Skip to main content

Advertisement

Log in

An adaptive anti-jamming system in HyperLedger-based wireless sensor networks

  • Original Paper
  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Using new methodologies such as Blockchain in data communications in wireless sensor networks (WSN) has emerged owing to the proliferation of collaborative technologies. However, the WSN is still vulnerable to denial of service cyber attacks, in which jamming attack becomes prevalent in blocking data communications in WSN. The jamming attack launches malicious sensor nodes to block legitimate data communications by intentional interference. This can in turn cause monitoring disruptions, data loss and other safety-critical issues. In order to address the malicious attacks, this paper proposes an adaptive anti-jamming solution based on Hyperledger Fabric-based Blockchain, named as ABAS, to ensure the reliability and adaptivity of data communication in case of jamming attacks. In order to validate the ABAS solution, we applied the algorithm in healthcare WSN and showed that ABAS has significantly reduce the jamming coverage and energy consumption while maintaining high computational performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Chan, L., Chavez, K. G., Rudolph, H., & Hourani, A. (2020). Hierarchical routing protocols for wireless sensor network: a compressive survey. Wireless Networks, 26(5), 3291–3314.

    Article  Google Scholar 

  2. Modieginyane, K. M., Letswamotse, B. B., Malekian, R., & Abu-Mahfouz, A. M. (2018). Software defined wireless sensor networks application opportunities for efficient network management: a survey. Computers& Electrical Engineering, 66, 274–287.

    Article  Google Scholar 

  3. Mbarek, B., Buhnova, B., & Pitner, T. “Semlas: An efficient secure multi-level authentication scheme for iot-based smart home systems,” In 2019 15th international wireless communications & mobile computing conference (IWCMC). IEEE, 2019, pp. 1373–1378.

  4. Mbarek, B., Jabeur, N., et al. (2019). Ecass: an encryption compression aggregation security scheme for secure data transmission in ambient assisted living systems. Personal and Ubiquitous Computing, 23(5), 793–799.

    Article  Google Scholar 

  5. Xu, H., Zhang, L., Liu, Y., & Cao, B. (2020). Raft based wireless blockchain networks in the presence of malicious jamming. IEEE Wireless Communications Letters, 9(6), 817–821.

    Article  Google Scholar 

  6. Derakhshan, F., & Yousefi, S. (2019). A review on the applications of multiagent systems in wireless sensor networks. Int. J. Distributed Sens. Networks, 15(5), 144–155.

    Google Scholar 

  7. Misra, S., Roy, S. K., Roy, A., Obaidat, M. S., & Jha, A. (2020). MEGAN: multipurpose energy-efficient, adaptable, and low-cost wireless sensor node for the internet of things. IEEE Systems Journal, 14(1), 144–151.

    Article  Google Scholar 

  8. Mbarek, B., Ge, M., & Pitner, T. (2019). “Self-adaptive rfid authentication for internet of things,” In International conference on advanced information networking and applications (pp. 1094–1105), Springer.

  9. Guan, Y., & Ge, X. (2017). Distributed secure estimation over wireless sensor networks against random multichannel jamming attacks. IEEE Access, 5, 10858–10870.

    Article  Google Scholar 

  10. Mbarek, B., Ge, M., & Pitner, T. (2020). “Enhanced network intrusion detection system protocol for internet of things,” In Proceedings of the 35th annual ACM symposium on applied computing (pp. 1156–1163).

  11. Wang, K., Yuan, L., Miyazaki, T., Chen, Y., & Zhang, Y. (2018). Jamming and eavesdropping defense in green cyber-physical transportation systems using a stackelberg game. IEEE Transactions on Industrial Informatics, 14(9), 4232–4242.

    Article  Google Scholar 

  12. Rose, S. G. H., & Jayasree, T. (2019). Detection of jamming attack using timestamp for WSN. Ad Hoc Networks, 91, 101–174.

    Google Scholar 

  13. Mbarek, B., Ge, M., & Pitner, T. (2020). An efficient mutual authentication scheme for internet of things. Internet of Things, 9, 100–160.

    Article  Google Scholar 

  14. Osanaiye, O. A., Alfa, A. S., & Hancke, G. P. (2018). A statistical approach to detect jamming attacks in wireless sensor networks. Sensors, 18(6), 1691.

    Article  Google Scholar 

  15. Vadlamani, S., Eksioglu, B., Medal, H., & Nandi, A. (2016). Jamming attacks on wireless networks: a taxonomic survey. International Journal of Production Economics, 172, 76–94.

    Article  Google Scholar 

  16. Heo, J., Kim, J.-J., Bahk, S., & Paek, J. (2017). “Dodge-jam: Anti-jamming technique for low-power and lossy wireless networks,” In 2017 14th annual IEEE international conference on sensing, communication, and networking (SECON) (pp. 1–9) IEEE.

  17. Strasser, M., Danev, B., & Čapkun, S. (2010). Detection of reactive jamming in sensor networks. ACM Transactions on Sensor Networks (TOSN), 7(2), 1–29.

    Article  Google Scholar 

  18. Li, Y., Wang, X., Liu, D., Guo, Q., Liu, X., Zhang, J., & Xu, Y. (2019). On the performance of deep reinforcement learning-based anti-jamming method confronting intelligent jammer. Applied Sciences, 9(7), 1361.

    Article  Google Scholar 

  19. Wu, D., Han, X., Ma, J., & Wang, R. (2019). Efficient anti-jamming attack mechanism for connected health networks. IEEE Internet Computing, 24(2), 39–47.

    Article  Google Scholar 

  20. Sasikala, E., & Rengarajan, N. (2015). An intelligent technique to detect jamming attack in wireless sensor networks (wsns). International Journal of Fuzzy Systems, 17(1), 76–83.

    Article  Google Scholar 

  21. Tereshko, V., & Loengarov, A. (2005). Collective decision making in honey-bee foraging dynamics. Computing and Information Systems, 9(3), 1.

    Google Scholar 

  22. Zhang, D., Guan, X., Tang, Y., & Tang, Y. (2011). “Modified artificial bee colony algorithms for numerical optimization,” In 3rd international workshop on intelligent systems and applications (pp. 1–4) IEEE.

  23. Shaw, M. (2000). “Software engineering education: a roadmap,” In Proceedings of the conference on The future of software engineering (pp. 371–380) ACM.

  24. Strasser, M., Pöpper, C., & Čapkun, S. (2009). “Efficient uncoordinated fhss anti-jamming communication,” In Proceedings of the tenth ACM international symposium on mobile ad hoc networking and computing (pp. 207–218).

  25. Xu, W., Wood, T., Trappe, W., & Zhang, Y. (2004). “Channel surfing and spatial retreats: defenses against wireless denial of service,” In Proceedings of the 3rd ACM workshop on wireless security (pp. 80–89).

  26. Del-Valle-Soto, C., Mex-Perera, C., Monroy, R., & Nolazco-Flores, J. A. (2017). Mph-m, aodv-m and dsr-m performance evaluation under jamming attacks. Sensors, 17(7), 1573.

    Article  Google Scholar 

  27. Liu, L., Han, G., Chan, S., & Guizani, M. (2018). An snr-assured anti-jamming routing protocol for reliable communication in industrial wireless sensor networks. IEEE Communications Magazine, 56(2), 23–29.

    Article  Google Scholar 

  28. Calvaresi, D., Dubovitskaya, A., Calbimonte, J. P., Taveter, K., & Schumacher, M. (2018). “Multi-agent systems and blockchain: results from a systematic literature review,” In International conference on practical applications of agents and multi-agent systems (pp. 110–126), Springer.

  29. Fung, C. J., Baysal, O., Zhang, J., Aib, I., & Boutaba, R. (2008). “Trust management for host-based collaborative intrusion detection,” In International workshop on distributed systems: operations and management (pp. 109–122), Springer.

  30. Kvaternik, K., Laszka, A., Walker, M., Schmidt, D., Sturm, M., & Dubey, A. (2017). et al., “Privacy-preserving platform for transactive energy systems,” arXiv preprint arXiv:1709.09597

  31. Liang, G., Weller, S. R., Luo, F., Zhao, J., & Dong, Z. Y. (2018). Distributed blockchain-based data protection framework for modern power systems against cyber attacks. IEEE Transactions on Smart Grid, 10(3), 3162–3173.

    Article  Google Scholar 

  32. Cui, P., & Guin, U. (2019). “Countering botnet of things using blockchain-based authenticity framework,” In 2019 IEEE computer society annual symposium on VLSI (ISVLSI) (pp. 598–603), IEEE.

  33. Javaid, U., Siang, A. K., Aman, M. N., & Sikdar, B. (2018). “Mitigating lot device based ddos attacks using blockchain,” In Proceedings of the 1st workshop on cryptocurrencies and blockchains for distributed systems (pp. 71–76).

  34. Kumar, P., Kumar, R., Gupta, G. P., & Tripathi, R. (2021). A distributed framework for detecting ddos attacks in smart contract-based blockchain-iot systems by leveraging fog computing. Transactions on Emerging Telecommunications Technologies, 32(6), e4112.

    Google Scholar 

  35. Pintea, C.-M., & Pop, P. C. (2014). “Sensitive ants for denial jamming attack on wireless sensor network,” In International joint conference SOCO’13-CISIS’13-ICEUTE’13 (pp. 409–418), Springer.

  36. Mpitziopoulos, A., & Gavalas, D. (2009). An effective defensive node against jamming attacks in sensor networks. Security and Communication Networks, 2(2), 145–163.

    Article  Google Scholar 

  37. Djuraev, S., Choi, J.-G., Sohn, K.-S., & Nam, S. Y. (2017). Channel hopping scheme to mitigate jamming attacks in wireless lans. EURASIP Journal on Wireless Communications and Networking, 2017(1), 11.

    Article  Google Scholar 

  38. Yuan, Y., & Wang, F.-Y. (2016). “Towards blockchain-based intelligent transportation systems,” In 2016 IEEE 19th international conference on intelligent transportation systems (ITSC) (pp. 2663–2668) IEEE.

  39. Sukhwani, H., Wang, N., Trivedi, K. S., & Rindos, A. (2018). “Performance modeling of hyperledger fabric (permissioned blockchain network),” In 2018 IEEE 17th international symposium on network computing and applications (NCA) (pp. 1–8) IEEE.

  40. Kulaib, A., Shubair, R., Al-Qutayri, M., & Ng, J. W. (2011). “An overview of localization techniques for wireless sensor networks,” In 2011 international conference on innovations in information technology (pp. 167–172) IEEE.

  41. So, J., & Vaidya, N. H. (2004). “Multi-channel mac for ad hoc networks: handling multi-channel hidden terminals using a single transceiver,” In Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing (pp. 222–233).

  42. Adem, N., Hamdaoui, B., & Yavuz, A. (2016). Mitigating jamming attacks in mobile cognitive networks through time hopping. Wireless Communications and Mobile Computing, 16(17), 3004–3014.

    Article  Google Scholar 

  43. Grover, K., Lim, A., & Yang, Q. (2014). Jamming and anti-jamming techniques in wireless networks: a survey. International Journal of Ad Hoc and Ubiquitous Computing, 17(4), 197–215.

    Article  Google Scholar 

  44. Xu, X., Sun, G., Luo, L., Cao, H., Yu, H., & Vasilakos, A. V. (2021). Latency performance modeling and analysis for hyperledger fabric blockchain network. Information Processing& Management, 58(1), 102436.

    Article  Google Scholar 

  45. Zhu, Q., & Basar, T. (2011). “Indices of power in optimal IDS default configuration: Theory and examples,” In J.S. Baras, J. Katz, E. Altman, (Eds.) Decision and game theory for security - second international conference, GameSec 2011, College Park, MD, Maryland, USA, November 14-15, 2011. Proceedings, ser. Lecture Notes in Computer Science (vol. 7037, pp. 7–21). Springer.

  46. Tsiropoulou, E., Baras, J. S., Papavassiliou, S., & Qu, G. (2016). “On the mitigation of interference imposed by intruders in passive RFID networks,” In Decision and game theory for security - 7th international conference, GameSec 2016, New York, NY, USA, November 2-4, 2016, proceedings, ser. Lecture notes in computer science (vol. 9996, pp. 62–80), Springer.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bacem Mbarek.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mbarek, B., Ge, M. & Pitner, T. An adaptive anti-jamming system in HyperLedger-based wireless sensor networks. Wireless Netw 28, 691–703 (2022). https://doi.org/10.1007/s11276-022-02886-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-022-02886-1

Keywords

Navigation