Abstract
Using new methodologies such as Blockchain in data communications in wireless sensor networks (WSN) has emerged owing to the proliferation of collaborative technologies. However, the WSN is still vulnerable to denial of service cyber attacks, in which jamming attack becomes prevalent in blocking data communications in WSN. The jamming attack launches malicious sensor nodes to block legitimate data communications by intentional interference. This can in turn cause monitoring disruptions, data loss and other safety-critical issues. In order to address the malicious attacks, this paper proposes an adaptive anti-jamming solution based on Hyperledger Fabric-based Blockchain, named as ABAS, to ensure the reliability and adaptivity of data communication in case of jamming attacks. In order to validate the ABAS solution, we applied the algorithm in healthcare WSN and showed that ABAS has significantly reduce the jamming coverage and energy consumption while maintaining high computational performance.






Similar content being viewed by others
References
Chan, L., Chavez, K. G., Rudolph, H., & Hourani, A. (2020). Hierarchical routing protocols for wireless sensor network: a compressive survey. Wireless Networks, 26(5), 3291–3314.
Modieginyane, K. M., Letswamotse, B. B., Malekian, R., & Abu-Mahfouz, A. M. (2018). Software defined wireless sensor networks application opportunities for efficient network management: a survey. Computers& Electrical Engineering, 66, 274–287.
Mbarek, B., Buhnova, B., & Pitner, T. “Semlas: An efficient secure multi-level authentication scheme for iot-based smart home systems,” In 2019 15th international wireless communications & mobile computing conference (IWCMC). IEEE, 2019, pp. 1373–1378.
Mbarek, B., Jabeur, N., et al. (2019). Ecass: an encryption compression aggregation security scheme for secure data transmission in ambient assisted living systems. Personal and Ubiquitous Computing, 23(5), 793–799.
Xu, H., Zhang, L., Liu, Y., & Cao, B. (2020). Raft based wireless blockchain networks in the presence of malicious jamming. IEEE Wireless Communications Letters, 9(6), 817–821.
Derakhshan, F., & Yousefi, S. (2019). A review on the applications of multiagent systems in wireless sensor networks. Int. J. Distributed Sens. Networks, 15(5), 144–155.
Misra, S., Roy, S. K., Roy, A., Obaidat, M. S., & Jha, A. (2020). MEGAN: multipurpose energy-efficient, adaptable, and low-cost wireless sensor node for the internet of things. IEEE Systems Journal, 14(1), 144–151.
Mbarek, B., Ge, M., & Pitner, T. (2019). “Self-adaptive rfid authentication for internet of things,” In International conference on advanced information networking and applications (pp. 1094–1105), Springer.
Guan, Y., & Ge, X. (2017). Distributed secure estimation over wireless sensor networks against random multichannel jamming attacks. IEEE Access, 5, 10858–10870.
Mbarek, B., Ge, M., & Pitner, T. (2020). “Enhanced network intrusion detection system protocol for internet of things,” In Proceedings of the 35th annual ACM symposium on applied computing (pp. 1156–1163).
Wang, K., Yuan, L., Miyazaki, T., Chen, Y., & Zhang, Y. (2018). Jamming and eavesdropping defense in green cyber-physical transportation systems using a stackelberg game. IEEE Transactions on Industrial Informatics, 14(9), 4232–4242.
Rose, S. G. H., & Jayasree, T. (2019). Detection of jamming attack using timestamp for WSN. Ad Hoc Networks, 91, 101–174.
Mbarek, B., Ge, M., & Pitner, T. (2020). An efficient mutual authentication scheme for internet of things. Internet of Things, 9, 100–160.
Osanaiye, O. A., Alfa, A. S., & Hancke, G. P. (2018). A statistical approach to detect jamming attacks in wireless sensor networks. Sensors, 18(6), 1691.
Vadlamani, S., Eksioglu, B., Medal, H., & Nandi, A. (2016). Jamming attacks on wireless networks: a taxonomic survey. International Journal of Production Economics, 172, 76–94.
Heo, J., Kim, J.-J., Bahk, S., & Paek, J. (2017). “Dodge-jam: Anti-jamming technique for low-power and lossy wireless networks,” In 2017 14th annual IEEE international conference on sensing, communication, and networking (SECON) (pp. 1–9) IEEE.
Strasser, M., Danev, B., & Čapkun, S. (2010). Detection of reactive jamming in sensor networks. ACM Transactions on Sensor Networks (TOSN), 7(2), 1–29.
Li, Y., Wang, X., Liu, D., Guo, Q., Liu, X., Zhang, J., & Xu, Y. (2019). On the performance of deep reinforcement learning-based anti-jamming method confronting intelligent jammer. Applied Sciences, 9(7), 1361.
Wu, D., Han, X., Ma, J., & Wang, R. (2019). Efficient anti-jamming attack mechanism for connected health networks. IEEE Internet Computing, 24(2), 39–47.
Sasikala, E., & Rengarajan, N. (2015). An intelligent technique to detect jamming attack in wireless sensor networks (wsns). International Journal of Fuzzy Systems, 17(1), 76–83.
Tereshko, V., & Loengarov, A. (2005). Collective decision making in honey-bee foraging dynamics. Computing and Information Systems, 9(3), 1.
Zhang, D., Guan, X., Tang, Y., & Tang, Y. (2011). “Modified artificial bee colony algorithms for numerical optimization,” In 3rd international workshop on intelligent systems and applications (pp. 1–4) IEEE.
Shaw, M. (2000). “Software engineering education: a roadmap,” In Proceedings of the conference on The future of software engineering (pp. 371–380) ACM.
Strasser, M., Pöpper, C., & Čapkun, S. (2009). “Efficient uncoordinated fhss anti-jamming communication,” In Proceedings of the tenth ACM international symposium on mobile ad hoc networking and computing (pp. 207–218).
Xu, W., Wood, T., Trappe, W., & Zhang, Y. (2004). “Channel surfing and spatial retreats: defenses against wireless denial of service,” In Proceedings of the 3rd ACM workshop on wireless security (pp. 80–89).
Del-Valle-Soto, C., Mex-Perera, C., Monroy, R., & Nolazco-Flores, J. A. (2017). Mph-m, aodv-m and dsr-m performance evaluation under jamming attacks. Sensors, 17(7), 1573.
Liu, L., Han, G., Chan, S., & Guizani, M. (2018). An snr-assured anti-jamming routing protocol for reliable communication in industrial wireless sensor networks. IEEE Communications Magazine, 56(2), 23–29.
Calvaresi, D., Dubovitskaya, A., Calbimonte, J. P., Taveter, K., & Schumacher, M. (2018). “Multi-agent systems and blockchain: results from a systematic literature review,” In International conference on practical applications of agents and multi-agent systems (pp. 110–126), Springer.
Fung, C. J., Baysal, O., Zhang, J., Aib, I., & Boutaba, R. (2008). “Trust management for host-based collaborative intrusion detection,” In International workshop on distributed systems: operations and management (pp. 109–122), Springer.
Kvaternik, K., Laszka, A., Walker, M., Schmidt, D., Sturm, M., & Dubey, A. (2017). et al., “Privacy-preserving platform for transactive energy systems,” arXiv preprint arXiv:1709.09597
Liang, G., Weller, S. R., Luo, F., Zhao, J., & Dong, Z. Y. (2018). Distributed blockchain-based data protection framework for modern power systems against cyber attacks. IEEE Transactions on Smart Grid, 10(3), 3162–3173.
Cui, P., & Guin, U. (2019). “Countering botnet of things using blockchain-based authenticity framework,” In 2019 IEEE computer society annual symposium on VLSI (ISVLSI) (pp. 598–603), IEEE.
Javaid, U., Siang, A. K., Aman, M. N., & Sikdar, B. (2018). “Mitigating lot device based ddos attacks using blockchain,” In Proceedings of the 1st workshop on cryptocurrencies and blockchains for distributed systems (pp. 71–76).
Kumar, P., Kumar, R., Gupta, G. P., & Tripathi, R. (2021). A distributed framework for detecting ddos attacks in smart contract-based blockchain-iot systems by leveraging fog computing. Transactions on Emerging Telecommunications Technologies, 32(6), e4112.
Pintea, C.-M., & Pop, P. C. (2014). “Sensitive ants for denial jamming attack on wireless sensor network,” In International joint conference SOCO’13-CISIS’13-ICEUTE’13 (pp. 409–418), Springer.
Mpitziopoulos, A., & Gavalas, D. (2009). An effective defensive node against jamming attacks in sensor networks. Security and Communication Networks, 2(2), 145–163.
Djuraev, S., Choi, J.-G., Sohn, K.-S., & Nam, S. Y. (2017). Channel hopping scheme to mitigate jamming attacks in wireless lans. EURASIP Journal on Wireless Communications and Networking, 2017(1), 11.
Yuan, Y., & Wang, F.-Y. (2016). “Towards blockchain-based intelligent transportation systems,” In 2016 IEEE 19th international conference on intelligent transportation systems (ITSC) (pp. 2663–2668) IEEE.
Sukhwani, H., Wang, N., Trivedi, K. S., & Rindos, A. (2018). “Performance modeling of hyperledger fabric (permissioned blockchain network),” In 2018 IEEE 17th international symposium on network computing and applications (NCA) (pp. 1–8) IEEE.
Kulaib, A., Shubair, R., Al-Qutayri, M., & Ng, J. W. (2011). “An overview of localization techniques for wireless sensor networks,” In 2011 international conference on innovations in information technology (pp. 167–172) IEEE.
So, J., & Vaidya, N. H. (2004). “Multi-channel mac for ad hoc networks: handling multi-channel hidden terminals using a single transceiver,” In Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing (pp. 222–233).
Adem, N., Hamdaoui, B., & Yavuz, A. (2016). Mitigating jamming attacks in mobile cognitive networks through time hopping. Wireless Communications and Mobile Computing, 16(17), 3004–3014.
Grover, K., Lim, A., & Yang, Q. (2014). Jamming and anti-jamming techniques in wireless networks: a survey. International Journal of Ad Hoc and Ubiquitous Computing, 17(4), 197–215.
Xu, X., Sun, G., Luo, L., Cao, H., Yu, H., & Vasilakos, A. V. (2021). Latency performance modeling and analysis for hyperledger fabric blockchain network. Information Processing& Management, 58(1), 102436.
Zhu, Q., & Basar, T. (2011). “Indices of power in optimal IDS default configuration: Theory and examples,” In J.S. Baras, J. Katz, E. Altman, (Eds.) Decision and game theory for security - second international conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings, ser. Lecture Notes in Computer Science (vol. 7037, pp. 7–21). Springer.
Tsiropoulou, E., Baras, J. S., Papavassiliou, S., & Qu, G. (2016). “On the mitigation of interference imposed by intruders in passive RFID networks,” In Decision and game theory for security - 7th international conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, proceedings, ser. Lecture notes in computer science (vol. 9996, pp. 62–80), Springer.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Mbarek, B., Ge, M. & Pitner, T. An adaptive anti-jamming system in HyperLedger-based wireless sensor networks. Wireless Netw 28, 691–703 (2022). https://doi.org/10.1007/s11276-022-02886-1
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-022-02886-1