Abstract
Radio interference, whether intentional or otherwise, represents a serious threat to assuring the availability of sensor network services. As such, techniques that enhance the reliability of sensor communications in the presence of radio interference are critical. In this article, we propose to cope with this threat through a technique called channel surfing, whereby the sensor nodes in the network adapt their channel assignments to restore network connectivity in the presence of interference. We explore two different approaches to channel surfing: coordinated channel switching, in which the entire sensor network adjusts its channel; and spectral multiplexing, in which nodes in a jammed region switch channels and nodes on the boundary of a jammed region act as radio relays between different spectral zones. For coordinated channel switching, we examine an autonomous strategy where each node detects the loss of its neighbors in order to initiate channel switching. To cope with latency issues in the autonomous strategy, we propose a broadcast-assisted channel switching strategy to more rapidly coordinate channel switching. For spectral multiplexing, we have devised both synchronous and asynchronous strategies to facilitate the scheduling of nodes in order to improve network fidelity when sensor nodes operate on multiple channels. In designing these algorithms, we have taken a system-oriented approach that has focused on exploring actual implementation issues under realistic network settings. We have implemented these proposed methods on a testbed of 30 Mica2 sensor nodes, and the experimental results show that channel surfing, in its various forms, is an effective technique for repairing network connectivity in the presence of radio interference, while not introducing significant performance-overhead.
- Bellardo, J. and Savage, S. 2003. 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In Proceedings of the USENIX Security Symposium. 15--28. Google ScholarDigital Library
- Cagalj, M., Capkun, S., and Hubaux, J. 2007. Wormhole-based anti-jamming techniques in sensor networks. To IEEE Trans. Mob. Comput. To appear. Google ScholarDigital Library
- Ganeriwal, S., Kumar, R., and Srivastava, M. 2003. Timing-sync protocol for sensor networks. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys'03). 138--149. Google ScholarDigital Library
- Garces, R. and Aceves, J. G. L. 2000. Collision avoidance and resolution multiple access for multi-channel wireless networks. In Proceedings of IEEE INFOCOM. 595--602. Google ScholarDigital Library
- Heinzelman, W., Kulik, J., and Balakrishnan, H. 1999. Adaptive protocols for information dissemination in wireless sensor networks. In Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking. 174--185. Google ScholarDigital Library
- Intanagonwiwat, C., Govindan, R., and Estrin, D. 2000. Directed diffusion: a scalable and robust communication paradigm for sensor networks. In Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networks (MobiCOM). Google ScholarDigital Library
- Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L., and Rubenstein, D. 2002. Energy-efficient computing for wildlife tracking: design and tradeoffs and early experiences with zebranet. In Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems. 96--107. Google ScholarDigital Library
- Kyasanur, P. and Vaidya, N. 2003. Detection and handling of MAC layer misbehavior in wireless networks. In Proceedings of the IEEE International Conference on Dependable Systems and Networks. 173--182.Google Scholar
- Law, Y., Hartel, P., den Hartog, J., and Havinga, P. 2005. Link-layer jamming attacks on S-MAC. In Proceedings of the 2nd European Workshop on Wireless Sensor Networks (EWSN'05). 217--225.Google Scholar
- Ma, K., Zhang, Y., and Trappe, W. 2005. Mobile network management and robust spatial retreats via network dynamics. In Proceedings of the The 1st International Workshop on Resource Provisioning and Management in Sensor Networks (RPMSN05).Google Scholar
- Madden, S., Franklin, M., Hellerstein, J., and Hong, W. 2002. TAG: a Tiny aggregation service for ad-hoc sensor networks. In Proceedings of the Usenix Symposium on Operating Systems Design and Implementation. Google ScholarDigital Library
- Navda, V., Bohra, A., Ganguly, S., and Rubenstein. 2007. Using channel hopping to Increase 802.11 resilience to jamming attacks. In IEEE Infocom Minisymposium. Anchorage, AK.Google Scholar
- Noubir, G. and Lin, G. 2003. Low-power DoS attacks in data wireless lans and countermeasures. SIGMOBILE Mob. Comput. Comm. Rev. 7, 3, 29--30. Google ScholarDigital Library
- Perrig, A., Szewczyk, R., Tygar, D., Wen, V., and Culler, D. 2002. SPINS: security protocols for sensor networks. Wirel. Netw. 8, 5, 521--534. Google ScholarDigital Library
- Polastre, J., Hill, J., and Culler, D. 2004. Versatile low power media access for wireless sensor networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys'04). 95--107. Google ScholarDigital Library
- Proakis, J. G. 2000. Digital Communications, 4th Ed. McGraw-Hill.Google Scholar
- Rajeswaran, A. and Negi, R. 2005. DoS analysis of reservation based MAC protocols. In Proceedings of the IEEE International Conference on Communications.Google Scholar
- Raniwala, A., Gopalan, K., and Chiueh, T. 2004. Centralized channel assignment and routing algorithms for multi-channel wireless mesh networks. ACM Mob. Comput. Comm. Rev. 8, 2, 50--65. Google ScholarDigital Library
- Rappaport, S. S. and Grieco, D. M. 1984. Spread-spectrum signal acquisition—Methods and technology. IEEE Comm. Mag. 22, 6--21.Google ScholarDigital Library
- Raya, M., Hubaux, J., and Aad, I. 2004. Domino: a system to detect greedy behavior in IEEE 802.11 hotspots. In Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services (MobiSYS'04). ACM Press, 84--97. Google ScholarDigital Library
- Schleher, C. 1999. Electronic Warfare in the Information Age. MArtech House. Google ScholarDigital Library
- So, J. and Vaidya, N. 2003. Multi-channel MAC for ad hoc network: handling multi-channel hidden terminals using a single transceiver. In Proceedings of ACM MobiHoc. 222--233. Google ScholarDigital Library
- TinyOS. Tinyos homepage. http://webs.cs.berkeley.edu/tos/.Google Scholar
- Wan, C.-Y., Eisenman, S., and Campbell, A. 2003. Coda: congestion detection and avoidance in sensor networks. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys'03). 266--279. Google ScholarDigital Library
- Woo, A., Tong, T., and Culler, D. 2003. Taming the underlying challenges of reliable multihop routing in sensor networks. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys'03). 14--27. Google ScholarDigital Library
- Wood, A. and Stankovic, J. 2002. Denial of service in sensor networks. IEEE Comput. 35, 10, 54--62. Google ScholarDigital Library
- Wood, A., Stankovic, J., and Son, S. 2003. JAM: A jammed-area mapping service for sensor networks. In Proceedings of the 24th IEEE Real-Time Systems Symposium. 286--297. Google ScholarDigital Library
- Xu, W., Trappe, W., Zhang, Y., and Wood, T. 2005. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'05). 46--57. Google ScholarDigital Library
- Xu, W., Wood, T., Trappe, W., and Zhang, Y. 2004. Channel surfing and spatial retreats: defenses against wireless denial of service. In Proceedings of the ACM Workshop on Wireless Security. 80--89. Google ScholarDigital Library
- Ye, W., Heidemann, J., and Estrin, D. 2002. An energy-efficient MAC protocol for wireless sensor networks. In Proceedings of the IEEE INFOCOM. Vol. 3. 1567--1576.Google Scholar
- Zhao, J. and Govindan, R. 2003. Understanding packet delivery performance in dense wireless sensor networks. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys'03). 1--13. Google ScholarDigital Library
Index Terms
- Defending wireless sensor networks from radio interference through channel adaptation
Recommendations
Channel surfing: defending wireless sensor networks from interference
IPSN '07: Proceedings of the 6th international conference on Information processing in sensor networksWireless sensor networks are susceptible to interference that can disrupt sensor communication. In order to cope with this disruption, we explore channel surfing, whereby the sensor nodes adapt their channel assignments to restore network connectivity ...
Channel surfing: defending wireless sensor networks from jamming and interference
SenSys '06: Proceedings of the 4th international conference on Embedded networked sensor systemsCompromise-resilient anti-jamming communication in wireless sensor networks
Jamming is a kind of Denial-of-Service attack in which an adversary purposefully emits radio frequency signals to corrupt the wireless transmissions among normal nodes. Although some research has been conducted on countering jamming attacks, few works ...
Comments