Professional Documents
Culture Documents
Abstract—Nowadays, the Internet of Things concept is com- by separating the resulting behavior from the wireless envi-
posed of a scattered collection of different networks with different ronment and the network topology. When the performance
purposes that has nodes that capture information to be processed of the network decreases and the topology reconfigurations
and, subsequently, used for purposes such as Smart Cities. These
devices, called sensors, have the ability to send large amounts of are carried out constantly, this may indicate a possible at-
information in a fairly efficient, but insecure, wireless environ- tack. Currently, some detection techniques are based on basic
ment. Intentional interference, named jamming, has emerged as measurements of signal-to-noise ratio deterioration [4], RSSI
a source of growing concern in recent years. Since no or little (Received Signal Strength Indicator) or metrics such as packet
network information is required, this type of attack is extremely loss or packet delivery.
easy to implement but has become difficult to detect because of
its variations in interference frequency. Detection techniques are commonly adapted in WSN com-
In this document, we propose two new jamming detection munication protocols [5]. Among then, reactive protocols
mechanisms that can identify reactive jamming without any free [6] are heavily used in WSNs since they create a small
jam operation information, called Connected Mechanism and overhead of packets on the network and only create nodes
Extended Mechanism. The first one is based on the information when deemed necessary which enforces sending the minimum
of the performance metrics collected from the directly connected
nodes. In the second approach, a collector node knows the required amount of messages to the neighbor nodes. Therefore,
performance parameters of all nodes in the network and can the source node requires to find a route before sending a
make comparisons between them. Through extensive simulations, message thus it has a processing time before it can start. Two
we demonstrate that the first mechanism has an improved of the most common known reactive protocols are AODV and
performance of 78% and the second has an improved 86% DSR [7].
performance in detecting the area affected by an interference
node with a proactive protocol such as MPH (Multi-Parent In this paper, a new collaborative mechanism for jamming
Hierarchical) compared to well-known reactive protocols: AODV detection in WSNs based on cooperation by receiving feed-
(ad hoc distance distance vector) and DSR (dynamic origin back from other network nodes is here proposed. These two
routing). techniques are a new proposal of a work already elaborated
Index Terms—Detection jamming, energy, detection mecha- and published by the authors of this study, in the reference
nisms, performance metrics, Wireless Sensor Networks.
[8]. The two new techniques introduced in this work are free
training, that is, they do not require a previous learning step.
I. I NTRODUCTION
These techniques are: Connected Mechanism and Extended
1 1 1 1
that deliver information for the self-aware jamming algorithm: 1 2 3 4 5 6 7
0
1 2 3 4 5 6 7
0
1 2 3 4 5 6 7
0
1 2 3 4 5 6 7
0
5 2 5 2 5 2 5 2
the nodes are neighbors directly connected, and the values Scenario 2 4
3 1
4
3 1
4
3 1
4
3 1
2 2 2 2
of performance parameters are obtained from them in order 1
1 2 3 4 5 6 7
0 1
1 2 3 4 5 6 7
0
1
1 2 3 4 5 6 7
0 1
1 2 3 4 5 6 7
0
evaluation. In the extended group the included nodes are all Scenario 3
5
4
3
2
1
5
4
3
2
1
5
4
3
2
1
5
4
3
2
group 3 1 3 1 3 1 3 1
Number of nodes 49 2
1 0
2
1 0
2
1 0
2
1 0
1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7
Maximum number of neighbors 16
Discovery neighbor time 30 s
Update time neighbors table 30 ms 7
3
7
3
7
3
7
3
6 6 6 6
Maximum data rate 250 kbps Extended
group
5
4
2 5
4
2 5
4
2 5
4
2
3 1 3 1 3 1 3 1
Scenario Static nodes 2
1 0
2
1
0
2
1 0
2
1
0
1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7 1 2 3 4 5 6 7
A. Energy analysis as a comparison metric We must take into account that one of the main effects
of attacks on wireless sensor networks is the increase in
Another contribution of our work is our proposed energy
consumption in the attacked nodes, which reduces the useful
model capable of quantifying the total energy consumed and
life of the node and the network. Therefore, it is essential
the energy invested in the main activities of the nodes in a
to estimate the consumption impact of both the attacks and
network. This model is based on the time it takes each node
the strategies adopted to improve the system security. Table
to perform the main tasks as a part of a network. This time
V shows the energy consumption for each of the node’s main
is reflected into a consumed energy in each activity, and is
activities at network level. Each of the energies described here
calculated depending on the parameters involved in each task
are total energies for 30 seconds of simulation time and based
performed by the node. These times and its voltage and current
on the grid described in Table I.
consumption are listed in Table IV, where the different types of
energy considered are shown. Our work considers the energy B. Comparison among AODV, DSR, and MPH routing proto-
spent by the MAC and the Network layers. An analytical cols
model based on the CC2530 chip operation [16], system-on-
chip (SoC) solution for IEEE 802.15.4, ZigBee, from Texas Energy is an important metric for studying the distribution
Instruments is proposed here. This model describes the energy of resources at network nodes. In Figure 3 we compare the
used for each of the functions performed by a CC2530 chip. performance in terms of the persistence parameter of MPH and
two others widely known protocols, AODV and DSR. Another
point worth noting is that the Figure 3 describes the location
TABLE IV
E NERGY M ODEL [17]. of the jammer node for three different positions (near, middle
and far from the collector node). In this case, simulations
were performed considering Scenario 3 and modifying AODV
Voltage (mV) Current (mA) Time (ms) Energy (J)
Start-up mode 120 12 0.2 EStarting = 0.000288
and DSR protocols by including the transmission of a control
MCU (32-MHz clock) 75 7.5 1.7 EM C = 0.000956 packet. The results show that AODV and DSR are capable
CSMA/CA algorithm 270 27 1.068 ECSM A = 0.00778
Switch from RX to TX 140 14 0.2 ESwitching = 0.000392 of reducing the area of the location of the jammer node to
Switch from TX to RX
Radio in RX mode
250
250
25
25
0.2
4.1915
ESwitching = 0.00125
ERX = 0.0262
approximately 15% of all the network while MPH can further
Radio in TX mode 320 32 0.58 ET X = 0.00426 reduce the area to 4%. This ensures that the attacker node may
Shut down mode 75 7.5 2.5 EShutdown = 0.00141
be better located facing a possible jamming with a reduced
zone.
The energy model described by the above equation measures
the energy used by the main functions of a node belonging to
a sensor network, assuming that the functions related to the
wireless communications are the most relevant form an energy
point of view.
TABLE V
E NERGY CONSUMPTION FOR EACH DETECTION MECHANISM .
Type of Energy Connected Mechanism Energy (J) Extended Mechanism Energy (J)
EStarting 0.0172 0.0144
EM C 0.1338 0.0960
Fig. 3. Comparison for AODV, DSR and MPH protocols under Scenario 3.
ECSM A 0.8021 0.7982
ESwitching 0.0509 0.0411
ERX 0.2156 0.2268
ET X 0.1062 0.0923
EShutdown 0.0809 0.0749
Table VI shows the performance of the three considered
protocols in order to comparatively observe the reaction of the
Retransmissions CSMA Retries Delay end-to-end (sec) Resilience capacity (%) Affected nodes Energy (J)
AODV 2.52 3.44 1.398463 80 18 6.4
DSR 2.47 3.33 1.284773 75 13 6.0
MPH 1.93 2.60 0.811836 85 9 3.9
protocols against known metrics that show the performance there is more atypical data than in the other two protocols
and the reliable delivery of information. These performance because in both mechanisms, the nodes that surround the
metrics are well known in the WSN. Retransmissions show jammer node consume more energy, a parameter that is very
the number of packets to be transmitted again because the noticeable in order to isolate an area of the network.
source node did not receive an ACK message. CSMA retries
are attempts from the node to listen to the channel before Connected Group Extended Group
sending a packet. Delay end-to-end is the average total time 0.4 0.4
Energy (J)
Energy (J)
taken by a transmitted packet since it leaves the source node
AODV
0.2 0.2
until it reaches its destination. The number of affected nodes
is the area that is actually affected by the jammer node, i.e., 0 0
0 10 20 30 40 50 0 10 20 30 40 50
the smaller the number of affected nodes the more delimited
or fenced the jammer node will be, and the probability of 0.4 0.4
Energy (J)
Energy (J)
finding it in that area will be higher. Finally, Energy is a
DSR
0.2 0.2
common metric per node of the energy expenditure that the
node needs to perform the main tasks of the network. Table VI 0 0
0 10 20 30 40 50 0 10 20 30 40 50
exposes that the MPH protocol outperforms AODV and DSR
protocols in all metrics. Regarding MPH protocol performance 0.4 0.4
Energy (J)
Energy (J)
against AODV and DSR, it has 23% fewer retransmissions,
MPH
0.2 0.2
24% less CSMA retries, it has less delay by 35%, its resilience
to topology changes is 8% faster, the number of affected nodes 0 0
0 10 20 30 40 50 0 10 20 30 40 50
is 40% less, and the energy is reduced by 37% over the other Nodes Nodes
protocols mentioned.
Fig. 4. Energy per node under each protocol.
Figure 4 shows a direct comparison between the three
protocols under the two proposed jamming techniques, based
on the total energy for each of the three protocols. At first,
is easy to note how MPH has a better performance than
AODV DSR MPH
DSR and AODV with a value of 0.0390 on the extended
Connected Mechanism
0.2
0.3
0.1
Energy (Joules)
group and 0.0306 on the connected group since DSR has 0.25
0.15 0.08
a value of 0.0758 and 0.1062 and AODV has a value of 0.2
0.06
0.15
0.0984 and 0.1147 on the extended group and connected group 0.1
0.1
0.04
respectively. In figure 5 we represent the energy values for 0.05 0.05
0.02
0.4 0.3
0.1
0.25
0.3
less energy are more concentrated than 25% of those which 0.2
0.08
consume more. In addition, for the three protocols, the energy 0.2 0.15
0.06
0.04
consumed by nodes between 25% and 50% of the population is 0.1
0.1
0.02
more dispersed than between 50% and 75%. We observe that 0.05
Retransmissions CSMA Retries Delay end-to-end (sec) Resilience (sec) Affected nodes Overhead (%) Energy (J)
AODV-M 2.28 3.91 1.209485 7.0 7 of 9 51 6.30
AODV-under Connected Mechanism 2.15 3.55 1.149485 6.3 7 of 9 48 6.22
AODV-under Extended Mechanism 2.06 3.18 1.116753 6.1 8 of 9 45 6.02
DSR-M 2.20 3.77 1.168756 5.0 8 of 9 42 6.12
DSR-under Connected Mechanism 2.14 3.42 1.135688 4.7 8 of 9 39 6.04
DSR-under Extended Mechanism 2.03 3.13 1.118763 4.5 8 of 9 36 5.89
MPH-M 1.98 3.39 0.589765 2.0 9 of 9 27 3.95
MPH-under Connected Mechanism 1.88 3.15 0.458766 1.6 9 of 9 21 3.44
MPH-under Extended Mechanism 1.70 3.02 0.408765 1.4 9 of 9 18 3.21
The Table VII shows values of performance metrics in jamming attacks. In addition, the methodology was evaluated
the network. The tests were made with non-ideal links and with two extreme situations, namely by considering high
traffic rate of 10 packets per second per node under the grid traffic and high packet loss due to link interference. Thus,
topology shown in Table I. Metrics are average values of we described and compared two different jamming detection
re-transmissions and CSMA retries. The Delay end-to-end is techniques which are the extended group and connected group.
calculated as the average per route. Overhead is a metric that Both of them are natural to the network and take advantage
influences the amount of network collisions and the channel of the intrinsic characteristics of the wireless sensor network
occupancy. It depends on the number of routing packets that which mainly reside on the routing protocols that are designed
the routing protocol needs to connect nodes and to route packet to be fast and efficient. However, the extended group technique
traffic. Thus, it is calculated taking into account the number displays an almost 20% better performance than the connected
of control packets that are needed to route a traffic packet. group, the main reason behind it is that the extended requires
Ideally, a routing protocol should need the least amount of a collector node to be robust and have good connectivity on
control packets. Metric such as Energy is given by the average the topology, in other words, it has to be a root node.
energy per node along the network. Resilience is a parameter Results show that the proposed mechanism is more efficient
that measures the recovery time of a system. This metric is in a hierarchical protocol like MPH. Moreover, the extended
analyzed under the network under normal conditions and after approach presents better accuracy compared to the connected
30 seconds the jammer node is introduced in the middle of the group approach due to its global character and the fact that
topology and after 10 seconds the jammer node goes out and the collector node has the perspective of all nodes with similar
here we observe and measure how long it takes the network performance features.
to recover and return to its normal conditions. The affected
nodes is a metric that is set as a ratio of nodes that appear R EFERENCES
altered in their performance parameters and are those that are
actually encircling the jammer node between nodes that ideally [1] J. Zhu, Y. Zou, and B. Zheng, “Physical-layer security and reliability
should surround the jammer node completely. For this grid challenges for industrial wireless sensor networks,” IEEE Access, vol. 5,
pp. 5313–5320, 2017.
theoretically establish 9 nodes that should completely surround [2] K. Vijayan and A. Raaza, “A novel cluster arrangement energy efficient
if the jammer node is in position 24 of the topology in ??. routing protocol for wireless sensor networks,” Indian Journal of science
and Technology, vol. 9, no. 2, 2016.
[3] O. Osanaiye, A. S. Alfa, and G. P. Hancke, “A statistical approach to
V. C ONCLUSIONS detect jamming attacks in wireless sensor networks,” Sensors, vol. 18,
no. 6, p. 1691, 2018.
In recent years, a very common requirement of wireless sen- [4] L. Liu, G. Han, S. Chan, and M. Guizani, “An snr-assured anti-jamming
sor networks is the assessment of security, especially because routing protocol for reliable communication in industrial wireless sensor
attackers can corrupt the network, accessing or modifying in- networks,” IEEE Communications Magazine, vol. 56, no. 2, pp. 23–29,
2018.
formation and affecting the behavior of nodes. Due to the low- [5] P. Bhavathankar, S. Chatterjee, and S. Misra, “Link-quality aware path
cost and low-power requirements of these types of systems, selection in the presence of proactive jamming in fallible wireless sensor
nodes usually have limitations in both hardware/software and networks,” IEEE Transactions on Communications, vol. 66, no. 4, pp.
1689–1704, 2018.
computing capacities. This is why the design of security in
[6] B. Paul, K. A. Bhuiyan, K. Fatema, and P. P. Das, “Analysis of aomdv,
wireless sensor networks has to take into account the memory, aodv, dsr, and dsdv routing protocols for wireless sensor network,” in
computational capacity and availability of hardware/software Computational Intelligence and Communication Networks (CICN), 2014
resources. In addition to this, energy consumption is limited. International Conference on. IEEE, 2014, pp. 364–369.
[7] C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc on-demand distance
We propose a detection mechanism that masks the af- vector (aodv) routing,” Tech. Rep., 2003.
fected area and does not allow the attack to propagate. Our [8] C. Del-Valle-Soto, C. Mex-Perera, R. Monroy, and J. A. Nolazco-Flores,
mechanism is based on cooperation, namely by receiving “Mph-m, aodv-m and dsr-m performance evaluation under jamming
attacks,” Sensors, vol. 17, no. 7, p. 1573, 2017.
feedback from neighbor nodes. The mechanism was tested for [9] C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc on-demand distance
reactive jamming, which is considered a worst-case scenario in vector (aodv) routing,” Tech. Rep., 2003.