Energy (J) | |
|---|---|---|---|---|---|---|
|
| 2.52 | 3.44 | 1.398463 | 80 | 18 | 6.4 |
|
| 2.47 | 3.33 | 1.284773 | 75 | 13 | 6.0 |
|
| 1.93 | 2.60 | 0.811836 | 85 | 9 | 3.9 |
Figure 9Energy per node under each protocol.
Figure 10Comparison of energy distribution for AODV, DSR, and MPH protocols under Scenario 3.
Performance metrics under Extended Mechanism and Connected Mechanism for a non-uniform random distribution.
| Retransmissions | CSMA Retries | Delay End-to-End (sec) | Resilience (sec) | Overhead (%) | Energy (J) | |
|---|---|---|---|---|---|---|
|
| 2.92 | 4.44 | 1.473984 | 8.1 | 50 | 6.82 |
|
| 2.30 | 4.12 | 1.258736 | 7.3 | 46 | 6.30 |
|
| 2.13 | 4.02 | 1.190286 | 7.1 | 43 | 6.22 |
|
| 2.80 | 4.30 | 1.387409 | 7.3 | 43 | 6.51 |
|
| 2.27 | 3.98 | 1.248273 | 5.0 | 39 | 6.23 |
|
| 2.16 | 3.90 | 1.188223 | 4.8 | 35 | 6.17 |
|
| 2.44 | 3.82 | 0.687308 | 3.2 | 28 | 4.08 |
|
| 2.14 | 3.60 | 0.518376 | 3.0 | 25 | 3.86 |
|
| 2.06 | 3.49 | 0.441029 | 2.8 | 22 | 3.70 |
|
| 2.50 | 3.90 | 0.598461 | 2.8 | 30 | 3.89 |
|
| 2.55 | 3.88 | 0.568326 | 2.5 | 26 | 3.72 |
|
| 2.52 | 3.83 | 0.548705 | 2.6 | 25 | 3.68 |
AODV-M is modified AODV; DSR-M is modified DSR; MPH-M is modified MPH; ZTR-M is modified ZTR.
Contributions of each algorithm.
| Feature | Proposed Mechanism in This Work | Algorithm Cited in [ |
|---|---|---|
| New type of nodes | Marked nodes | Honeynodes |
| Function of nodes | Encircle the jammer node | Try to attract jammers |
| Protection of the coordinator node | Isolate the attack until the jammer node decreases its energy | Hybrid proactive and reactive frequency selection |
| Operation | Proactive and reactive jamming | Proactive and reactive jamming |
| Detected attack | The nodes affected by their performance metrics isolate the jammer node | Predefined pseudorandom sequence for the selection of the next frequency |
Figure 11Network configuration for comparison of algorithms under experimentation.
Comparison of the algorithms: presented in this work and the cited in [19].
| Algorithm | Jammed Duration (sec) | Message Overhead(%) | PDR(%) | Energy (J) |
|---|---|---|---|---|
| Connected algorithm | 2.2 | 100 | 94.0 | 2.345 |
| Extended algorithm | 1.7 | 80 | 95.1 | 2.027 |
| Algorithm cited in [ | 2.1 | 94 | 96.3 | 2.158 |