Skip to main content

Advertisement

Log in

Jammed Node Detection and Routing in a Multihop Wireless Sensor Network Using Hybrid Techniques

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Wireless sensor networks are susceptible to various Denial-of-Service attacks due to their open deployment. Jamming attack at the physical layer is a type of Denial-of-Service attack in which an adversary node prevents channel access or disrupts the communication between the nodes by emitting noise signals. Due to this, the compromised nodes are interrupted either from sending out packets or receiving packets. As these nodes are unaware of the intrusion, they continuously attempt to access the jammed channel and retransmit lost packets resulting in energy drainage. This energy depletion though primarily leads to node failure, it ultimately reduces network lifetime enforcing intrusion detection. With this intention, a hybrid algorithm based on Fuzzy logic and Ant Colony Optimization for detection of jamming attack is proposed. Detection of jammed node is through fuzzy logic and thereon for successful data routing, Ant Colony Optimization is used. The proposal is simulated in MATLAB and the results are compared with the Ant Colony Optimization technique proposed earlier. The results confirm the supremacy of the proposed hybrid optimization technique over the Ant Colony Optimization.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., & Cayirci, E. (2002). Wireless sensor networks: A survey. Computer Networks, 38, 393–422. https://doi.org/10.1016/S1389-1286(01)00302-4.

    Article  Google Scholar 

  2. Mpitziopoulos, M., Gavalas, D., Konstantopoulos, C., & Pantziou, G. (2009). A survey on jamming attacks and countermeasures in WSNs. IEEE Communications Surveys & Tutorials. https://doi.org/10.1109/SURV.2009.090404.

    Google Scholar 

  3. Li, M., Koutsopoulos, I., & Poovendran, R. (2010). Optimal jamming attack strategies and network defense policies in wireless sensor networks. IEEE Transactions on Mobile Computing, 9, 1119–1133. https://doi.org/10.1109/TMC.2010.75.

    Article  Google Scholar 

  4. Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM international symposium on mobile ad hoc networking and computing, MobiHoc (pp 46–57). https://doi.org/10.1145/1062689.1062697.

  5. Poisel, R. A. (2004). Modern communications jamming principles and techniques. Norwood: Artech House.

    Google Scholar 

  6. Poisel, R. A. (2008). Foundations of communications electronic warfare. Norwood: Artech House.

    Google Scholar 

  7. Xu, W., Ma, K., Trappe, W., & Zhang, Y. (2006). Jamming sensor networks: Attack and defense strategies. IEEE Network. https://doi.org/10.1109/MNET.2006.1637931.

    Google Scholar 

  8. Xu, W., et al. (2004).Channel surfing and spatial retreats: Defenses against wireless denial of service. In Proceedings of ACM workshop (pp. 80–89). https://doi.org/10.1145/1023646.1023661.

  9. Mitziopoulos, A., Gavalas, D., Konstantopoulos, C., & Pantziou, G. (2008). JAID: An algorithm for data fusion and jamming avoidance on distributed sensor networks. Pervasive and Mobile Computing, 5(2), 135–147. https://doi.org/10.1016/j.pmcj.2008.06.001.

    Article  Google Scholar 

  10. Wood, D., Stankovic, J. A., & Son, S. H. (2003). JAM: A jammed-area mapping service for sensor networks. In Proceedings of 24th IEEE international real-time system symposium (pp. 286–297). https://doi.org/10.1109/real.2003.1253275.

  11. Cagalj, M., Capkun, S., & Hubaux, J.-P. (2007). Wormhole-based anti-jamming techniques in sensor networks. IEEE Transcations on Mobile Computing, 6(1), 100–114. https://doi.org/10.1109/TMC.2007.250674.

    Article  Google Scholar 

  12. Sasikala, E., & Rengarajan, N. (2015). An intelligent technique to detect jamming attack in wireless sensor networks (WSNs). International Journal of Fuzzy Systems. https://doi.org/10.1007/s40815-015-0009-4.

    Google Scholar 

  13. Hemavathi, N., & Sudha, S. (2014). A fuzzy based predictive cluster head selection scheme for wireless sensor networks. In the proceedings of 8th international conference on sensing technologgy and  International Journal on Smart Sensing and Intelligent Systems, 560–567.

  14. Nagpal, S. K., & Sudha, S. (2015). Two-level fuzzy based fire prediction scheme using wireless sensor network. In Proceedings of IEEE international conference on advances in computing and communication. https://doi.org/10.1109/icacce.2015.105.

  15. Misra, S., Singh, R., & Mohan, S. V. (2010) Information warfare-worthy jamming attack detection mechanism for wireless sensor networks using a fuzzy interference system. http://cache.jourlib.org/cache?m=8F63B2294C981FDBD15CD6A8F2F768F1.pdfSensors. https://doi.org/10.3390/s100403444.

  16. Rajani, M., & Lisa, A. O. (2006). Jamming attack detection and countermeasures in wireless sensor network using ant system. SPIE. https://doi.org/10.1117/12.666330.

    Google Scholar 

  17. Dorigo, M., & di Caro, G. (1999). Ant colony optimization: A new meta-heuristic. In Proceedings of congress on evolutionary computation (pp. 1470–1477). https://doi.org/10.1109/cec.1999.782657.

  18. Zadeh, L. A. (1965). Fuzzy sets. Information and Control, 8, 338–353.

    Article  MathSciNet  MATH  Google Scholar 

  19. Umamaheswari, D., Meenalochani, M., & Sudha, S (2016). Influence of the cluster head position on the lifetime of wireless sensor network—A case study. In 2nd IEEE international conference on next generation computing technologies (NGCT). https://doi.org/10.1109/ngct.2016.7877445.

  20. Hemavathi, N., Nagpal, S. K., & Sudha, S. (2017). Impact of rate of recurrent communication of sensor node on network lifetime in a wireless sensor network. IET Science, Measurement and Technology. https://doi.org/10.1049/iet-smt.2016.0290.

    Google Scholar 

  21. Meenalochani M, Sudha S (2014) Fuzzy based estimation of received signal strength in a wireless sensor network. In Proceedings of the 3rd ACM international symposium on women in computing and informatics (pp. 624–628). https://doi.org/10.1145/2791405.2791543.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Sudha.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Meenalochani, M., Sudha, S. Jammed Node Detection and Routing in a Multihop Wireless Sensor Network Using Hybrid Techniques. Wireless Pers Commun 104, 663–675 (2019). https://doi.org/10.1007/s11277-018-6042-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-018-6042-5

Keywords

Navigation