Topology control in the presence of jammers for wireless sensor networks
Prasenjit Bhavathankar
Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, Kharagpur, India
Search for more papers by this authorAyan Mondal
Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, Kharagpur, India
Search for more papers by this authorCorresponding Author
Sudip Misra
Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, Kharagpur, India
Correspondence
Sudip Misra, Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, India.
Email: [email protected]
Search for more papers by this authorPrasenjit Bhavathankar
Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, Kharagpur, India
Search for more papers by this authorAyan Mondal
Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, Kharagpur, India
Search for more papers by this authorCorresponding Author
Sudip Misra
Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, Kharagpur, India
Correspondence
Sudip Misra, Department of Computer Science and Engineering, Indian Institute of Technology, Kharagpur, India.
Email: [email protected]
Search for more papers by this authorSummary
In this paper, the problem of ensuring packet delivery ratio and high network lifetime in wireless sensor networks in the presence of single or multiple jammers is studied using single-leader-multiple-followers Stackelberg game theory. A topology control scheme is proposed, in which the sink node, which acts as the leader, identifies the set of jamming affected nodes. On the other hand, the sensor nodes, which act as followers, need to decide an optimum transmission power level, while ensuring an optimal set of neighbor nodes covered. A scheme, named TC-JAM, for ensuring packet delivery ratio, while avoiding jammers and increasing network lifetime in wireless sensor networks, is proposed. In existing literatures, the sensor nodes are envisioned to be equipped with multiple interfaces, while having access for multiple channels. However, in TC-JAM, the sensor nodes have simple hardware with single interface for communication, ie, the sensor nodes have single channel for communication. Additionally, in the proposed scheme, TC-JAM, each sensor node has a provision to vary its transmission power according to the chosen strategies. Using TC-JAM, the energy consumption of the overall network reduces by up to 62%, and the network lifetime increases by 56% to 73%.
REFERENCES
- 1Martins D, Guyennet H. Wireless Sensor Network Attacks and Security Mechanisms: A Short Survey. Proceedings of the 13th International Conference on Network-Based Information Systems. Takayama, Gifu, Japan; 2010: 313–320.
- 2Grover K, Lim A, Yang Q. Jamming and Anti-jamming Techniques in Wireless Networks: A Survey. Int J Ad Hoc Ubiquitous Comput. 2014; 17(4): 197–215.
- 3Vadlamani S, Eksioglu B, Medal H, Nandi A. Jamming Attacks on Wireless Networks: A Taxonomic Survey. Int J Prod Econ. 2016; 172: 76–94.
- 4Mpitziopoulos A, Gavalas D, Konstantopoulos C, Pantziou G. A Survey on Jamming Attacks and Countermeasures in WSNs. IEEE Commun Surv Tutor. 2009 Fourth Quarter; 11(4): 42–56.
- 5Falahati A, Sanandaji N. Nested and Interleaved Direct Sequence Spread Spectrum to Enhance CDMA Security and Bit Error Rate Performance. Int J Commun Syst. 2016; 29(12): 1907–1915.
- 6Bras L, Carvalho NB, Pinho P. Pentagonal Patch-Excited Sectorized Antenna for Localization Systems. IEEE Trans Antennas Propags. 2012; 60(3): 1634–1638.
- 7Javed I, Loan A, Mahmood W. An Energy-Efficient Anti-Jam Cognitive System for Wireless OFDM Communication. Int J Commun Syst. 2014; 27(11): 3460–3487.
- 8Weber SP, Yang X, Andrews JG, de Veciana G. Transmission Capacity of Wireless Ad-Hoc Networks with Outage Constraints. IEEE Trans Inf Theory. 2005DecEMBER; 51(12): 4091–4102.
- 9Dhurandher SK, Misra S, Agrawal D, Rayankula A. Using Honeynodes along with Channel Surfing for Defense against Jamming Attacks in Wireless Networks. The Third International Conference on Systems and Networks Communications. Sliema, Malta; 2008: 197–201.
- 10Skiani ED, Mitilineos SA, Thomopoulos SA. A Study of the Performance of Wireless Sensor Networks Operating with Smart Antennas. IEEE Antennas Propag Mag. 2012; 54(3): 50–67.
- 11Khatua M, Misra S. CURD: Controllable Reactive Jamming Detection in Underwater Sensor Networks. Pervasive Mob Comput. 2014; 13: 203–220.
- 12Lall S, Maharaj B, van Vuuren P. J. Null-frequency Jamming of a Proactive Routing Protocol in Wireless Mesh Networks. J Net Comput Appli. 2016; 61: 133–141.
- 13Ma K, Zhang Y, Trappe W. Mobile Network Management and Robust Spatial Retreats Via Network Dynamics. IEEE International Conference on Mobile ADHOC and Sensor Systems. Washington, DC; 2005: 1–8.
- 14Ojha T, Misra S. MobiL: A 3-dimensional localization scheme for Mobile Underwater Sensor Networks. National Conference on Communications. Delhi, India; 2013: 1–5.
- 15Misra S, Dhurandher SK, Rayankula A, Agrawal D. Using honeynodes for defense against jamming attacks in wireless infrastructure-based networks. Comput Electr Eng. 2010; 36(2): 367–382.
- 16Zhang Z, Mukherjee A. Friendly channel-oblivious jamming with error amplification for wireless networks. Proceedings of the 35th Annual IEEE International Conference on Computer Communications. San Francisco, CA, USA; 2016: 1–9.
- 17Garnaev A, Liu Y, Trappe W. Anti-jamming Strategy Versus a Low-Power Jamming Attack When Intelligence of Adversary Attack Type is Unknown. IEEE Trans Signal Inform Process over Netw. 2016; 2(1): 49–56.
- 18Xiao L, Chen T, Liu J, Dai H. Anti-Jamming Transmission Stackelberg Game With Observation Errors. IEEE Commun Lett. 2015; 19(6): 949–952.
- 19Sheikholeslami A, Ghaderi M, Pishro-Nik H, Goeckel D. Energy-Efficient Routing in Wireless Networks in the Presence of Jamming. IEEE Trans Wireless Commun. 2016; 15(10): 6828–6842.
- 20Hamouda S, El-Bessi S, Tabbane S. New Coalition Formation Game for Spectrum Sharing in Cognitive Radio Networks. Int J Commun Syst. 2016; 29(10): 1605–1619.
- 21Khan Z, Lehtomäki J, Vasilakos AV, MacKenzie AB, Juntti M. Adaptive Wireless Communications under Competition and Jamming in Energy Constrained Networks. Wireless Networks. 2016: 1–21.
- 22Fang S, Liu Y, Ning P. Wireless Communications under Broadband Reactive Jamming Attacks. IEEE Trans Dependable Secure Comput. 2016; 13(3): 394–408.
- 23Vilela JP, Bloch M, Barros J, McLaughlin SW. Wireless Secrecy Regions With Friendly Jamming. IEEE Trans Inf Forensics Secur. 2011; 6(2): 256–266.
- 24Noubir G. On Connectivity in Ad Hoc Networks under Jamming Using Directional Antennas and Mobility. Proceedings of the 2nd International Conference Wired/Wireless Internet Communications, Berlin, Heidelberg; 2004: 186–200.
- 25Li G, He Z, Xing C, Chen C, Liao Q. QoS-Based Anti-Jamming Algorithm Design for Distributed Wireless Networks. Proceedings of International Conference on Wireless Communications Signal Processing (WCSP). Hangzhou, China; 2013: 1–5.
- 26He X, Dai H, Ning P. Dynamic Adaptive Anti-Jamming via Controlled Mobility. IEEE Trans Wireless Commun. 2014; 13(8): 4374–4388.
- 27Amuru S, Buehrer RM. Optimal Jamming Against Digital Modulation. IEEE Trans Inf Forensics Secur. 2015; 10(10): 2212–2224.
- 28Baidas MW, Afghah MM. Energy-Efficient Partner Selection in Cooperative Wireless Networks: A Matching-Theoretic Approach. Int J Commun Syst. 2016; 29(8): 1451–1470.
- 29Nguyen VD, Duong TQ, Dobre O, Shin OS. Joint Information and Jamming Beamforming for Secrecy Rate Maximization in Cognitive Radio Networks. IEEE Trans Inf Forensics Secur. 2016. doi: 10.1109/TIFS.2016.2594131
- 30Li Y, Wang C, Zhao W, You X. The Jamming Problem in IEEE 802.11-based Mobile Ad Hoc Networks with Hidden Terminals: Performance Analysis and Enhancement. Int J Commun Syst. 2009; 22(8): 937–958.
- 31Tague P. Improving Anti-Jamming Capability and Increasing Jamming Impact with Mobility Control. Proceedings of IEEE 7th International Conference on Mobile ADHOC and Sensor Systems. San Francisco, CA, USA; 2010: 501–506.
- 32Wood AD, Stankovic JA, Son SH. JAM: A Jammed-Area Mapping Service for Sensor Networks. Proceedings of the 24th IEEE Real-Time Systems Symposium. Porto, Portugal; 2003: 286–297.
- 33Azim A, Mahiba S, Sabbir TAK, Ahmad S. Efficient Jammed Area Mapping in Wireless Sensor Networks. IEEE Embedded Sys Lett. 2014; 6(4): 93–96.
10.1109/LES.2014.2365575 Google Scholar
- 34Misra S, Singh R, Mohan SVR. Geomorphic Zonalisation of Wireless Sensor Networks Based on Prevalent Jamming Effects. IET Commun. 2011; 5(12): 1732–1743.
- 35Li M, Koutsopoulos I, Poovendran R. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks. IEEE Trans Mob Comput. 2010; 9(8): 1119–1133.
- 36Xu W, Wood T, Trappe W, Zhang Y. Channel Surfing and Spatial Retreats: Defenses Against Wireless Denial of Service. Proceedings of the 3rd ACM Workshop On Wireless Security, New York, NY, USA; 2004: 80–89.
- 37Mpitziopoulos A, Gavalas D, Konstantopoulos C, Pantziou G. JAID: An Algorithm for Data Fusion and Jamming Avoidance on Distributed Sensor Networks. Pervasive Mob Comput. 2009; 5(2): 135–147.
- 38Ye W, Heidemann J, Estrin D. An Energy-Efficient MAC Protocol for Wireless Sensor Networks. Proceedings of IEEE Infocom 2002, vol. 3. New York, NY, USA; 2002: 1567–1576.
- 39Ye W, Heidemann J, Estrin D. Medium Access Control with Coordinated Adaptive Sleeping for Wireless Sensor Networks. IEEE/ACM Trans Networking. 2004; 12(3): 493–506.
- 40Hanif DS, Frederic HM, Allen LS. Stackelberg-Nash-Cournot Equilibria: Characterizations and Computations. Oper Res. 1983; 31(2): 253–276.
- 41Misra S, Ojha T, Mondal A. Game-Theoretic Topology Controlfor Opportunistic Localization in Sparse Underwater Sensor Networks. IEEE Trans Mob Comput. 2015; 14(5): 990–1003.
- 42Jembre YZ, Choi YJ. Beacon-based Channel Assignment and Jammer Mitigation for MANETs with Multiple Interfaces and Multiple Channels. Comput Commun. 2016; 78(C): 74–85.
- 43Misra S, Mali G, Mondal A. Distributed Topology Management for Wireless Multimedia Sensor Networks: Exploiting Connectivity and Cooperation. Int J Commun Syst. 2015; 28(7): 1367–1386.
- 44Heinzelman WR, Chandrakasan A, Balakrishnan H. Energy-Efficient Communication Protocol for Wireless Microsensor Networks. Proceedings of the 33rd Annual Hawaii International Conference on System Sciences. Hawaii, USA; 2000: 1–10.