Open Access   Article Go Back

Camouflage Traffic: Minimizing Message Delay for Applications under Jamming

P.Sangeetha 1 , V.Lalithadevi 2 , M.sughasini 3

Section:Research Paper, Product Type: Journal Paper
Volume-06 , Issue-02 , Page no. 421-424, Mar-2018

Online published on Mar 31, 2018

Copyright © P.Sangeetha, V.Lalithadevi, M.sughasini . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: P.Sangeetha, V.Lalithadevi, M.sughasini, “Camouflage Traffic: Minimizing Message Delay for Applications under Jamming,” International Journal of Computer Sciences and Engineering, Vol.06, Issue.02, pp.421-424, 2018.

MLA Style Citation: P.Sangeetha, V.Lalithadevi, M.sughasini "Camouflage Traffic: Minimizing Message Delay for Applications under Jamming." International Journal of Computer Sciences and Engineering 06.02 (2018): 421-424.

APA Style Citation: P.Sangeetha, V.Lalithadevi, M.sughasini, (2018). Camouflage Traffic: Minimizing Message Delay for Applications under Jamming. International Journal of Computer Sciences and Engineering, 06(02), 421-424.

BibTex Style Citation:
@article{_2018,
author = {P.Sangeetha, V.Lalithadevi, M.sughasini},
title = {Camouflage Traffic: Minimizing Message Delay for Applications under Jamming},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2018},
volume = {06},
Issue = {02},
month = {3},
year = {2018},
issn = {2347-2693},
pages = {421-424},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=279},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=279
TI - Camouflage Traffic: Minimizing Message Delay for Applications under Jamming
T2 - International Journal of Computer Sciences and Engineering
AU - P.Sangeetha, V.Lalithadevi, M.sughasini
PY - 2018
DA - 2018/03/31
PB - IJCSE, Indore, INDIA
SP - 421-424
IS - 02
VL - 06
SN - 2347-2693
ER -

           

Abstract

Time Division Multiple Access (TDMA) is frequently used in Wireless Sensor Networks (WSNs), specially for critical applications, as it provides high efficiency, reliable performance, guaranteed bandwidth, bounded and predictable latency, and absence of collisions. However, TDMA is easily vulnerable to choosy jamming attacks. In TDMA transmission, all the slots are usually pre-allocated to sensor nodes, and each slot is used by the identical node for a number of consecutive superframes. Hence, an adversary could frustrate a victim node’s communication by simply jamming its slot(s). Such attack turns out to be proficient, energy efficient, and extremely difficult to detect. In this paper, we propose a novel approach JAMMY, a distributed and reliable solution to selective jamming in TDMA-based WSNs. Unlike conventional approaches, JAMMY changes the slot utilization pattern at every superframe, thus making it unpredictable to the adversary. JAMMY is decentralized, as sensor nodes determine the next slot consumption pattern in a distributed and autonomous way. Results from performance analysis of the proposed solution show that JAMMY introduces tiny overhead yet allows many nodes to join the network, in a limited number of superframes.

Key-Words / Index Term

WSNs, TDMA, Security, Selective Jamming, DoS, Secure Slot Permutation, Decentralized Slot Acquisition

References

[1] A. D. Wood, J. A. Stankovic and G. Zhou. DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks. In Proceedings of the 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pages 60–69. IEEE Computer Society, June 2007.
[2] A. J. Menezes, P. C. van Oorschot and S. A. Vanstone. Handbook of Applied Cryptography. CRC Press, 2001.
[3] A. Mpitziopoulos, D. Gavalas, C. Konstantopoulos and G. Pantziou. A Survey on Jamming Attacks and Countermeasures in WSNs. IEEE Communications Surveys Tutorials, 11(4):42–56, 2009.
[4] A. Proa˜no and L. Lazos. Packet-Hiding Methods for Preventing Selective Jamming Attacks. IEEE Transactions on Dependable and Secure Computing, 9(1):101–114, January/February 2012.
[5] C. Paar and J. Pelzl. Understanding Cryptography. Springer, 2010.
[6] D. De Guglielmo, G. Anastasi and M. Conti. A Localized Slot Allocation Algorithm for Wireless Sensor Networks. In Proceedings of the 12th IEEE Annual Mediterranean Ad Hoc Networking Workshop, pages 89–96. IEEE Computer Society, June 2013.
[7] D. R. Raymond and S.F. Midkiff. Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses. IEEE Pervasive Computing, 7(1):74–81, January-March 2008.
[8] M. Doddavenkatappa, M. Chan, and A. Ananda. Indriya: A lowcost, 3d wireless sensor network testbed. In Testbeds and Research Infrastructure. Development of Networks and Communities, pages 302–316. Springer, 2012.
[9] A. Dunkels, B. Gr¨onvall, and T. Voigt. Contiki-a lightweight and flexible operating system for tiny networked sensors. In Local Computer Networks, 2004. 29th Annual IEEE International Conference on, pages 455–462. IEEE, 2004.
[10] E. Cole. Network Security Bible, 2nd Edition. Wiley, 2009.
[11] F. Ashraf, Y.-C. Hu and R.H. Kravets. Bankrupting the jammer in WSN. In Proceedings of the IEEE 9th International Conference on Mobile Adhoc and Sensor Systems, pages 317–325, October 2012.
[12] G. Dini and I. M. Savino. LARK: A Lightweight Authenticated ReKeying Scheme for Clustered Wireless Sensor Networks. ACM Transactions on Embedded Computing Systems, 10(4), 2011.
[13] G. Dini and M. Tiloca. HISS: a HIghly Scalable Scheme for group rekeying. The Computer Journal, 56(4):508–525, November 2013.
[14] H. Mustafa, X. Zhang, Z. Liu, W. Xu and A. Perrig. Jamming- Resilient Multipath Routing. IEEE Transactions on Dependable and Secure Computing, 9(6):852–864, November 2012.
[15] IEEE Computer Society. IEEE Standard for Local and Metropolitan Area Networks, Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs), September 2011.