Stealth jamming attack in WSNs: effects and countermeasure

This paper explores a novel type of attack in wireless sensor networks-Stealth Jamming (SJAM), in which malicious nodes periodically generate bogus traffic in order to trigger false route breakages. More precisely, they target a relatively unexplored weakness inherent in the route maintenance mechan...

Full description

Saved in:
Bibliographic Details
Main Authors: Ahmed, Adnan, Ashraf, Usman, Tunio, Fatima, Abu Bakar, Kamalrulnizam, AL-Zahrani, Mohammed Saeed
Format: Article
Published: IEEE Xplore Digital Library 2018
Subjects:
Online Access:http://eprints.utm.my/id/eprint/84294/
https://doi.org/10.1109/JSEN.2018.2852358
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
id my.utm.84294
record_format eprints
spelling my.utm.842942019-12-28T01:46:24Z http://eprints.utm.my/id/eprint/84294/ Stealth jamming attack in WSNs: effects and countermeasure Ahmed, Adnan Ashraf, Usman Tunio, Fatima Abu Bakar, Kamalrulnizam AL-Zahrani, Mohammed Saeed QA75 Electronic computers. Computer science This paper explores a novel type of attack in wireless sensor networks-Stealth Jamming (SJAM), in which malicious nodes periodically generate bogus traffic in order to trigger false route breakages. More precisely, they target a relatively unexplored weakness inherent in the route maintenance mechanism of ad hoc protocols used by trust-aware routing schemes. Missing a certain number of transmission attempts at the data link layer is typically considered as the link, and consequently route breakage. In this attack, malicious nodes silently listen to the wireless channel, and if the busy airtime (indicative of wireless congestion) exceeds a certain threshold, it starts injecting gratuitous fake broadcast messages for a brief duration, thereby leading to excessive collisions for a transient period and leading to failed transmissions and route breakages, significantly degrading network performance. SJAM is difficult to detect, because the malicious nodes are active only if congestion exceeds a threshold and then only periodically. It is difficult to discern these attacks from genuine route breakages, which are also quite common. In this paper, we explore this type of attack and propose an intelligent cross-layered scheme for mitigating these attacks, thereby improving route stability, throughput, and delay performance. We discuss how enhanced route maintenance in existing trust-aware routing solutions ensures wide applicability of the solution. Simulation results demonstrate the improved network performance when compared with the state-of-the-art solutions. IEEE Xplore Digital Library 2018 Article PeerReviewed Ahmed, Adnan and Ashraf, Usman and Tunio, Fatima and Abu Bakar, Kamalrulnizam and AL-Zahrani, Mohammed Saeed (2018) Stealth jamming attack in WSNs: effects and countermeasure. IEEE Sensors Journal, 18 (17). pp. 7106-7113. ISSN 1530-437X https://doi.org/10.1109/JSEN.2018.2852358
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Ahmed, Adnan
Ashraf, Usman
Tunio, Fatima
Abu Bakar, Kamalrulnizam
AL-Zahrani, Mohammed Saeed
Stealth jamming attack in WSNs: effects and countermeasure
description This paper explores a novel type of attack in wireless sensor networks-Stealth Jamming (SJAM), in which malicious nodes periodically generate bogus traffic in order to trigger false route breakages. More precisely, they target a relatively unexplored weakness inherent in the route maintenance mechanism of ad hoc protocols used by trust-aware routing schemes. Missing a certain number of transmission attempts at the data link layer is typically considered as the link, and consequently route breakage. In this attack, malicious nodes silently listen to the wireless channel, and if the busy airtime (indicative of wireless congestion) exceeds a certain threshold, it starts injecting gratuitous fake broadcast messages for a brief duration, thereby leading to excessive collisions for a transient period and leading to failed transmissions and route breakages, significantly degrading network performance. SJAM is difficult to detect, because the malicious nodes are active only if congestion exceeds a threshold and then only periodically. It is difficult to discern these attacks from genuine route breakages, which are also quite common. In this paper, we explore this type of attack and propose an intelligent cross-layered scheme for mitigating these attacks, thereby improving route stability, throughput, and delay performance. We discuss how enhanced route maintenance in existing trust-aware routing solutions ensures wide applicability of the solution. Simulation results demonstrate the improved network performance when compared with the state-of-the-art solutions.
format Article
author Ahmed, Adnan
Ashraf, Usman
Tunio, Fatima
Abu Bakar, Kamalrulnizam
AL-Zahrani, Mohammed Saeed
author_facet Ahmed, Adnan
Ashraf, Usman
Tunio, Fatima
Abu Bakar, Kamalrulnizam
AL-Zahrani, Mohammed Saeed
author_sort Ahmed, Adnan
title Stealth jamming attack in WSNs: effects and countermeasure
title_short Stealth jamming attack in WSNs: effects and countermeasure
title_full Stealth jamming attack in WSNs: effects and countermeasure
title_fullStr Stealth jamming attack in WSNs: effects and countermeasure
title_full_unstemmed Stealth jamming attack in WSNs: effects and countermeasure
title_sort stealth jamming attack in wsns: effects and countermeasure
publisher IEEE Xplore Digital Library
publishDate 2018
url http://eprints.utm.my/id/eprint/84294/
https://doi.org/10.1109/JSEN.2018.2852358
_version_ 1654960067616702464