Skip to main content
Log in

A novel countermeasure technique for reactive jamming attack in internet of things

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In recent years, Internet of Things (IoT) has attracted significant attention because of its wide range of applications in various domains. However, security is a growing concern as users of small devices in an IoT network are unable to defend themselves against reactive jamming attacks. These attacks negatively affect the performance of devices and hinder IoT operations. To address such an issue, this paper presents a novel countermeasure detection and consistency algorithm (CDCA), which aims to fight reactive jamming attacks on IoT networks. The proposed CDCA uses a change in threshold value to detect and treat an attack. The algorithm employs channel signal strength to check packet consistency by determining if the data transmission value contradicts the threshold value. The node that sends the threshold value is periodically checked and the threshold value is compared with the current value after data transmission to find out if an attack has occurred in the network. Based on realistic simulation scenarios (e.g., with varying traffic interval, number of malicious nodes, and random mobility patterns), the performance of the proposed CDCA is evaluated using a Cooja simulator. Simulation results demonstrate the superiority of the proposed technique compared with contemporary schemes in terms of performance metrics such as energy consumption, traffic delay, and network throughput.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Abdalzaher MS, Seddik K, Elsabrouty M, Muta O, Furukawa H, Abdel-Rahman A (2016) Game theory meets wireless sensor networks security requirements and threats mitigation: A survey. Sensors (Switzerland) 16(7):22–27

    Article  Google Scholar 

  2. Aman W, Snekkenes E (2015) Managing Security trade-offs in the internet of things using adaptive security. In Internet Technology and Secured Transactions (ICITST), 2015 10th International Conference for (pp. 362-368). IEEE

  3. Babar SD, Prasad NR, Prasad R (2013) Jamming attack: Behavioral modelling and analysis. In Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), 2013 3rd International Conference on (pp. 1-5). IEEE

  4. Babar S, Stango A, Prasad N, Sen J, Prasad R (2011) Proposed embedded security framework for internet of things (iot). In Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference on (pp. 1-5). IEEE

  5. Derhab A, Bouras A, Senouci MR, Imran M (2014) Fortifying intrusion detection systems in dynamic Ad Hoc and wireless sensor networks. Int J Distrib Sens Netw 10(12):608162

    Article  Google Scholar 

  6. Ergul E (2017) Relative attribute based incremental learning for image recognition. CAAI Trans Intell Technol 2(1):1–11

    Article  Google Scholar 

  7. Fadele AA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things Security: A Survey. J Netw Comput Appl 88:10–28

    Article  Google Scholar 

  8. Fu H, Chen H, Zhu Y, Yu W (2017) FARMS : Efficient mapreduce speculation for failure recovery in short jobs. Parallel Comput 61:68–82

    Article  MathSciNet  Google Scholar 

  9. Ganeshkumar P, Vijayakumar KP, Anandaraj M (2016) A novel jammer detection framework for cluster-based wireless sensor networks. EURASIP J Wirel Commun Netw 2016(1):35

    Article  Google Scholar 

  10. Goyal D, Tripathy MR (2012) Routing protocols in wireless sensor networks: A survey. In 2012 Second International Conference on Advanced Computing & Communication Technologies (pp. 474-480). IEEE

  11. Hatzivasilis G, Papaefstathiou I, Manifavas C (2017) SCOTRES: Secure Routing for IoT and CPS. IEEE Internet Things J 73100(c):1–1

    Google Scholar 

  12. Heo J, Kim J, Bahk S (2017) Dodge-Jam : Anti-Jamming Technique for Low-power and Lossy Wireless Networks. IEEE Access 2(3):345–359

    Google Scholar 

  13. Huang K, Zhang Q, Zhou C, Xiong N, Qin Y (2017) An efficient intrusion detection approach for visual sensor networks based on traffic pattern learning. IEEE Trans Syst Man Cybern Part A Syst Hum 47(10):2704–2713

    Article  Google Scholar 

  14. Kasinathan P, Pastrone C, Spirito MA, Vinkovits M (2013) Denial-of-Service detection in 6LoWPAN based Internet of Things. In 2013 IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob) (pp. 600-607). IEEE

  15. Lee JJ, Lim J (2012) Effective and efficient jamming based on routing in wireless ad hoc networks. IEEE Commun Lett 16(11):1903–1906

    Article  Google Scholar 

  16. Li S, Tryfonas T, Li H (2016) The Internet of Things: a security point of view. Internet Res 26(2):337–359

    Article  Google Scholar 

  17. Liu H, Hu L, Ma L (2017) Online RGB-D person re-identification based on metric model update. CAAI Trans Intell Technol 2(1):48–55

    Article  Google Scholar 

  18. Lu C (2014) Overview of Security and Privacy Issues in the Internet of Things. 1–11

  19. Lu Y, Wu S, Fang Z, Xiong N, Yoon S, Park DS (2017) Exploring finger vein based personal authentication for secure IoT. Futur Gener Comput Syst 77:149–160

    Article  Google Scholar 

  20. Mpitziopoulos A, Gavalas D, Konstantopoulos C, Pantziou G (2014) A survey on jamming attacks and countermeasures in WSNs. IEEE Commun Surv Tutorials 11(4):42–56

    Article  Google Scholar 

  21. Nolin J, Olson N (2016) The Internet of Things and convenience. Internet Res 26(2):360–376

    Article  Google Scholar 

  22. Pei E, Han H, Sun Z, Shen B, Zhang T (2015) LEAUCH: low-energy adaptive uneven clustering hierarchy for cognitive radio sensor network. EURASIP J Wirel Commun Netw 2015(1):122

    Article  Google Scholar 

  23. Qiu Y, Ma M (2016) A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN. IEEE Trans Ind Informatics 12(6):2074–2085

    Article  Google Scholar 

  24. Raymond DR, Marchany RC, Brownfield MI, Midkiff SF (2011) Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. IEEE Trans Veh Technol 58(1):367–380

    Article  Google Scholar 

  25. Rehab I, Tian X, Gu F, Ball AD (2018) The influence of rolling bearing clearances on diagnostic signatures based on a numerical simulation and experimental evaluation. Int J Hydromechatronics 1(1):16–46

    Article  Google Scholar 

  26. Restuccia F, D'Oro S, Melodia T (2018) Securing the Internet of Things: New Perspectives and Research Challenges. arXiv preprint arXiv:1803.05022

  27. Sankaran S (2016) Lightweight security framework for IoTs using identity based cryptography. In Advances in Computing, Communications and Informatics (ICACCI), 2016 International Conference on (pp. 880-886). IEEE

  28. Strasser M, Danev B, Čapkun S (2010) Detection of reactive jamming in sensor networks. ACM Trans Sens Networks 7(2):1–29

    Article  Google Scholar 

  29. Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: A review. Proc - 2012 Int Conf Comput Sci Electron Eng ICCSEE 2012 3:648–651

    Google Scholar 

  30. Tarkowski M, Rzymowski M, Kulas L, Nyka K (2017) Improved jamming resistance using electronically steerable parasitic antenna radiator. 17th IEEE Int Conf Smart Technol EUROCON 2017 - Conf. Proc, pp 6–8

  31. Romdhani I, Qasem M, Al-Dubai AY, Ghaleb B (2016) Cooja simulator manual. Edinburgh Napier University

  32. Weber SG, Martucci LA, Ries S, Mühlhäuser M (2010) Towards trustworthy identity and access management for the future internet. In Proc. 4th International Workshop on Trustworthy Internet of People, Things & Services (IoPTS) (Vol. 29)

  33. Wood AD, Stankovic JA, Zhou G (2011) DEEJAM : Defeating Energy-Efficient Networks. IEEE Sensors J 2(3):60–69

    Google Scholar 

  34. Xu W, Ma K, Trappe W, Zhang Y (2013) Jamming sensor networks: Attack and defense strategies. IEEE Netw 20(3):41–47

    Google Scholar 

  35. Yang X, Xie L, Han J, Wang Z (2017) Cognitive-affective regulation process for micro-expressions based on Gaussian cloud distribution. CAAI Trans Intell Technol 2(1):56–61

    Article  Google Scholar 

  36. Yaqoob I et al (2017) The rise of ransomware and emerging security challenges in the Internet of Things. Comput Netw 129:444–458

    Article  Google Scholar 

  37. Zhang W, Zhu S, Tang J, Xiong N (2018) A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks. J Supercomput 74(4):1779–1801

    Article  Google Scholar 

  38. Zou Y, Zhu J, Wang X, Hanzo L (2016) A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proc IEEE 104(9):1727–1765

    Article  Google Scholar 

Download references

Acknowledgments

The work is supported by Geran Bantuan Khas Penyelidikan (BKS084-2017) and Deanship of Scientific Research at King Saud University through Research Group Project NO. (RG-1435-051).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Alaba Ayotunde Fadele, Mazliza Othman or Ibrahim Abaker Targio Hashem.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

Table 2 List of Mathematical Notations

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Fadele, A.A., Othman, M., Hashem, I.A.T. et al. A novel countermeasure technique for reactive jamming attack in internet of things. Multimed Tools Appl 78, 29899–29920 (2019). https://doi.org/10.1007/s11042-018-6684-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6684-z

Keywords

Navigation