Skip to main content

2012 | OriginalPaper | Buchkapitel

3. Interference Free Group Testing and Reactive Jamming Attacks

verfasst von : My T. Thai

Erschienen in: Group Testing Theory in Network Security

Verlag: Springer New York

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Another application of group testing that we would like to introduce is to against reactive jamming attacks , which has emerged as a great security threat to wireless sensor networks, due to its mass destruction to legitimate sensor communications and difficulty to be disclosed and defended. There exist many studies against these attacks, however, these methods, i.e., frequency hopping or channel surfing, require excessive computational capabilities on wireless devices. To overcome the shortcomings, we present here an interference free group-testing based solution by identifying the trigger nodes, whose transmissions activate any reactive jammers. The identification of these trigger nodes can help us to (1) carefully design a better routing protocol by switching these nodes into only receivers to avoid activating jammers and (2) locate the jammers based on the trigger nodes, thus providing an alternative mechanism against reactive jamming attacks. The theoretical analysis and experimental results show that this advanced scheme performs well in terms of time and message complexities.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Xu W, Ma K, Trappe W, Zhang Y (2006) Jamming sensor networks: attack and defense strategies. IEEE Network 20(3):41–47 Xu W, Ma K, Trappe W, Zhang Y (2006) Jamming sensor networks: attack and defense strategies. IEEE Network 20(3):41–47
2.
Zurück zum Zitat Strasser M, Danev B, Capkun S (2010) Detection of reactive jamming in sensor networks. ACM Trans Sens Netw (TOSN) 7(2):1–29 Strasser M, Danev B, Capkun S (2010) Detection of reactive jamming in sensor networks. ACM Trans Sens Netw (TOSN) 7(2):1–29
3.
Zurück zum Zitat Tague P, Nabar S, Ritcey JA, Poovendran R (2010) Jamming-aware traffic allocation for multiple-path routing using portfolio selection. IEEE/ACM Trans Networking 19(1):184–194 Tague P, Nabar S, Ritcey JA, Poovendran R (2010) Jamming-aware traffic allocation for multiple-path routing using portfolio selection. IEEE/ACM Trans Networking 19(1):184–194
4.
Zurück zum Zitat Mingyan Li, Koutsopoulos I, Poovendran R (2007) Optimal jamming attacks and network defense policies in wireless sensor networks. In: 26th, IEEE international conference on computer communications (INFOCOM), pp 1307–1315 Mingyan Li, Koutsopoulos I, Poovendran R (2007) Optimal jamming attacks and network defense policies in wireless sensor networks. In: 26th, IEEE international conference on computer communications (INFOCOM), pp 1307–1315
5.
Zurück zum Zitat Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing (MobiHoc), pp 46–57 Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing (MobiHoc), pp 46–57
6.
Zurück zum Zitat Cagalj M, Capkun S, Hubaux JP (2007) Wormhole-based antijamming techniques in sensor networks. IEEE Trans Mob Comput 6(1):100–114 Cagalj M, Capkun S, Hubaux JP (2007) Wormhole-based antijamming techniques in sensor networks. IEEE Trans Mob Comput 6(1):100–114
7.
Zurück zum Zitat Hang W, Zanji W, Jingbo G (2006) Performance of DSSS against repeater jamming. In: 13th IEEE international conference on electronics, circuits and systems (ICECS), pp 858–861 Hang W, Zanji W, Jingbo G (2006) Performance of DSSS against repeater jamming. In: 13th IEEE international conference on electronics, circuits and systems (ICECS), pp 858–861
8.
Zurück zum Zitat Sidek O, Yahya A (2008) Reed solomon coding for frequency hopping spread spectrum in jamming environment. Am J Appl Sci 5(10):1281–1284 Sidek O, Yahya A (2008) Reed solomon coding for frequency hopping spread spectrum in jamming environment. Am J Appl Sci 5(10):1281–1284
9.
Zurück zum Zitat Xu W, Wood T, Trappe W, Zhang Y (2004) Channel surfing and spatial retreats: defenses against wireless denial of service. ACM workshop on wireless security, pp 80–89 Xu W, Wood T, Trappe W, Zhang Y (2004) Channel surfing and spatial retreats: defenses against wireless denial of service. ACM workshop on wireless security, pp 80–89
10.
Zurück zum Zitat Wood AD, Stankovic J, Son S (2003) A jammed-area mapping service for sensor networks. In: 24th IEEE conference on real-time systems symposium (RTSS), pp 286–297 Wood AD, Stankovic J, Son S (2003) A jammed-area mapping service for sensor networks. In: 24th IEEE conference on real-time systems symposium (RTSS), pp 286–297
11.
Zurück zum Zitat Shin I, Shen Y, Xuan Y, Thai MT, Znati T (2009) Reactive jamming attacks in multi-radio wireless sensor networks: an efficient mitigating measure by identifying trigger nodes. In: Proceedings of the 2nd ACM international workshop on foundations of wireless ad hoc and sensor networking and computing (FOWANC), pp 87–96 Shin I, Shen Y, Xuan Y, Thai MT, Znati T (2009) Reactive jamming attacks in multi-radio wireless sensor networks: an efficient mitigating measure by identifying trigger nodes. In: Proceedings of the 2nd ACM international workshop on foundations of wireless ad hoc and sensor networking and computing (FOWANC), pp 87–96
12.
Zurück zum Zitat Shin I, Shen Y, Xuan Y, Thai MT, Znati T (2011) A novel approach against reactive jamming attacks, ad hoc and sensor wireless network, to appear ad hoc and sensor wireless networks 12(1–2):125–149 Shin I, Shen Y, Xuan Y, Thai MT, Znati T (2011) A novel approach against reactive jamming attacks, ad hoc and sensor wireless network, to appear ad hoc and sensor wireless networks 12(1–2):125–149
13.
Zurück zum Zitat Bomze IM, Marco Budinich, Pardalos PM, Pelillo M (1999) Maximum clique problem, in handbook of combinatorial optimization. Kluwer Academic Publisher, Dordrecht, pp 1–74 Bomze IM, Marco Budinich, Pardalos PM, Pelillo M (1999) Maximum clique problem, in handbook of combinatorial optimization. Kluwer Academic Publisher, Dordrecht, pp 1–74
14.
Zurück zum Zitat Bron C, Kerbosch J (1973) Finding all cliques of an undirected graph. Commun ACM 16(9):575–577 Bron C, Kerbosch J (1973) Finding all cliques of an undirected graph. Commun ACM 16(9):575–577
15.
Zurück zum Zitat Gupta R, Walrand J (2004) Approximating maximal cliques in ad-hoc networks, 15th IEEE international symposium on personal, indoor and mobile radio communications (PIMRC), vol 1. pp 365–369 Gupta R, Walrand J (2004) Approximating maximal cliques in ad-hoc networks, 15th IEEE international symposium on personal, indoor and mobile radio communications (PIMRC), vol 1. pp 365–369
16.
Zurück zum Zitat Xuan Y, Shen Y, Nguyen NP, Thai MT (2011) A trigger identification service for defending reactive jammers in WSNs. IEEE Trans Mob Comput 99:, May 2011 Xuan Y, Shen Y, Nguyen NP, Thai MT (2011) A trigger identification service for defending reactive jammers in WSNs. IEEE Trans Mob Comput 99:, May 2011
17.
Zurück zum Zitat Kaplan H, Katz M, Morgenstern G, Sharir M (2010) Optimal cover of points by disks in a simple polygon. In: Proceedings of the 18th annual European conference on algorithms:Part I (ESA), pp 475–486 Kaplan H, Katz M, Morgenstern G, Sharir M (2010) Optimal cover of points by disks in a simple polygon. In: Proceedings of the 18th annual European conference on algorithms:Part I (ESA), pp 475–486
Metadaten
Titel
Interference Free Group Testing and Reactive Jamming Attacks
verfasst von
My T. Thai
Copyright-Jahr
2012
Verlag
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-0128-5_3