Activity Modelling and Countermeasures on Jamming Attack

نویسندگان

  • Sachin D. Babar
  • Neeli R. Prasad
  • Ramjee Prasad
چکیده

In last few decades, there has been a wide demand of wireless sensor networks (WSNs) in extensive mission critical applications such as monitoring, industrial control, military, health and many more. The larger demand of WSN in mission critical applications makes it more prone towards malicious users who are trying to invade. These security assaults worsen the performance of WSN in large extent in terms of energy consumption, throughput, and delay. Therefore, it is necessary to save the WSN from these attacks. The major aim of researchers working on WSN security is to enhance the performance of WSN in presence of these attacks. The major concentration of this paper is to model the behaviour of different kinds of jamming attacks using activity modelling and to find countermeasure against it. Jamming attack is the one of the ruinous invasion which blocks the channel by introducing larger amount of noise packets in a network. The activity modelling of jamming attack gives the perfect understanding of its accomplishment on WSN and it is useful to develop the security countermeasure against the attack. This paper also gives the survey of different countermeasures of WSN and proposes the new countermeasure on jamming attack. The paper suggests the Threshold based Jamming Countermeasure (TJC) on reactive jamming attack which detects the jamming in network and save the network against reactive jamming attack. The implementation of proposed mechanism in different realistic conditions shows that TJC saves the network in case of reactive Journal of Cyber Security and Mobility, Vol. 2, 1–27. c © 2013 River Publishers. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs

To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...

متن کامل

Mitigating jamming attacks in mobile cognitive networks through time hopping

5G wireless networks will support massive connectivity mainly due to device-to-device communications. An enabling technology for device-to-device links is the dynamical spectrum access. The devices, which are equipped with cognitive radios, are to be allowed to reuse spectrum occupied by cellular links. The dynamical spectrum availability makes cognitive users switch between channels. Switching...

متن کامل

Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks

Multi-radio (multi-interface, multi-channel) 802.11 and sensor networks have been proposed to increase network capacity and to reduce energy consumption, to name only a few of their applications. They are vulnerable, however, to jamming attacks, in which attackers block communication by radio interference or MAC-protocol violation. Two jamming countermeasures have been proposed, namely software...

متن کامل

Vulnerability Analysis and Countermeasures for WiFi-based Location Services and Applications

Wireless LANs, or WiFi, are very common in any household or business today. Their wireless nature allows mobility and convenience for the user and that opens up a lot of new possibilities in mobile devices such as smartphones and tablets. One application that makes use of wireless LANs is positioning, which can be used in areas where Global Positioning Systems may have trouble functioning or no...

متن کامل

GPS Jamming Detection in UAV Navigation Using Visual Odometry and HOD Trajectory Descriptor

Auto-navigating of unmanned aerial vehicles (UAV) in the outdoor environment is performed by using the Global positioning system (GPS) receiver. The power of the GPS signal on the earth surface is very low. This can affect the performance of GPS receivers in the environments contaminated with the other source of radio frequency interference (RFI). GPS jamming and spoofing are the most serious a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013