Skip to main content
Log in

An Intelligent Technique to Detect Jamming Attack in Wireless Sensor Networks (WSNs)

  • Published:
International Journal of Fuzzy Systems Aims and scope Submit manuscript

Abstract

Due to open share of physical medium, the wireless sensor networks have become vulnerable to jamming attacks. As such, attacks kindle strong interferences resulting in denial of service. This paper attempts to detect jamming attack, and a defence mechanism is proposed using artificial bee colony. The proposed method can be simulated using MATLAB. Simulation results expose the effectiveness of the proposed method which could defeat the jamming attack and maintain the considerable performance of the overall network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Vidya, S., et al.: Multiagent based multipath routing in wireless sensor networks. Int. J. Wirel. Mob. Netw. 6(2), 67–88 (2014)

    Article  MathSciNet  Google Scholar 

  2. Akyildiz, I.F., et al.: Wireless sensor networks: a survey. Comput. Netw. 38, 393–422 (2002)

    Article  Google Scholar 

  3. Adamy, D.L., Adamy, D.: EW 102: A Second Course in Electronic Warfare. Artech House Publishers, Norwood (2004)

    Google Scholar 

  4. Shi, E., Perrig, A.: Designing secure sensor networks. Wirel. Commun. Mag. 11(6), 38–43 (2004)

    Article  Google Scholar 

  5. Wood, A. D., et al.: JAM: a jammed-area mapping service for sensor networks, In: 24th IEEE Real-Time Systems Symposium (RTSS 2003), 286–297, (2003)

  6. Xu, W., et al.: The feasibility of launching and detecting jamming attacks in wireless networks, In: Proceedings of the 6th ACM International Symposium on Mobile ad hoc Networking and Computing, Alexandria, 46–57, (2005)

  7. Kartik, S., et al: Fast jamming detection in sensor networks, IEEE International Conference on Communications, 934–938, (2012)

  8. Spuhler, M., et al.: Detection of reactive jamming in DSSS-based wireless communications. IEEE Trans. Wirel. Commun. 13(3), 1593–1603 (2014)

    Article  Google Scholar 

  9. Çakiroǧlu, M., Özcerit, A.T.: Design and evaluation of a query-based jamming detection algorithm for wireless sensor networks. Turk. J. Electr. Eng. Comput. Sci. 19(1), 1–19 (2011)

    Google Scholar 

  10. Sudip, M., et al.: Information warfare-worthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system. Sensors 10, 3444–3479 (2010)

    Article  Google Scholar 

  11. Rajani, M., Lisa, A. O.: Jamming attack detection and countermeasures in wireless sensor network using ant system. http://www.cognitiveintelligence.com/documents/SPIE (2006) Accessed 12 Oct 2009

  12. Liu, Qiang, et al.: A bio-inspired jamming detection and restoration for WMNs. In: Peng, Weizhou, Yangyang, Hu, Chen, Haiqing (eds.) View of Adaptive Immunology, pp. 243–257. Springer International Publishing Switzerland, Bellinzona (2013)

    Google Scholar 

  13. Anthony, D.W., et al.: DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-Based Wireless Networks. SECON 2007, San Diego (2007)

    Google Scholar 

  14. Tereshko, V., Loengarov, A.: Collective decision-making in honeybee foraging dynamics. Comput. Informat. Syst. J 9(3), 1–7 (2005)

    Google Scholar 

  15. Bonabeau, E., et al.: Swarm Intelligence: From Natural to Artificial Systems. Oxford University Press, New York (1999)

    MATH  Google Scholar 

  16. Asaju La’aro, B., et al.: University course timetabling using hybridized artificial bee colony with hill climbing optimizer. J. Comput. Sci. 5(5), 809–818 (2014)

    Article  Google Scholar 

  17. Zhang D., et al.: Modified artificial bee colony algorithms for numerical optimization, 3rd International Workshop on Intelligent Systems and Applications (ISA), Wuhan, 1–4, (2011)

  18. Karaboga, Dervis: Artificial bee colony algorithm. Scholarpedia 5(3), 6915 (2010)

    Article  Google Scholar 

  19. Seeley, The: Wisdom of the Hive. Harvard University Press, Cambridge (2005)

    Google Scholar 

  20. Eltahir, I.K: The impact of different radio propagation models for mobile ad hoc networks (MANET) in urban area environment, In: 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, (2007)

  21. Perkins, C., et al.: Ad hoc On-demand Distance Vector (AODV) Routing. Kluwer Academic Publishers, New York (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. Sasikala.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sasikala, E., Rengarajan, N. An Intelligent Technique to Detect Jamming Attack in Wireless Sensor Networks (WSNs). Int. J. Fuzzy Syst. 17, 76–83 (2015). https://doi.org/10.1007/s40815-015-0009-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s40815-015-0009-4

Keywords

Navigation