Open Access   Article Go Back

An Efficient Jamming Node Avoid Secure Routing In Internet of Things

E. Selvi1 , K. Renuka2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-9 , Page no. 334-341, Sep-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i9.334341

Online published on Sep 30, 2018

Copyright © E. Selvi, K. Renuka . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: E. Selvi, K. Renuka, “An Efficient Jamming Node Avoid Secure Routing In Internet of Things,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.9, pp.334-341, 2018.

MLA Style Citation: E. Selvi, K. Renuka "An Efficient Jamming Node Avoid Secure Routing In Internet of Things." International Journal of Computer Sciences and Engineering 6.9 (2018): 334-341.

APA Style Citation: E. Selvi, K. Renuka, (2018). An Efficient Jamming Node Avoid Secure Routing In Internet of Things. International Journal of Computer Sciences and Engineering, 6(9), 334-341.

BibTex Style Citation:
@article{Selvi_2018,
author = {E. Selvi, K. Renuka},
title = {An Efficient Jamming Node Avoid Secure Routing In Internet of Things},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2018},
volume = {6},
Issue = {9},
month = {9},
year = {2018},
issn = {2347-2693},
pages = {334-341},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2869},
doi = {https://doi.org/10.26438/ijcse/v6i9.334341}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i9.334341}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2869
TI - An Efficient Jamming Node Avoid Secure Routing In Internet of Things
T2 - International Journal of Computer Sciences and Engineering
AU - E. Selvi, K. Renuka
PY - 2018
DA - 2018/09/30
PB - IJCSE, Indore, INDIA
SP - 334-341
IS - 9
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
419 456 downloads 287 downloads
  
  
           

Abstract

The shared wireless medium, wireless networks are vulnerable to jamming attacks. These types of attacks can easily be accomplished by an adversary by either bypassing MAC layer protocol or by emitting RF signals. The failure of data transmission in internet of things is due to corruption of packets by jammers. In existing no of defense techniques have been proposed in recent years to deal with these jammer attacks. However, each defense technique is suitable for only a limited network range and consumption energy. The propose jamming detection algorithm based on two problem solving, first one is to improve the energy efficient routing based on power allocation and second one avoids the jamming node using ecliptic curve cryptography to route the secure packet between source to destination. The simulation result shows the better throughput and delay minimization compare with existing routing algorithms.

Key-Words / Index Term

IoT, Wi-Fi Sensor devices, Energy routing, Security, Jamming node, Power allocation

References

[1] L. Hu, H. Wen, B. Wu, J. Tang, and F. Pan, “Adaptive secure transmission for physical layer security in cooperative wireless networks,” IEEE Commun. Lett., vol. 21, no. 3, pp. 524–527, Mar. 2017.
[2] A. Behnad, M. B. Shahbaz, T. J. Willink, and X. Wang, “Statistical analysis and minimization of security vulnerability region in amplify-and-forward cooperative systems,” IEEE Trans. Wireless Commun., vol. 16, no. 4, pp. 2534–2547, Apr. 2017.
[3] Q. Xu, P. Ren, H. Song, and Q. Du, “Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations,” IEEE Access, vol. 4, pp. 2840–2853, 2016
[4] X. Hu, P. Mu, B. Wang, and Z. Li, “On the secrecy rate maximization with uncoordinated cooperative jamming by single-antenna helpers,” IEEE Trans. Veh. Technol., vol. 66, no. 5, pp. 4457–4462, May 2017.
[5] P. Mu, X. Hu, B. Wang, and Z. Li, “Secrecy rate maximization with uncoordinated cooperative jamming by single-antenna helpers under secrecy outage probability constraint,” IEEE Commun. Lett., vol. 19,no. 12, pp. 2174–2177, Dec. 2015.
[6] L. Hu, B. Wu, J. Tang, F. Pan, and H. Wen, “Outage constrained secrecy rate maximization using artificial-noise aided beamforming and cooperative jamming,” in Proc. IEEE ICC, Kuala Lumpur, Malaysia, May 2016, pp. 1–5.
[7] H.-M. Wang, F. Liu, and M. Yang, “Joint cooperative beamforming, jamming, and power allocation to secure AF relay systems,” IEEE Trans. Veh. Technol., vol. 64, no. 10, pp. 4893–4898, Oct. 2015.
[8] Y. Zhang, Y. Shen, H. Wang, J. Yong, and X. Jiang, “On secure wireless communications for IoT under eavesdropper collusion,” IEEE Trans. Autom. Sci. Eng., vol. 13, no. 3, pp. 1281–1293, Jul. 2016.
[9] J. Mo, M. Tao, and Y. Liu, “Relay placement for physical layer security: A secure connection perspective,” IEEE Commun. Lett., vol. 16, no. 6, pp. 878-881, Jun. 2012.
[10] J. Li, A. P. Petropulu, and S. Weber, “On cooperative relaying schemes for wireless physical layer security,” IEEE Trans. Signal Process., vol. 59, no. 10, pp. 4985-4997, Oct. 2011.
[11] J. Chen, R. Zhang, L. Song, Z. Han, and B. Jiao, “Joint relay and jammer selection for secure two-way relay networks,” IEEE Trans. Inf. Forensics Security, vol. 7, no. 1, pp. 310-320, Feb. 2012.
[12] I. Krikidis, J. S. Thompson, and S. Mclaughlin, “Relay selection for secure cooperative networks with jamming,” IEEE Trans. Wireless Commun.,vol. 8, no. 10, pp. 5003-5011, Oct. 2009.
[13] Y. Zou, X.Wang, andW. Shen, “Optimal relay selection for physical-layer security in cooperative wireless networks,” IEEE J. Sel. Areas Commun., vol. 31, no. 10, pp. 2099-2111, Oct. 2013.
[14] A. Mukherjee, S. A. A. Fakoorian, J. Huang, and A. L. Swindlehurst, “Principles of physical layer security in multiuser wireless networks: A survey,” IEEE Commun. Surveys Tuts., vol. 16, no. 3, pp. 1550-1573, Aug. 2014.
[15] Y. Zhang, Y. Shen, H. Wang, J. Yong, and X. Jiang, “On secure wireless communications for IoT under eavesdropper collusion,” IEEE Trans. Autom. Sci. Eng., vol. PP, no. 99, pp. 1-13, Dec. 2015.