Stealth jamming attack in WSNs: effects and countermeasure
This paper explores a novel type of attack in wireless sensor networks-Stealth Jamming (SJAM), in which malicious nodes periodically generate bogus traffic in order to trigger false route breakages. More precisely, they target a relatively unexplored weakness inherent in the route maintenance mechan...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Published: |
IEEE Xplore Digital Library
2018
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/84294/ https://doi.org/10.1109/JSEN.2018.2852358 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Malaysia |
id |
my.utm.84294 |
---|---|
record_format |
eprints |
spelling |
my.utm.842942019-12-28T01:46:24Z http://eprints.utm.my/id/eprint/84294/ Stealth jamming attack in WSNs: effects and countermeasure Ahmed, Adnan Ashraf, Usman Tunio, Fatima Abu Bakar, Kamalrulnizam AL-Zahrani, Mohammed Saeed QA75 Electronic computers. Computer science This paper explores a novel type of attack in wireless sensor networks-Stealth Jamming (SJAM), in which malicious nodes periodically generate bogus traffic in order to trigger false route breakages. More precisely, they target a relatively unexplored weakness inherent in the route maintenance mechanism of ad hoc protocols used by trust-aware routing schemes. Missing a certain number of transmission attempts at the data link layer is typically considered as the link, and consequently route breakage. In this attack, malicious nodes silently listen to the wireless channel, and if the busy airtime (indicative of wireless congestion) exceeds a certain threshold, it starts injecting gratuitous fake broadcast messages for a brief duration, thereby leading to excessive collisions for a transient period and leading to failed transmissions and route breakages, significantly degrading network performance. SJAM is difficult to detect, because the malicious nodes are active only if congestion exceeds a threshold and then only periodically. It is difficult to discern these attacks from genuine route breakages, which are also quite common. In this paper, we explore this type of attack and propose an intelligent cross-layered scheme for mitigating these attacks, thereby improving route stability, throughput, and delay performance. We discuss how enhanced route maintenance in existing trust-aware routing solutions ensures wide applicability of the solution. Simulation results demonstrate the improved network performance when compared with the state-of-the-art solutions. IEEE Xplore Digital Library 2018 Article PeerReviewed Ahmed, Adnan and Ashraf, Usman and Tunio, Fatima and Abu Bakar, Kamalrulnizam and AL-Zahrani, Mohammed Saeed (2018) Stealth jamming attack in WSNs: effects and countermeasure. IEEE Sensors Journal, 18 (17). pp. 7106-7113. ISSN 1530-437X https://doi.org/10.1109/JSEN.2018.2852358 |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Ahmed, Adnan Ashraf, Usman Tunio, Fatima Abu Bakar, Kamalrulnizam AL-Zahrani, Mohammed Saeed Stealth jamming attack in WSNs: effects and countermeasure |
description |
This paper explores a novel type of attack in wireless sensor networks-Stealth Jamming (SJAM), in which malicious nodes periodically generate bogus traffic in order to trigger false route breakages. More precisely, they target a relatively unexplored weakness inherent in the route maintenance mechanism of ad hoc protocols used by trust-aware routing schemes. Missing a certain number of transmission attempts at the data link layer is typically considered as the link, and consequently route breakage. In this attack, malicious nodes silently listen to the wireless channel, and if the busy airtime (indicative of wireless congestion) exceeds a certain threshold, it starts injecting gratuitous fake broadcast messages for a brief duration, thereby leading to excessive collisions for a transient period and leading to failed transmissions and route breakages, significantly degrading network performance. SJAM is difficult to detect, because the malicious nodes are active only if congestion exceeds a threshold and then only periodically. It is difficult to discern these attacks from genuine route breakages, which are also quite common. In this paper, we explore this type of attack and propose an intelligent cross-layered scheme for mitigating these attacks, thereby improving route stability, throughput, and delay performance. We discuss how enhanced route maintenance in existing trust-aware routing solutions ensures wide applicability of the solution. Simulation results demonstrate the improved network performance when compared with the state-of-the-art solutions. |
format |
Article |
author |
Ahmed, Adnan Ashraf, Usman Tunio, Fatima Abu Bakar, Kamalrulnizam AL-Zahrani, Mohammed Saeed |
author_facet |
Ahmed, Adnan Ashraf, Usman Tunio, Fatima Abu Bakar, Kamalrulnizam AL-Zahrani, Mohammed Saeed |
author_sort |
Ahmed, Adnan |
title |
Stealth jamming attack in WSNs: effects and countermeasure |
title_short |
Stealth jamming attack in WSNs: effects and countermeasure |
title_full |
Stealth jamming attack in WSNs: effects and countermeasure |
title_fullStr |
Stealth jamming attack in WSNs: effects and countermeasure |
title_full_unstemmed |
Stealth jamming attack in WSNs: effects and countermeasure |
title_sort |
stealth jamming attack in wsns: effects and countermeasure |
publisher |
IEEE Xplore Digital Library |
publishDate |
2018 |
url |
http://eprints.utm.my/id/eprint/84294/ https://doi.org/10.1109/JSEN.2018.2852358 |
_version_ |
1654960067616702464 |