Skip to main content
Erschienen in: Cluster Computing 1/2016

01.03.2016

Scrutiny of unruly and abuse in wireless networks to mitigate physical layer threats using discriminate based misbehavior prevention

verfasst von: S. Raja Ratna, R. Ravi

Erschienen in: Cluster Computing | Ausgabe 1/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The open nature of communication medium in wireless networks becomes easy for the attackers to indulge in jamming attack. Jamming blocks the communication channel with the intent of preventing the flow of useful information. Jammers effectively and stealthy corrupts the packet by injecting high level of noise thereby keeping the channel busy so that the legitimate traffic gets completely blocked, resulting in packet loss at the receiver side. Securing the information from the jammers has become very important. Therefore an effective approach is needed to prevent this attack and this paper proposes Discriminate based Misbehavior Prevention DMP scheme to identify and to detach the jammer that corrupts the packet in wireless network. The proposed scheme consists of three modules. In module one, the log files are analyzed and using the trusting mechanism the suspected traces are identified. In module two, three reshuffling algorithms has been developed for reshuffling and identifying doubtful traces. In module three, the jammer nodes are identified and detached from the network. By simulation studies, it is observed that the proposed scheme attains higher throughput and packet delivery ratio while attaining lower delay.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Attar, A., et al.: A survey of security challenges in cognitive radio networks: solutions and future research directions. Proc. IEEE. 100(12), 3172–3186 (2012)CrossRef Attar, A., et al.: A survey of security challenges in cognitive radio networks: solutions and future research directions. Proc. IEEE. 100(12), 3172–3186 (2012)CrossRef
2.
Zurück zum Zitat Bayraktaroglu, E., et al.: On the performance of IEEE 802.11 under jamming. In: Proceedings of IEEE INFOCOM, pp. 1265–1273 (2008) Bayraktaroglu, E., et al.: On the performance of IEEE 802.11 under jamming. In: Proceedings of IEEE INFOCOM, pp. 1265–1273 (2008)
3.
Zurück zum Zitat Broustis, I., et al.: A software framework for alleviating the effects of MAC-aware jamming attacks in wireless access networks. Wirel. Netw. 17(6), 1543–1560 (2011)CrossRef Broustis, I., et al.: A software framework for alleviating the effects of MAC-aware jamming attacks in wireless access networks. Wirel. Netw. 17(6), 1543–1560 (2011)CrossRef
4.
Zurück zum Zitat Cagalj, M., et al.: Wormhole-based anti jamming techniques in sensor networks. IEEE Trans. Mob. Comput. 6(1), 100–114 (2007)CrossRef Cagalj, M., et al.: Wormhole-based anti jamming techniques in sensor networks. IEEE Trans. Mob. Comput. 6(1), 100–114 (2007)CrossRef
5.
Zurück zum Zitat Chiang, J., et al.: Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Trans. Netw. 19(1), 286–289 (2011)CrossRef Chiang, J., et al.: Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Trans. Netw. 19(1), 286–289 (2011)CrossRef
6.
Zurück zum Zitat Christina, P., et al.: Jamming-resistant broadcast communication without shared keys. In: Proceedings USENIX Security Symposium (2009) Christina, P., et al.: Jamming-resistant broadcast communication without shared keys. In: Proceedings USENIX Security Symposium (2009)
7.
Zurück zum Zitat Daidone, R., et al.: A solution to the GTS-based selective jamming attack on IEEE 802.15.4 networks. Wirel. Netw. 20(5), 1223–1235 (2014)CrossRef Daidone, R., et al.: A solution to the GTS-based selective jamming attack on IEEE 802.15.4 networks. Wirel. Netw. 20(5), 1223–1235 (2014)CrossRef
8.
Zurück zum Zitat Han, J., et al.: Data Mining: Concepts and Techniques, 3rd edn. Morgan Kaufmann Publishers (2001) Han, J., et al.: Data Mining: Concepts and Techniques, 3rd edn. Morgan Kaufmann Publishers (2001)
9.
Zurück zum Zitat He, D., et al.: ReTrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Trans. Inf. Technol. Biomed. 16(4), 623–632 (2012)CrossRef He, D., et al.: ReTrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Trans. Inf. Technol. Biomed. 16(4), 623–632 (2012)CrossRef
10.
Zurück zum Zitat Jing, Q., et al.: Security of the Internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)CrossRef Jing, Q., et al.: Security of the Internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)CrossRef
11.
Zurück zum Zitat Konstantinos, P., et al.: A measurement-driven anti-jamming system for 802.11 networks. IEEE/ ACM Trans. Netw. 19(4):1208–1222 (2011) Konstantinos, P., et al.: A measurement-driven anti-jamming system for 802.11 networks. IEEE/ ACM Trans. Netw. 19(4):1208–1222 (2011)
12.
Zurück zum Zitat Konstantinos, P., et al.: On the efficacy of frequency hopping in coping with jamming attacks in 802.11 networks. IEEE Trans. Wirel. Commun. 9(10), 3258–3271 (2010)CrossRef Konstantinos, P., et al.: On the efficacy of frequency hopping in coping with jamming attacks in 802.11 networks. IEEE Trans. Wirel. Commun. 9(10), 3258–3271 (2010)CrossRef
13.
Zurück zum Zitat Konstantinos, P., et al.: Denial of service attacks in wireless networks: the case of jammers. IEEE Commun. Surv. Tutor. 13(2), 245–257 (2011)CrossRef Konstantinos, P., et al.: Denial of service attacks in wireless networks: the case of jammers. IEEE Commun. Surv. Tutor. 13(2), 245–257 (2011)CrossRef
14.
Zurück zum Zitat Law, Y.W., et al.: Energy efficient link-layer jamming attacks against wireless sensor network MAC protocols. ACM Trans. Sens. Netw. 5(1), 1–38 (2009)MathSciNetCrossRef Law, Y.W., et al.: Energy efficient link-layer jamming attacks against wireless sensor network MAC protocols. ACM Trans. Sens. Netw. 5(1), 1–38 (2009)MathSciNetCrossRef
15.
Zurück zum Zitat Li, C., et al.: Communication efficiency of anti-jamming broadcast in large-scale multi-channel wireless networks. IEEE Trans. Signal Process. 60(10), 5281–5292 (2012)MathSciNetCrossRef Li, C., et al.: Communication efficiency of anti-jamming broadcast in large-scale multi-channel wireless networks. IEEE Trans. Signal Process. 60(10), 5281–5292 (2012)MathSciNetCrossRef
16.
Zurück zum Zitat Li, X., et al.: LDTS: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans. Inf. Forensic. Security 8(6), 924–935 (2013)CrossRef Li, X., et al.: LDTS: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans. Inf. Forensic. Security 8(6), 924–935 (2013)CrossRef
17.
Zurück zum Zitat Liu, B., et al.: Toward incentivizing anti-spoofing deployment. IEEE Trans. Inf. Forensics Security 9(3), 436–450 (2014)CrossRef Liu, B., et al.: Toward incentivizing anti-spoofing deployment. IEEE Trans. Inf. Forensics Security 9(3), 436–450 (2014)CrossRef
18.
Zurück zum Zitat Nguyen, H., et al.: Alibi framework for identifying reactive jamming nodes in wireless LAN. In: IEEE Global Telecommunication Conference (GLOBECOM 2011), pp. 1–6 (2011) Nguyen, H., et al.: Alibi framework for identifying reactive jamming nodes in wireless LAN. In: IEEE Global Telecommunication Conference (GLOBECOM 2011), pp. 1–6 (2011)
19.
Zurück zum Zitat Proano, A., et al.: Packet-hiding methods for preventing selective jamming attacks. IEEE Trans. Dependable Secure Comput. 9(1), 101–114 (2012)CrossRef Proano, A., et al.: Packet-hiding methods for preventing selective jamming attacks. IEEE Trans. Dependable Secure Comput. 9(1), 101–114 (2012)CrossRef
20.
Zurück zum Zitat Richa, A., et al.: An efficient and fair MAC protocol robust to reactive interference. IEEE/ACM Trans. Netw. 21(3), 760–771 (2013)CrossRef Richa, A., et al.: An efficient and fair MAC protocol robust to reactive interference. IEEE/ACM Trans. Netw. 21(3), 760–771 (2013)CrossRef
21.
Zurück zum Zitat Shiu, Y.S., et al.: Physical layer security in wireless networks: a tutorial. IEEE Wirel. Commun. 18(2):66–74 (2011) Shiu, Y.S., et al.: Physical layer security in wireless networks: a tutorial. IEEE Wirel. Commun. 18(2):66–74 (2011)
22.
Zurück zum Zitat Singh, J., et al.: A cross-layer based intrusion detection technique for wireless networks. Int. Arab J. Inf. Technol. 9(3), 201–207 (2012) Singh, J., et al.: A cross-layer based intrusion detection technique for wireless networks. Int. Arab J. Inf. Technol. 9(3), 201–207 (2012)
23.
Zurück zum Zitat Thamilarasu, G., et al.: Improving reliability of jamming attack detection in ad hoc networks. Int. J. Commun. Netw. Inf. 3(1), 57–66 (2011) Thamilarasu, G., et al.: Improving reliability of jamming attack detection in ad hoc networks. Int. J. Commun. Netw. Inf. 3(1), 57–66 (2011)
24.
Zurück zum Zitat Wang L., et al.: A combined approach for distinguishing different types of jamming attacks against wireless networks. In: IEEE Pacific Rim (PacRim) Conference on Communications, Computers and Signal Processing (2011) Wang L., et al.: A combined approach for distinguishing different types of jamming attacks against wireless networks. In: IEEE Pacific Rim (PacRim) Conference on Communications, Computers and Signal Processing (2011)
25.
Zurück zum Zitat Wilhelm, M., et al.: Reactive jamming in wireless networks: how realistic is the threat\(\tau \). In: Proceedings of WiSec, pp. 47–52 (2011) Wilhelm, M., et al.: Reactive jamming in wireless networks: how realistic is the threat\(\tau \). In: Proceedings of WiSec, pp. 47–52 (2011)
26.
Zurück zum Zitat Yan, Z., et al.: A survey on trust management for Internet of things. J. Netw. Comput. Appl. 42, 120–134 (2014)CrossRef Yan, Z., et al.: A survey on trust management for Internet of things. J. Netw. Comput. Appl. 42, 120–134 (2014)CrossRef
27.
Zurück zum Zitat Yang, H., et al.: Provably secure three-party authenticated key agreement protocol using smart cards. Comput. Netw. 58, 29–38 (2014)CrossRef Yang, H., et al.: Provably secure three-party authenticated key agreement protocol using smart cards. Comput. Netw. 58, 29–38 (2014)CrossRef
28.
Zurück zum Zitat Yao, G., et al.: Passive IP traceback: disclosing the locations of ip spoofers from path backscatter. IEEE Trans. Inf. Forensics Security 10(3), 471–484 (2015)CrossRef Yao, G., et al.: Passive IP traceback: disclosing the locations of ip spoofers from path backscatter. IEEE Trans. Inf. Forensics Security 10(3), 471–484 (2015)CrossRef
29.
Zurück zum Zitat Zhang, Z., et al.: ECG-cryptography and authentication in body area networks. IEEE Trans. Inf. Technol. Biomed. 16(6), 1070–1078 (2012)CrossRef Zhang, Z., et al.: ECG-cryptography and authentication in body area networks. IEEE Trans. Inf. Technol. Biomed. 16(6), 1070–1078 (2012)CrossRef
30.
Zurück zum Zitat Zhou, J., et al.: Securing m-healthcare social networks: challenges, countermeasures and future directions. IEEE Wirel. Commun. 20(4) (2013) Zhou, J., et al.: Securing m-healthcare social networks: challenges, countermeasures and future directions. IEEE Wirel. Commun. 20(4) (2013)
Metadaten
Titel
Scrutiny of unruly and abuse in wireless networks to mitigate physical layer threats using discriminate based misbehavior prevention
verfasst von
S. Raja Ratna
R. Ravi
Publikationsdatum
01.03.2016
Verlag
Springer US
Erschienen in
Cluster Computing / Ausgabe 1/2016
Print ISSN: 1386-7857
Elektronische ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-015-0529-6

Weitere Artikel der Ausgabe 1/2016

Cluster Computing 1/2016 Zur Ausgabe

Premium Partner