skip to main content
research-article

Defending wireless sensor networks from radio interference through channel adaptation

Published:04 September 2008Publication History
Skip Abstract Section

Abstract

Radio interference, whether intentional or otherwise, represents a serious threat to assuring the availability of sensor network services. As such, techniques that enhance the reliability of sensor communications in the presence of radio interference are critical. In this article, we propose to cope with this threat through a technique called channel surfing, whereby the sensor nodes in the network adapt their channel assignments to restore network connectivity in the presence of interference. We explore two different approaches to channel surfing: coordinated channel switching, in which the entire sensor network adjusts its channel; and spectral multiplexing, in which nodes in a jammed region switch channels and nodes on the boundary of a jammed region act as radio relays between different spectral zones. For coordinated channel switching, we examine an autonomous strategy where each node detects the loss of its neighbors in order to initiate channel switching. To cope with latency issues in the autonomous strategy, we propose a broadcast-assisted channel switching strategy to more rapidly coordinate channel switching. For spectral multiplexing, we have devised both synchronous and asynchronous strategies to facilitate the scheduling of nodes in order to improve network fidelity when sensor nodes operate on multiple channels. In designing these algorithms, we have taken a system-oriented approach that has focused on exploring actual implementation issues under realistic network settings. We have implemented these proposed methods on a testbed of 30 Mica2 sensor nodes, and the experimental results show that channel surfing, in its various forms, is an effective technique for repairing network connectivity in the presence of radio interference, while not introducing significant performance-overhead.

References

  1. Bellardo, J. and Savage, S. 2003. 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In Proceedings of the USENIX Security Symposium. 15--28. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Cagalj, M., Capkun, S., and Hubaux, J. 2007. Wormhole-based anti-jamming techniques in sensor networks. To IEEE Trans. Mob. Comput. To appear. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ganeriwal, S., Kumar, R., and Srivastava, M. 2003. Timing-sync protocol for sensor networks. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys'03). 138--149. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Garces, R. and Aceves, J. G. L. 2000. Collision avoidance and resolution multiple access for multi-channel wireless networks. In Proceedings of IEEE INFOCOM. 595--602. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Heinzelman, W., Kulik, J., and Balakrishnan, H. 1999. Adaptive protocols for information dissemination in wireless sensor networks. In Proceedings of the 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking. 174--185. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Intanagonwiwat, C., Govindan, R., and Estrin, D. 2000. Directed diffusion: a scalable and robust communication paradigm for sensor networks. In Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networks (MobiCOM). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L., and Rubenstein, D. 2002. Energy-efficient computing for wildlife tracking: design and tradeoffs and early experiences with zebranet. In Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems. 96--107. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Kyasanur, P. and Vaidya, N. 2003. Detection and handling of MAC layer misbehavior in wireless networks. In Proceedings of the IEEE International Conference on Dependable Systems and Networks. 173--182.Google ScholarGoogle Scholar
  9. Law, Y., Hartel, P., den Hartog, J., and Havinga, P. 2005. Link-layer jamming attacks on S-MAC. In Proceedings of the 2nd European Workshop on Wireless Sensor Networks (EWSN'05). 217--225.Google ScholarGoogle Scholar
  10. Ma, K., Zhang, Y., and Trappe, W. 2005. Mobile network management and robust spatial retreats via network dynamics. In Proceedings of the The 1st International Workshop on Resource Provisioning and Management in Sensor Networks (RPMSN05).Google ScholarGoogle Scholar
  11. Madden, S., Franklin, M., Hellerstein, J., and Hong, W. 2002. TAG: a Tiny aggregation service for ad-hoc sensor networks. In Proceedings of the Usenix Symposium on Operating Systems Design and Implementation. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Navda, V., Bohra, A., Ganguly, S., and Rubenstein. 2007. Using channel hopping to Increase 802.11 resilience to jamming attacks. In IEEE Infocom Minisymposium. Anchorage, AK.Google ScholarGoogle Scholar
  13. Noubir, G. and Lin, G. 2003. Low-power DoS attacks in data wireless lans and countermeasures. SIGMOBILE Mob. Comput. Comm. Rev. 7, 3, 29--30. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Perrig, A., Szewczyk, R., Tygar, D., Wen, V., and Culler, D. 2002. SPINS: security protocols for sensor networks. Wirel. Netw. 8, 5, 521--534. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Polastre, J., Hill, J., and Culler, D. 2004. Versatile low power media access for wireless sensor networks. In Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys'04). 95--107. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Proakis, J. G. 2000. Digital Communications, 4th Ed. McGraw-Hill.Google ScholarGoogle Scholar
  17. Rajeswaran, A. and Negi, R. 2005. DoS analysis of reservation based MAC protocols. In Proceedings of the IEEE International Conference on Communications.Google ScholarGoogle Scholar
  18. Raniwala, A., Gopalan, K., and Chiueh, T. 2004. Centralized channel assignment and routing algorithms for multi-channel wireless mesh networks. ACM Mob. Comput. Comm. Rev. 8, 2, 50--65. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Rappaport, S. S. and Grieco, D. M. 1984. Spread-spectrum signal acquisition—Methods and technology. IEEE Comm. Mag. 22, 6--21.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Raya, M., Hubaux, J., and Aad, I. 2004. Domino: a system to detect greedy behavior in IEEE 802.11 hotspots. In Proceedings of the 2nd International Conference on Mobile Systems, Applications, and Services (MobiSYS'04). ACM Press, 84--97. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Schleher, C. 1999. Electronic Warfare in the Information Age. MArtech House. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. So, J. and Vaidya, N. 2003. Multi-channel MAC for ad hoc network: handling multi-channel hidden terminals using a single transceiver. In Proceedings of ACM MobiHoc. 222--233. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. TinyOS. Tinyos homepage. http://webs.cs.berkeley.edu/tos/.Google ScholarGoogle Scholar
  24. Wan, C.-Y., Eisenman, S., and Campbell, A. 2003. Coda: congestion detection and avoidance in sensor networks. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys'03). 266--279. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Woo, A., Tong, T., and Culler, D. 2003. Taming the underlying challenges of reliable multihop routing in sensor networks. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys'03). 14--27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Wood, A. and Stankovic, J. 2002. Denial of service in sensor networks. IEEE Comput. 35, 10, 54--62. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Wood, A., Stankovic, J., and Son, S. 2003. JAM: A jammed-area mapping service for sensor networks. In Proceedings of the 24th IEEE Real-Time Systems Symposium. 286--297. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Xu, W., Trappe, W., Zhang, Y., and Wood, T. 2005. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'05). 46--57. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Xu, W., Wood, T., Trappe, W., and Zhang, Y. 2004. Channel surfing and spatial retreats: defenses against wireless denial of service. In Proceedings of the ACM Workshop on Wireless Security. 80--89. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Ye, W., Heidemann, J., and Estrin, D. 2002. An energy-efficient MAC protocol for wireless sensor networks. In Proceedings of the IEEE INFOCOM. Vol. 3. 1567--1576.Google ScholarGoogle Scholar
  31. Zhao, J. and Govindan, R. 2003. Understanding packet delivery performance in dense wireless sensor networks. In Proceedings of the 1st International Conference on Embedded Networked Sensor Systems (SenSys'03). 1--13. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Defending wireless sensor networks from radio interference through channel adaptation

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM Transactions on Sensor Networks
      ACM Transactions on Sensor Networks  Volume 4, Issue 4
      August 2008
      295 pages
      ISSN:1550-4859
      EISSN:1550-4867
      DOI:10.1145/1387663
      Issue’s Table of Contents

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 September 2008
      • Revised: 1 October 2007
      • Accepted: 1 October 2007
      • Received: 1 April 2007
      Published in tosn Volume 4, Issue 4

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader