| Literature DB >> 35009729 |
Alejandro Cortés-Leal1, Carolina Del-Valle-Soto1, Cesar Cardenas2, Leonardo J Valdivia1, Jose Alberto Del Puerto-Flores1.
Abstract
The emergence of Industry 4.0 technologies, such as the Internet of Things (IoT) and Wireless Sensor Networks (WSN), has prompted a reconsideration of methodologies for network security as well as reducing operation and maintenance costs, especially at the physical layer, where the energy consumption plays an important role. This article demonstrates through simulations and experiments that, while the cooperative scheme is more efficient when a WSN is at normal operating conditions, the collaborative scheme offers more enhanced protection against the aggressiveness of jamming in the performance metrics, thus making it safer, reducing operation and maintenance costs and laying the foundations for jamming mitigation. This document additionally offers an algorithm to detect jamming in real time. Firstly, it examines the characteristics and damages caused by the type of aggressor. Secondly, it reflects on the natural immunity of the WSN (which depends on its node density and a cooperative or collaborative configuration). Finally, it considers the performance metrics, especially those that impact energy consumption during transmission.Entities:
Keywords: Industrial Internet of Things (IIoT); Industrial Wireless Sensor Networks; cooperative communication; jamming; security for IIoT
Year: 2021 PMID: 35009729 PMCID: PMC8749729 DOI: 10.3390/s22010178
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Types of jamming attacks.
| Types of Jammers | Saving of Energy | Proactive (P) or Reactive (R) | ||
|---|---|---|---|---|
| Elementary | Constant | P | ||
| Proactive | Deceptive | P | ||
| Random | ✓ | P | ||
| Reactive | Data/Ack (acknowledge) | R | ||
| Request to send (RTS)/Clear to send (CTS) | R | |||
| Advanced | Control Channel | ✓ | P and R | |
| Smart Hybrid | Implicit | ✓ | P and R | |
| Flow | ✓ | P and R | ||
| Function-Specific | Follow On | ✓ | P | |
| Channel Hopping | R | |||
| Pulsed Noise | P | |||
Overview of detection techniques.
| Detection Technique | Metrics | Description |
|---|---|---|
| PDR with consistency checks [ | PDR, packet sending ratio (PSR) and sensing time | Low PDR leads to the detection of jamming. Consistency checks are used. |
| Exponentially weighted moving average (EWMA) [ | Inter arrival time (IAT) | Statistical method using inter arrival times of packets. |
| Fuzzy interference system [ | SNR: packet dropped per terminal | This is followed by a confirmatory check and a 2-means clustering of neighborhood nodes. |
| Ant system [ | Hops, energy, distance, SNR, BER, PDR | The Ant collects data from various routes with which a destination is reached, indicating if there is a jammer. |
| Jammed-area mapping protocol [ | Clear channel assessment (CCA) | The number of unsuccessful attempts to capture wireless channel is counted; if the count is greater than 10, a jammer is detected. |
| Channel surfing and spatial retreat [ | CSMA, ambient noise levels | By measuring ambient noise levels, the detection is conducted at either MAC layer using CSMA or physical level. |
| Reactive detection [ | BER, RSSI | The RSSI of each bit is observed on reception. A high RSSI means that there is a jammer. |
| Trigger nodes identification [ | Curvilinear component analysis (CCA) | Techniques are integrated: the group testing, the disk cover and the clique-based clustering. |
| Fighting implicit jamming (FIJI) [ | Delay throughput | While non-jammed, the clients are unaffected, but while being jammed, the clients receive maximum throughput. |
| Cross-layer system [ | Frequency-hopping pattern | Detection is done when the transmitter uses additional test patterns during its transmission. |
| Control channel attack prevention [ | Hamming distance | Is a cross layer system that implements part of the system network module and part in the driver. |
| Game theoretic modeling [ | Request to send (RTS), network allocator value | Cluster retransmission of data using CSMA/CD (collision detection) and a network allocator value. |
Jamming symptoms.
| Type of Jamming | PDR | RSSI | Energy | BPR | SNR | BER |
|---|---|---|---|---|---|---|
| Constant |
|
|
| − | ≤1 | − |
| Deceptive |
|
|
| + | ≤1 | − |
| Random | − | + | + | + | ≤1 |
|
| Reactive | − | + | + | + | ≤1 |
|
Increases = “+”, increases a lot = “++”, decreases = “−”, decreases a lot = “−−”, oscillates = “+−”.
Figure 1WSN applications based on node density.
Figure 2Schemes for WSNs.
Figure 3Proposed detection mechanism.
Figure 4Proposed jamming detection algorithm.
Simulation parameters under CSMA/CA [55,56,57].
| Parameter | Value |
|---|---|
|
| |
| Sensitivity threshold | −85 dBm |
| Transmission power | 0 dBm |
|
| |
| Maximum retransmission number | 3 |
| Maximum retry number | 5 |
| Maximum number of tries to reach a node from the collector | 9 |
| Packet error rate (PER) | 1% to 4% |
| Average frame length | 22 bytes |
| Maximum number of back-offs | 4 |
| Packet frame size | 30 bytes |
| MAC protocol | IEEE 802.15.4 |
| MAC layer | CSMA/CA |
|
| |
| Maximum Bit Rate - Worldwide | 250 kbps |
| Scenario | Static nodes |
| Operational frequency band | 2.4 GHz (Worldwide ISM band) |
|
| |
| Network area | 500 m |
| Number of nodes | 50, 100, 200, 300, 400 and 500 |
| Sink location | Center |
|
| |
| Network area (m | 100, 300, 500, 1000, 5000, 10,000 |
| Number of nodes | 200 |
| Sink location | Center |
Energy model.
| Node Task or Activity | Voltage (mV) | Current (mA) | Time (ms) | Energy (J) | |
|---|---|---|---|---|---|
|
| Start-up mode | 120 | 12 | 0.2 | 0.000288 |
|
| MCU (32-MHz clock) | 75 | 7.5 | 1.7 | 0.000956 |
|
| CSMA/CA algorithm | 270 | 27 | 1.068 | 0.00778 |
|
| 140 | 14 | 0.2 | 0.000392 | |
|
| 250 | 25 | 0.2 | 0.00125 | |
|
| Reception mode | 250 | 25 | 4.1915 | 0.0262 |
|
| Transmission mode | 320 | 32 | 0.58 | 0.00426 |
|
| Shut down mode | 75 | 7.5 | 2.5 | 0.00141 |
Figure 5WSN location on campus within an area of 500 m.
Figure 6Distribution of the WSN nodes of the real experiment.
Experiment parameters.
| Parameter | Value |
|---|---|
| Experiment area | 500 m |
| Number of sensor nodes | 12 |
| Sink nodes | 1 |
| Topology | Grid |
| Node RAM | 128 KB |
| Normal voltage range | 1.8 V to 3.8 V |
| Bit architecture | 16 |
Figure 7Types of jamming varying the number of nodes.
Figure 8PDR for types of jamming in a WSN of 500 m with different number of nodes under collaborative and cooperative schemes.
Figure 9RSSI for types of jamming in a WSN of 500 m with different number of nodes under collaborative and cooperative schemes.
Figure 10Energy for types of jamming in a WSN of 500 m with different number of nodes under collaborative and cooperative schemes.
Figure 11PDR for types of jamming in a WSN of 200 nodes with different areas under collaborative and cooperative schemes.
Figure 12RSSI for types of jamming in a WSN of 200 nodes with different areas under collaborative and cooperative schemes.
Figure 13Energy for types of jamming in a WSN of 200 nodes with different areas under collaborative and cooperative schemes.
Experiment results.
| Jamming | PDR (%) | RSSI (−dBm) | Energy (J) | |||
|---|---|---|---|---|---|---|
|
|
|
|
|
|
| |
| Constant | 94 | 96 | −103 | −98 | 0.37 | 0.32 |
| Deceptive | 95 | 96 | −102 | −92 | 0.33 | 0.29 |
| Random | 95 | 97 | −87 | −84 | 0.26 | 0.21 |
| Reactive | 97 | 98 | −83 | −80 | 0.2 | 0.13 |
| No Jamming | 99 | 97 | −70 | −75 | 0.09 | 0.07 |
Figure 14RSSI results per node under a cooperative scheme.
Figure 15RSSI results per node under a collaborative scheme.
Figure 16LQI results per node under a cooperative scheme.
Figure 17LQI results per node under a collaborative scheme.
Data and data labels.
| Metric or Symptom |
| ||||
|---|---|---|---|---|---|
| Energy (J) | 0.37 | 0.33 | 0.26 | 0.2 | 0.09 |
| PDR (%) | 94 | 95 | 95 | 97 | 99 |
| RSSI (−dBm) | −103 | −102 | −87 | −83 | −70 |
Sorted data from smallest (A) to largest (E).
|
|
|
|
|
| |
| Energy (J) |
|
|
|
|
|
| 0.09 | 0.2 | 0.26 | 0.33 | 0.37 | |
|
|
|
|
|
| |
| PDR (%) |
|
|
|
|
|
| 94 | 95 | 95 | 97 | 99 | |
|
|
|
|
|
| |
| RSSI (−dBm) |
|
|
|
|
|
| −103 | −102 | −87 | −83 | −70 |
Decision threshold values.
|
|
|
|
|
|
|
|
|
| |
| Energy (J) |
|
|
|
|
| ||||
| 0.09 | 0.145 | 0.2 | 0.23 | 0.26 | 0.295 | 0.33 | 0.35 | 0.37 | |
|
|
|
|
|
|
|
|
|
| |
| PDR (%) |
|
|
|
|
| ||||
| 94 | 94.5 | 95 | 95 | 95 | 96 | 97 | 98 | 99 | |
|
|
|
|
|
|
|
|
|
| |
| RSSI (−dBm) |
|
|
|
|
| ||||
| −103 | −102.5 | −102 | −94.5 | −87 | −85 | −83 | −76.5 | −70 |
Figure 18Data threshold decisions.
Figure 19Data label decisions.
Figure 20Final steps.