TY - GEN
T1 - Reactive jamming attacks in multi-radio wireless sensor networks
T2 - 2nd ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing, FOWANC'09, Co-located with MobiHoc'09
AU - Shin, Incheol
AU - Shen, Yilin
AU - Xuan, Ying
AU - Thai, My T.
AU - Znati, Taieb
PY - 2009
Y1 - 2009
N2 - There exist many studies against reactive jamming attacks, however, these methods, i.e. frequency hopping or channel surfing, require excessive computational capabilities on wireless devices which are serious side effects in wireless sensor networks. To avoid the problems in existing methods, we propose a novel approach against reactive jamming attacks by identifying the trigger nodes, whose transmissions activate any reactive jammers. The identification of these trigger nodes can help us (i) carefully design a better routing protocol by switching these nodes into only receivers to avoid activating jammers and (ii) locate the jammers based on the trigger nodes, thus providing an alternative mechanism against reactive jamming attacks. In this paper, we provide an efficient method to identify the trigger nodes by utilizing the group testing techniques and minimum collection of disjoint disk covers to reduce the message and computational overhead. The theoretical analysis and experimental results show that our solution performs extremely well in terms of time and message complexities, which in turn provides a good approach to defend reactive jamming attacks.
AB - There exist many studies against reactive jamming attacks, however, these methods, i.e. frequency hopping or channel surfing, require excessive computational capabilities on wireless devices which are serious side effects in wireless sensor networks. To avoid the problems in existing methods, we propose a novel approach against reactive jamming attacks by identifying the trigger nodes, whose transmissions activate any reactive jammers. The identification of these trigger nodes can help us (i) carefully design a better routing protocol by switching these nodes into only receivers to avoid activating jammers and (ii) locate the jammers based on the trigger nodes, thus providing an alternative mechanism against reactive jamming attacks. In this paper, we provide an efficient method to identify the trigger nodes by utilizing the group testing techniques and minimum collection of disjoint disk covers to reduce the message and computational overhead. The theoretical analysis and experimental results show that our solution performs extremely well in terms of time and message complexities, which in turn provides a good approach to defend reactive jamming attacks.
KW - Denial of service
KW - Group testing
KW - Jamming
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=70450202571&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70450202571&partnerID=8YFLogxK
U2 - 10.1145/1540343.1540357
DO - 10.1145/1540343.1540357
M3 - Conference contribution
AN - SCOPUS:70450202571
SN - 9781605585239
T3 - FOWANC'09 - Proceedings of the 2nd ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing, Co-located with MobiHoc'09
SP - 87
EP - 96
BT - FOWANC'09 - Proceedings of the 2nd ACM International Workshop on Foundations of Wireless Ad Hoc and Sensor Networking and Computing, Co-located with MobiHoc'09
Y2 - 18 May 2009 through 18 May 2009
ER -