| Literature DB >> 32325646 |
Muhammad Adil1, Mohammed Amin Almaiah2, Alhuseen Omar Alsayed3, Omar Almomani4.
Abstract
Wireless Sensor Networks (WSNs) are vulnerable to various security threats. One of the most common types of vulnerability threat is the jamming attack, where the attacker uses the same frequency signals to jam the network transmission. In this paper, an edge node scheme is proposed to address the issue of jamming attack in WSNs. Three edge nodes are used in the deployed area of WSN, which have different transmission frequencies in the same bandwidth. The different transmission frequencies and Round Trip Time (RTT) of transmitting signal makes it possible to identify the jamming attack channel in WSNs transmission media. If an attacker jams one of the transmission channels, then the other two edge nodes verify the media serviceability by means of transmitting information from the same deployed WSNs. Furthermore, the RTT of the adjacent channel is also disturbed from its defined interval of time, due to high frequency interference in the adjacent channels, which is the indication of a jamming attack in the network. The simulation result was found to be quite consistent during analysis by jamming the frequency channel of each edge node in a step-wise process. The detection rate of jamming attacks was about 94% for our proposed model, which was far better than existing schemes. Moreover, statistical analyses were undertaken for field-proven schemes, and were found to be quite convincing compared with the existing schemes, with an average of 6% improvement.Entities:
Keywords: WSNs; authentication; bandwidth; edge nodes; frequency division multiplexing; jamming attacks; security
Year: 2020 PMID: 32325646 PMCID: PMC7219244 DOI: 10.3390/s20082311
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Limitation overview of existing literature to prevent jamming attacks in Wireless Sensor Networks (WSNs).
| Scheme Name |
|
|
|
|
|---|---|---|---|---|
| Zhang et al. [ | Homogeneous system | Complex to implement in real environment | High network overhead | Yes, in homogeneous networks |
| Feng et al. [ | Not specific to the system | Complex to implement and maintain in real WSNs infrastructure | High | Yes |
| Tang et al. [ | Yes | Normal to implement & maintain | Minimum for specific system such as Mobile robots | Yes |
| Sharma et al. [ | Suitable for all systems | Complex to maintain in real environment | High network overhead, due to behavior based authentication | Not very effective in real environment to maintain high security standard, due to external interferences |
| Ma et al. [ | Designed for specific for USVS | Designed for WSNs environment | Normal network overhead | Maintenance of high security standard is still challenging. |
Figure 1Step by step implementation process of our scheme in flowchart diagram.
Figure 2Channel categorization of edge node transmission for deployed WSNs.
Parameters used in proposed scheme implementation.
| Name of Parameter | Values of Parameters |
|---|---|
| Simulation Environment | 850 × 850 |
| Simulation Tool | OMNeT++ |
| Wireless nodes | 100, 200, 500, 1000 |
| Infrastructure of the Network topology | Random Deployment |
| Jamming attacks detection | Check for individual channel and rival schemes |
| Channel categorization | Three different transmission channels |
| RTT Threshold value | 15 |
| Idle power consumption | 1.2 |
| Type of attacks | Jamming attacks |
| Channel Delay | 2 |
| Initial hop count of sensor nodes | 0 |
| Edge nodes | 3 |
| Initial Energy of sensor nodes | 25,000 mAh |
| Bandwidth | 10 Mbps |
| Channel Bandwidth | 3 Mbps |
| Consumed energy during transmission of a packet ( | 75.6 mW |
| Energy consumption during Sleep mode | 0.7 |
| residual energy ( | Total energy of ( |
| Transmission range | 120 M |
| Network Traffic type | UDP and CBR |
| Size of Packet | 128 Kbps |
Figure 3Channel 1 jamming attacks detection statistics.
Figure 4Channel 2 jamming attacks detection statistics.
Figure 5Channel 3 jamming attacks detection statistics.
Figure 6Brief statistical analysis of our scheme and its rival schemes by means of detecting attacks.
Figure 7End to End delay brief statistical analysis of our scheme and rival schemes.
Figure 8Through-put statistical analysis of our scheme and rival schemes.