Alleviating Reactive Bit Jamming in Wireless Sensor Networks

Article Preview

Abstract:

Wireless sensor networks are widely deployed and thus are suffering increasing threats such as reactive bit jamming attacks. Such jamming can be alleviated by coded transmissions. This paper derives an optimal redundancy level required for Reed-Solomon code based transmissions and unveils the monotonic characteristic of coded transmission efficiency with respect to frame size, jamming strength, as well as communication protocol stack overhead.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3679-3685

Citation:

Online since:

November 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M. Strasser, B. Danev, S. Capkun, Detection of reactive jamming in sensor networks, ACM Transactions on Sensor Networks (TOSN), 7(2) (2000) 16.

DOI: 10.1145/1824766.1824772

Google Scholar

[2] R. H. Gohary, Y. Huang, Z. -Q. Luo, J. -S. Pang, A generalized iterative water-filling algorithm for distributed power control in the presence of a jammer, IEEE Transactions on Signal Processing, 57(7) (2009) 2660-2674.

DOI: 10.1109/tsp.2009.2014275

Google Scholar

[3] X. Li, Y. Zhu, B. Li, Optimal anti-jamming strategy in sensor networks, in Proceedings of IEEE International Conference on Communications, (2012) 178-182.

DOI: 10.1109/icc.2012.6364589

Google Scholar

[4] K. Siddhabathula, Q. Dong, D. Liu, M. Wright, Fast jamming detection in sensor networks, in Proceedings of IEEE International Conference on Communications, (2012) 934-938.

DOI: 10.1109/icc.2012.6363672

Google Scholar

[5] W. Xu, W. Trappe, Y. Zhang, T. Wood, The feasibility of launching and detecting jamming attacks in wireless networks, in Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, (2005) 46-57.

DOI: 10.1145/1062689.1062697

Google Scholar

[6] M. Wilhelm, I. Martinovic, J. B. Schmitt, V. Lenders, reactive jamming in wireless networks: how realistic is the threat?, in Proceedings of the fourth ACM conference on Wireless network security, (2011) 47-52.

DOI: 10.1145/1998412.1998422

Google Scholar

[7] T. Cheng, P. Li, S. Zhu, An algorithm for jammer localization in wireless sensor networks, in Proceedings of IEEE 26th International Conference on Advanced Information Networking and Applications (2012) 724-731.

DOI: 10.1109/aina.2012.11

Google Scholar

[8] M. Li, I. Koutsopoulos, R. Poovendran, Optimal jamming attacks and network defense policies in wireless sensor networks, in Proceedings of 26th IEEE International Conference on Computer Communications, (2007) 1307-1315.

DOI: 10.1109/infcom.2007.155

Google Scholar

[9] W. Xu, T. Wood, W. Trappe, Y. Zhang, Channel surfing and spatial retreats: defenses against wireless denial of service, in Proceedings of the 3rd ACM workshop on Wireless security, (2004) 80-89.

DOI: 10.1145/1023646.1023661

Google Scholar

[10] L. Zhang, Z. Guan, T. Melodia, Cooperative anti-jamming for infrastructure-less wireless networks with stochastic relaying, in Proceedings of IEEE International Conference on Computer Communications, (2014) 1-9.

DOI: 10.1109/infocom.2014.6847979

Google Scholar

[11] Q. Yan, H. Zeng, T. Jiang, M. Li, W. Lou, Y. T. Hou, Mimo-based jamming resilient communication in wireless networks, http: /digital. cs. usu. edu/~mingli/papers/MIMOJam_TS. pdf.

DOI: 10.1109/infocom.2014.6848218

Google Scholar