SlideShare a Scribd company logo
A Trigger Identification Service for Defending Reactive
                Jammers in Wireless Sensor Network



ABSTRACT

During the last decade, Reactive Jamming Attack has emerged as a great security
threat to wireless sensor networks, due to its mass destruction to legitimate sensor
communications and difficulty to be disclosed and defended. Considering the
specific characteristics of reactive jammer nodes, a new scheme to deactivate them
by efficiently identifying all trigger nodes, whose transmissions invoke the jammer
nodes, has been proposed and developed. Such a trigger-identification procedure
can work as an application-layer service and benefit many existing reactive-
jamming defending schemes. In this paper, on the one hand, we leverage several
optimization problems to provide a complete trigger-identification service
framework for unreliable wireless sensor networks. On the other hand, we provide
an improved algorithm with regard to two sophisticated jamming models, in order
to enhance its robustness for various network scenarios. Theoretical analysis and
simulation results are included to validate the performance of this framework.

EXISTING SYSTEM:

Reactive Jamming Attack has emerged as a great security threat to wireless sensor
networks, due to its mass destruction to legitimate sensor communications and
difficulty to be disclosed and defended. Among the various attacks, jamming attack
where a jammer node disrupts the message delivery of its neighboring sensor
nodes with interference signals, has become a critical threat to WSNs.

PROPOSED SYSTEM:

We present a simulation based trigger-identification service for reactive-jamming
in wireless sensor networks, which promptly provides the list of trigger-nodes
using a lightweight decentralized algorithm, without introducing neither new
hardware devices, nor significant message overhead at each sensor node.




MODULES:

    Network Model
    Attacker Model
    Jamming range
    Triggering range
    Jammer distance




MODULES DESCRIPTION:

Network Model
We consider a wireless sensor network consisting of n sensor nodes and one base
station (larger networks with multiple base stations can be split into small ones to
satisfy the model). Each sensor node is equipped with a globally synchronized time
clock, omnidirectional antennas, m radios for in total k channels throughout the
network, where k > m. For simplicity, the power strength in each direction is
assumed to be uniform, so the transmission range of each sensor can be abstracted
as a constant rs and the whole network as a unit disk graph (UDG) G ¼ ðV ;EÞ,
where any node pair i; j is connected iff the Euclidean distance between i; j: _ði; jÞ
_ rs. We leave asymmetric powers and polygonal transmission area for further
study.

Attacker Model

We consider both a basic attacker model and several advanced attacker models in
this paper. Specifically, we provide a solution framework toward the basic attacker
model, and validate its performance toward multiple advanced attacker models
theoretically and experimentally



Jamming range

R. Similar to the sensors, the jammers are equipped with omnidirectional antennas
with uniform power strength on each direction. The jammed area can be regarded
as a circle centered at the jammer node, with a radius R, where R is assumed
greater than rs, for simulating a powerful and efficient jammer node. All the
sensors within this range will be jammed during the jammer wake-up period. The
value of R can be approximated based on the positions of the boundary sensors
(whose neighbors are jammed but themselves not), and then further refined.

Triggering range

On sensing an ongoing transmission, the decision whether or not to launch a
jamming signal depends on the power of the sensor signal Ps, the arrived signal
power at the jammer Pa with distance r from the sensor, and the power of the
background noise Pn.




Jammer distance

Any two jammer nodes are assumed not to be too close to each other, i.e., the
distance between jammer J1 and J2 is _ðJ1; J2Þ > R. The motivations behind this
assumptions are three-fold: 1) the deployment of jammers should maximize the
jammed areas with a limited number of jammers, therefore large overlapping
between jammed areas of different jammers lowers down the attack efficiency; 2)
_ðJ1; J2Þ should be greater than R, since the transmission signals from one
jammer should not interfere the signal reception at the other jammer. Otherwise,
the latter jammer will not able to correctly detect any sensor transmission signals,
since they are accompanied with high RF noises, unless the jammer spends a lot of
efforts in denoising or embeds jammer-label in the jamming noise for the other
jammers to recognize. Both ways are infeasible for an efficient attack; 3) the
communications between jammers are impractical, which will expose the jammers
to anomaly detections at the network authority.


SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:


   • System               : Pentium IV 2.4 GHz.
   • Hard Disk           : 40 GB.
   • Floppy Drive        : 1.44 Mb.
   • Monitor             : 15 VGA Colour.
   • Mouse               : Logitech.
   • Ram                 : 512 Mb.




SOFTWARE REQUIREMENTS:


   • Operating system : - Windows XP.
   • Coding Language : JAVA
REFERENCE:

Ying Xuan, Yilin Shen, Nam P. Nguyen, and My T. Thai, “A Trigger
Identification Service for Defending Reactive Jammers in WSN”, IEEE
TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 5, MAY 2012

More Related Content

PDF
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
PDF
Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
DOCX
Vampire attacks draining life from wireless ad hoc sensor networks
PPTX
Vampire attacks
PDF
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...
PDF
Bi36358362
PDF
D0952126
DOCX
A detection & prevention of wormhole attack in wsn project abstract
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
Analysis of GPSR and its Relevant Attacks in Wireless Sensor Networks
Vampire attacks draining life from wireless ad hoc sensor networks
Vampire attacks
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...
Bi36358362
D0952126
A detection & prevention of wormhole attack in wsn project abstract

What's hot (19)

PDF
Wireless Communications & Spread Spectrum Design
PDF
International Journal of Engineering Research and Development (IJERD)
PPTX
Security in wireless sensor network
PPT
security in wireless sensor networks
PPTX
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
PPT
Security in WSN
PPTX
A survey on complex wormhole attack in wireless
PDF
International Journal of Engineering Research and Development (IJERD)
DOCX
Chapter
PPTX
Cooperative tv spectrum sensing in cognitive radio BY DEEPAK PORIYA
PDF
Tqds time stamped quantum digital signature to defend
PPTX
Wormhole attack
PPTX
Wireless Sensor Network Security
PDF
Protocols for detection of node replication attack on wireless sensor network
PDF
50120140506007 2
PDF
A review paper on watchdog mechanism in wireless sensor network to eliminate ...
PDF
A review paper on watchdog mechanism in wireless
PPTX
Wireless sensor network lifetime constraints
PDF
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSN
Wireless Communications & Spread Spectrum Design
International Journal of Engineering Research and Development (IJERD)
Security in wireless sensor network
security in wireless sensor networks
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
Security in WSN
A survey on complex wormhole attack in wireless
International Journal of Engineering Research and Development (IJERD)
Chapter
Cooperative tv spectrum sensing in cognitive radio BY DEEPAK PORIYA
Tqds time stamped quantum digital signature to defend
Wormhole attack
Wireless Sensor Network Security
Protocols for detection of node replication attack on wireless sensor network
50120140506007 2
A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless
Wireless sensor network lifetime constraints
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSN
Ad

Viewers also liked (15)

PPTX
Sindrome compartimental expo 1
PDF
2012 13 eee ieee projects - jp infotech
PDF
Whadddyathink
PDF
IEEE PROJECTS 2013 for me
PDF
2012 ieee android project titles
DOCX
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
DOCX
A stochastic model of multivirus dynamics
PDF
Android ieee projects 2012
DOCX
Adaptive membership functions for hand written character recognition by voron...
PPTX
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
DOCX
A gossip protocol for dynamic resource management in large cloud environments
PDF
The China Analyst - September 2011
Sindrome compartimental expo 1
2012 13 eee ieee projects - jp infotech
Whadddyathink
IEEE PROJECTS 2013 for me
2012 ieee android project titles
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
A stochastic model of multivirus dynamics
Android ieee projects 2012
Adaptive membership functions for hand written character recognition by voron...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
A gossip protocol for dynamic resource management in large cloud environments
The China Analyst - September 2011
Ad

Similar to A trigger identification service for defending reactive jammers in wireless sensor network (20)

PDF
Ar03302620266
PDF
Jammers in wsn
PPT
Sensor networks a survey
PDF
A1803060110
PDF
The International Journal of Engineering and Science (IJES)
PDF
Sensor net
PPTX
4G technology brief, call flow, 5G architecture
PDF
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
PDF
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
PDF
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
PPTX
Analysis and reactive measures on the blackhole attack
PDF
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
PDF
C0511318
DOCX
WIRELESS SENSOR NETWORKS
PPT
WSN_UNIT 1 -BASICS OF WSN (1).ppt slides
PPT
7_adhoc and wireless network (1).ppt
PDF
Article GSM
PDF
Ijnsa050209
PDF
A survey on jamming attacks, detection and defending strategies in wireless s...
Ar03302620266
Jammers in wsn
Sensor networks a survey
A1803060110
The International Journal of Engineering and Science (IJES)
Sensor net
4G technology brief, call flow, 5G architecture
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
Analysis and reactive measures on the blackhole attack
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
C0511318
WIRELESS SENSOR NETWORKS
WSN_UNIT 1 -BASICS OF WSN (1).ppt slides
7_adhoc and wireless network (1).ppt
Article GSM
Ijnsa050209
A survey on jamming attacks, detection and defending strategies in wireless s...

Recently uploaded (20)

PDF
Pre independence Education in Inndia.pdf
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
01-Introduction-to-Information-Management.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Institutional Correction lecture only . . .
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PPTX
master seminar digital applications in india
PDF
O7-L3 Supply Chain Operations - ICLT Program
Pre independence Education in Inndia.pdf
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Microbial disease of the cardiovascular and lymphatic systems
O5-L3 Freight Transport Ops (International) V1.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
01-Introduction-to-Information-Management.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
Institutional Correction lecture only . . .
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Supply Chain Operations Speaking Notes -ICLT Program
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Abdominal Access Techniques with Prof. Dr. R K Mishra
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
TR - Agricultural Crops Production NC III.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
master seminar digital applications in india
O7-L3 Supply Chain Operations - ICLT Program

A trigger identification service for defending reactive jammers in wireless sensor network

  • 1. A Trigger Identification Service for Defending Reactive Jammers in Wireless Sensor Network ABSTRACT During the last decade, Reactive Jamming Attack has emerged as a great security threat to wireless sensor networks, due to its mass destruction to legitimate sensor communications and difficulty to be disclosed and defended. Considering the specific characteristics of reactive jammer nodes, a new scheme to deactivate them by efficiently identifying all trigger nodes, whose transmissions invoke the jammer nodes, has been proposed and developed. Such a trigger-identification procedure can work as an application-layer service and benefit many existing reactive- jamming defending schemes. In this paper, on the one hand, we leverage several optimization problems to provide a complete trigger-identification service framework for unreliable wireless sensor networks. On the other hand, we provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios. Theoretical analysis and simulation results are included to validate the performance of this framework. EXISTING SYSTEM: Reactive Jamming Attack has emerged as a great security threat to wireless sensor networks, due to its mass destruction to legitimate sensor communications and
  • 2. difficulty to be disclosed and defended. Among the various attacks, jamming attack where a jammer node disrupts the message delivery of its neighboring sensor nodes with interference signals, has become a critical threat to WSNs. PROPOSED SYSTEM: We present a simulation based trigger-identification service for reactive-jamming in wireless sensor networks, which promptly provides the list of trigger-nodes using a lightweight decentralized algorithm, without introducing neither new hardware devices, nor significant message overhead at each sensor node. MODULES:  Network Model  Attacker Model  Jamming range  Triggering range  Jammer distance MODULES DESCRIPTION: Network Model
  • 3. We consider a wireless sensor network consisting of n sensor nodes and one base station (larger networks with multiple base stations can be split into small ones to satisfy the model). Each sensor node is equipped with a globally synchronized time clock, omnidirectional antennas, m radios for in total k channels throughout the network, where k > m. For simplicity, the power strength in each direction is assumed to be uniform, so the transmission range of each sensor can be abstracted as a constant rs and the whole network as a unit disk graph (UDG) G ¼ ðV ;EÞ, where any node pair i; j is connected iff the Euclidean distance between i; j: _ði; jÞ _ rs. We leave asymmetric powers and polygonal transmission area for further study. Attacker Model We consider both a basic attacker model and several advanced attacker models in this paper. Specifically, we provide a solution framework toward the basic attacker model, and validate its performance toward multiple advanced attacker models theoretically and experimentally Jamming range R. Similar to the sensors, the jammers are equipped with omnidirectional antennas with uniform power strength on each direction. The jammed area can be regarded as a circle centered at the jammer node, with a radius R, where R is assumed greater than rs, for simulating a powerful and efficient jammer node. All the
  • 4. sensors within this range will be jammed during the jammer wake-up period. The value of R can be approximated based on the positions of the boundary sensors (whose neighbors are jammed but themselves not), and then further refined. Triggering range On sensing an ongoing transmission, the decision whether or not to launch a jamming signal depends on the power of the sensor signal Ps, the arrived signal power at the jammer Pa with distance r from the sensor, and the power of the background noise Pn. Jammer distance Any two jammer nodes are assumed not to be too close to each other, i.e., the distance between jammer J1 and J2 is _ðJ1; J2Þ > R. The motivations behind this assumptions are three-fold: 1) the deployment of jammers should maximize the jammed areas with a limited number of jammers, therefore large overlapping between jammed areas of different jammers lowers down the attack efficiency; 2) _ðJ1; J2Þ should be greater than R, since the transmission signals from one jammer should not interfere the signal reception at the other jammer. Otherwise, the latter jammer will not able to correctly detect any sensor transmission signals, since they are accompanied with high RF noises, unless the jammer spends a lot of
  • 5. efforts in denoising or embeds jammer-label in the jamming noise for the other jammers to recognize. Both ways are infeasible for an efficient attack; 3) the communications between jammers are impractical, which will expose the jammers to anomaly detections at the network authority. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb. SOFTWARE REQUIREMENTS: • Operating system : - Windows XP. • Coding Language : JAVA
  • 6. REFERENCE: Ying Xuan, Yilin Shen, Nam P. Nguyen, and My T. Thai, “A Trigger Identification Service for Defending Reactive Jammers in WSN”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 5, MAY 2012