Design and evaluation of a query-based jamming detection algorithm for wireless sensor networks

Jamming attacks, which are the main cause of data corruption and network blockages in wireless sensor networks (WSNs), are one of the most serious threats for WSNs. This type of attack not only blocks the ongoing communication in the network, but also causes the wireless nodes to exhaust their energy much earlier than expected. A countermeasure must be deployed against jamming attacks, especially in military and medical applications in which security breaches cannot be tolerated. In this paper, we have designed a new query-based jamming detection algorithm (QUJDA) to detect jamming attacks occurring in WSNs. QUJDA is an attack detection mechanism, which uses an anomaly-based approach and operates in a distributed manner. It separates attacking cases from natural network conditions by the help of packet delivery ratio, bad packet ratio, and the amount of energy consumption parameters. QUJDA enables sensor nodes to operate with their neighbors in a collective sense in order to achieve higher detection rates. QUJDA was evaluated and analyzed over 3 parameters: detection rates, false-positive rates, and communication overheads. According to the simulation results obtained, all critical jamming attacks can be detected with 97% or above detection rates, along with 0.95% or lower false positive rates. In addition, QUJDA only charges about 13% extra communication overhead to the network message traffic of the sensor nodes.

Design and evaluation of a query-based jamming detection algorithm for wireless sensor networks

Jamming attacks, which are the main cause of data corruption and network blockages in wireless sensor networks (WSNs), are one of the most serious threats for WSNs. This type of attack not only blocks the ongoing communication in the network, but also causes the wireless nodes to exhaust their energy much earlier than expected. A countermeasure must be deployed against jamming attacks, especially in military and medical applications in which security breaches cannot be tolerated. In this paper, we have designed a new query-based jamming detection algorithm (QUJDA) to detect jamming attacks occurring in WSNs. QUJDA is an attack detection mechanism, which uses an anomaly-based approach and operates in a distributed manner. It separates attacking cases from natural network conditions by the help of packet delivery ratio, bad packet ratio, and the amount of energy consumption parameters. QUJDA enables sensor nodes to operate with their neighbors in a collective sense in order to achieve higher detection rates. QUJDA was evaluated and analyzed over 3 parameters: detection rates, false-positive rates, and communication overheads. According to the simulation results obtained, all critical jamming attacks can be detected with 97% or above detection rates, along with 0.95% or lower false positive rates. In addition, QUJDA only charges about 13% extra communication overhead to the network message traffic of the sensor nodes.

___

  • I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, “Wireless sensor networks: a survey”, Computer Networks, Vol. 38, pp. 393-422, 2002.
  • C. Hartung, J. Balasalle, R. Han, “Node compromise in sensor networks: The need for secure systems”, Tech. Rep. Technical Report, CU-CS-988-04, Department of Computer Science, University of Colorado at Boulder, 2004.
  • A.D. Wood, J.A. Stankovic, “Denial of service in sensor networks”, IEEE Computer, Vol. 35,pp. 54-62, 2002.
  • W. Xu, W. Trappe, Y. Zhang, T. Wood, “The feasibility of launching and detecting jamming attacks in wireless networks”, in: Proc. of ACM MobiHoc, pp. 46-57, 2005.
  • A. Wood, J. Stankovic, S. Son., “JAM: A jammed-area mapping service for sensor networks”, in: 24th IEEE Real-Time Systems Symposium, pp. 286-297, 2003.
  • Y.W. Law, P. Hartel, J. den Hartog, P. Havinga, “Link-layer jamming attacks on S-MAC”, in: 2nd European Workshop on Wireless Sensor Networks (EWSN 2005), pp. 217-225, 2005.
  • Y.W. Law, L. van Hoesel, J. Doumen, P. Hartel, P. Havinga, “Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols”, ACM Transactions on Sensor Networks (TOSN), Vol. 5, 2009.
  • A.D. Wood, J.A. Stankovic, G. Zhou, “DEEJAM: defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks”, SECON 2007, San Diego, California, 2007.
  • J. Zhao, R. Govindan, “Understanding packet delivery performance in dense wireless sensor networks”, in: Pro- ceedings of the First ACM SenSys, November 2003. www.omnetpp.org. CC1000, Single Chip Very Low Power RF Transceiver Datasheet online], Chipcon. http://focus.ti.com/lit/ds/symlink/cc1000.pdf (last accessed: 03.11.2009).
  • S. Chebrolu, A. Abraham, J.P. Thomas, “Feature deduction and ensemble design of intrusion detection systems”, Computers & Security, Vol. 24, pp. 295-307, 2005.
  • P. Garcia-Teodoro, J. Diaz-Verdejo, G. Macia-Fernandez, E. Vazquez, “Anomaly-based network intrusion detection: Techniques, systems and challenges”, Computers & Security, Vol. 28, pp. 18-28, 2008.
  • CrossBow Corporation, MICA2 Data Sheet [Online], http://www.xbow.com.MICA2 data sheet. W. Ye, J. Heidemann, D. Estrin, “An energy-efficient MAC protocol for wireless sensor networks”, IEEE Infocom, New York, pp. 1567-1576, 2002.
  • E.Y.A. Lin, J.M. Rabaey, A. Wolisz, “Power-efficient rendez-vous schemes for dense wireless sensor networks”, in: Proceedings of ICC 2004, Paris, 2004.
  • M. C¸ akıro˘glu, A.T. ¨Ozcerit, “Jamming detection mechanisms for wireless sensor networks”, ACM Infoscale 2008,
  • Vico Equense, Italy, 4-6 June 2008.