Abstract
The open nature of communication medium in wireless networks becomes easy for the attackers to indulge in jamming attack. Jamming blocks the communication channel with the intent of preventing the flow of useful information. Jammers effectively and stealthy corrupts the packet by injecting high level of noise thereby keeping the channel busy so that the legitimate traffic gets completely blocked, resulting in packet loss at the receiver side. Securing the information from the jammers has become very important. Therefore an effective approach is needed to prevent this attack and this paper proposes Discriminate based Misbehavior Prevention DMP scheme to identify and to detach the jammer that corrupts the packet in wireless network. The proposed scheme consists of three modules. In module one, the log files are analyzed and using the trusting mechanism the suspected traces are identified. In module two, three reshuffling algorithms has been developed for reshuffling and identifying doubtful traces. In module three, the jammer nodes are identified and detached from the network. By simulation studies, it is observed that the proposed scheme attains higher throughput and packet delivery ratio while attaining lower delay.





Similar content being viewed by others
References
Attar, A., et al.: A survey of security challenges in cognitive radio networks: solutions and future research directions. Proc. IEEE. 100(12), 3172–3186 (2012)
Bayraktaroglu, E., et al.: On the performance of IEEE 802.11 under jamming. In: Proceedings of IEEE INFOCOM, pp. 1265–1273 (2008)
Broustis, I., et al.: A software framework for alleviating the effects of MAC-aware jamming attacks in wireless access networks. Wirel. Netw. 17(6), 1543–1560 (2011)
Cagalj, M., et al.: Wormhole-based anti jamming techniques in sensor networks. IEEE Trans. Mob. Comput. 6(1), 100–114 (2007)
Chiang, J., et al.: Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Trans. Netw. 19(1), 286–289 (2011)
Christina, P., et al.: Jamming-resistant broadcast communication without shared keys. In: Proceedings USENIX Security Symposium (2009)
Daidone, R., et al.: A solution to the GTS-based selective jamming attack on IEEE 802.15.4 networks. Wirel. Netw. 20(5), 1223–1235 (2014)
Han, J., et al.: Data Mining: Concepts and Techniques, 3rd edn. Morgan Kaufmann Publishers (2001)
He, D., et al.: ReTrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Trans. Inf. Technol. Biomed. 16(4), 623–632 (2012)
Jing, Q., et al.: Security of the Internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)
Konstantinos, P., et al.: A measurement-driven anti-jamming system for 802.11 networks. IEEE/ ACM Trans. Netw. 19(4):1208–1222 (2011)
Konstantinos, P., et al.: On the efficacy of frequency hopping in coping with jamming attacks in 802.11 networks. IEEE Trans. Wirel. Commun. 9(10), 3258–3271 (2010)
Konstantinos, P., et al.: Denial of service attacks in wireless networks: the case of jammers. IEEE Commun. Surv. Tutor. 13(2), 245–257 (2011)
Law, Y.W., et al.: Energy efficient link-layer jamming attacks against wireless sensor network MAC protocols. ACM Trans. Sens. Netw. 5(1), 1–38 (2009)
Li, C., et al.: Communication efficiency of anti-jamming broadcast in large-scale multi-channel wireless networks. IEEE Trans. Signal Process. 60(10), 5281–5292 (2012)
Li, X., et al.: LDTS: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans. Inf. Forensic. Security 8(6), 924–935 (2013)
Liu, B., et al.: Toward incentivizing anti-spoofing deployment. IEEE Trans. Inf. Forensics Security 9(3), 436–450 (2014)
Nguyen, H., et al.: Alibi framework for identifying reactive jamming nodes in wireless LAN. In: IEEE Global Telecommunication Conference (GLOBECOM 2011), pp. 1–6 (2011)
Proano, A., et al.: Packet-hiding methods for preventing selective jamming attacks. IEEE Trans. Dependable Secure Comput. 9(1), 101–114 (2012)
Richa, A., et al.: An efficient and fair MAC protocol robust to reactive interference. IEEE/ACM Trans. Netw. 21(3), 760–771 (2013)
Shiu, Y.S., et al.: Physical layer security in wireless networks: a tutorial. IEEE Wirel. Commun. 18(2):66–74 (2011)
Singh, J., et al.: A cross-layer based intrusion detection technique for wireless networks. Int. Arab J. Inf. Technol. 9(3), 201–207 (2012)
Thamilarasu, G., et al.: Improving reliability of jamming attack detection in ad hoc networks. Int. J. Commun. Netw. Inf. 3(1), 57–66 (2011)
Wang L., et al.: A combined approach for distinguishing different types of jamming attacks against wireless networks. In: IEEE Pacific Rim (PacRim) Conference on Communications, Computers and Signal Processing (2011)
Wilhelm, M., et al.: Reactive jamming in wireless networks: how realistic is the threat\(\tau \). In: Proceedings of WiSec, pp. 47–52 (2011)
Yan, Z., et al.: A survey on trust management for Internet of things. J. Netw. Comput. Appl. 42, 120–134 (2014)
Yang, H., et al.: Provably secure three-party authenticated key agreement protocol using smart cards. Comput. Netw. 58, 29–38 (2014)
Yao, G., et al.: Passive IP traceback: disclosing the locations of ip spoofers from path backscatter. IEEE Trans. Inf. Forensics Security 10(3), 471–484 (2015)
Zhang, Z., et al.: ECG-cryptography and authentication in body area networks. IEEE Trans. Inf. Technol. Biomed. 16(6), 1070–1078 (2012)
Zhou, J., et al.: Securing m-healthcare social networks: challenges, countermeasures and future directions. IEEE Wirel. Commun. 20(4) (2013)
Acknowledgments
This work was supported in part by Anna University recognized Research Center Lab at Francis Xavier Engineering College, Tirunelveli, India.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ratna, S.R., Ravi, R. Scrutiny of unruly and abuse in wireless networks to mitigate physical layer threats using discriminate based misbehavior prevention. Cluster Comput 19, 87–97 (2016). https://doi.org/10.1007/s10586-015-0529-6
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-015-0529-6