A Trigger
Identification Service for Defending Reactive Jammers in Wireless Sensor
Network
ABSTRACT
During the last decade, Reactive Jamming Attack has
emerged as a great security threat to wireless sensor networks, due to its mass
destruction to legitimate sensor communications and difficulty to be disclosed
and defended. Considering the specific characteristics of reactive jammer
nodes, a new scheme to deactivate them by efficiently identifying all trigger
nodes, whose transmissions invoke the jammer nodes, has been proposed and
developed. Such a trigger-identification procedure can work as an
application-layer service and benefit many existing reactive-jamming defending
schemes. In this paper, on the one hand, we leverage several optimization problems
to provide a complete trigger-identification service framework for unreliable
wireless sensor networks. On the other hand, we provide an improved algorithm
with regard to two sophisticated jamming models, in order to enhance its
robustness for various network scenarios. Theoretical analysis and simulation
results are included to validate the performance of this framework.
EXISTING
SYSTEM:
Reactive Jamming Attack has emerged as a great
security threat to wireless sensor networks, due to its mass destruction to
legitimate sensor communications and difficulty to be disclosed and defended.
Among the various attacks, jamming attack where a jammer node disrupts the
message delivery of its neighboring sensor nodes with interference signals, has
become a critical threat to WSNs.
PROPOSED
SYSTEM:
We present a simulation based trigger-identification
service for reactive-jamming in wireless sensor networks, which promptly
provides the list of trigger-nodes using a lightweight decentralized algorithm,
without introducing neither new hardware devices, nor significant message overhead
at each sensor node.
MODULES:
ü Network
Model
ü Attacker
Model
ü Jamming
range
ü Triggering
range
ü Jammer
distance
MODULES DESCRIPTION:
Network
Model
We consider a wireless sensor network consisting of n
sensor nodes and one base station (larger networks with multiple base stations
can be split into small ones to satisfy the model). Each sensor node is
equipped with a globally synchronized time clock, omnidirectional antennas, m
radios for in total k channels throughout the network, where k > m. For
simplicity, the power strength in each direction is assumed to be uniform, so
the transmission range of each sensor can be abstracted as a constant rs and the
whole network as a unit disk graph (UDG) G ¼ ðV ;EÞ, where any node pair i; j
is connected iff the Euclidean distance between i; j: _ði; jÞ _ rs. We leave
asymmetric powers and polygonal transmission area for further study.
Attacker
Model
We consider both a basic attacker model and several advanced
attacker models in this paper. Specifically, we provide a solution framework
toward the basic attacker model, and validate its performance toward multiple advanced
attacker models theoretically and experimentally
Jamming
range
R. Similar to the sensors, the jammers are equipped
with omnidirectional antennas with uniform power strength on each direction.
The jammed area can be regarded as a circle centered at the jammer node, with a
radius R, where R is assumed greater than rs, for simulating a powerful and
efficient jammer node. All the sensors within this range will be jammed during
the jammer wake-up period. The value of R can be approximated based on the positions
of the boundary sensors (whose neighbors are jammed but themselves not), and
then further refined.
Triggering
range
On sensing an ongoing transmission, the decision
whether or not to launch a jamming signal depends on the power of the sensor
signal Ps, the arrived signal power at the jammer Pa with distance r from the sensor,
and the power of the background noise Pn.
Jammer
distance
Any two jammer nodes are assumed not to
be too close to each other, i.e., the distance between jammer J1 and J2 is
_ðJ1; J2Þ > R. The motivations behind this assumptions are three-fold: 1)
the deployment of jammers should maximize the jammed areas with a limited number
of jammers, therefore large overlapping between jammed areas of different
jammers lowers down the attack efficiency; 2) _ðJ1; J2Þ should be greater than
R, since the transmission signals from one jammer should not interfere the
signal reception at the other jammer. Otherwise, the latter jammer will not
able to correctly detect any sensor transmission signals, since they are
accompanied with high RF noises, unless the jammer spends a lot of efforts in denoising
or embeds jammer-label in the jamming noise for the other jammers to recognize.
Both ways are infeasible for an efficient attack; 3) the communications between
jammers are impractical, which will expose the jammers to anomaly detections at
the network authority.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
•
System
: Pentium IV 2.4 GHz.
•
Hard Disk
: 40 GB.
•
Floppy Drive :
1.44 Mb.
•
Monitor :
15 VGA Colour.
•
Mouse :
Logitech.
•
Ram :
512 Mb.
SOFTWARE REQUIREMENTS:
•
Operating
system : - Windows XP.
•
Coding
Language :
JAVA
REFERENCE:
Ying Xuan, Yilin Shen, Nam P. Nguyen,
and My T. Thai, “A Trigger Identification Service for Defending Reactive
Jammers in WSN”, IEEE TRANSACTIONS ON
MOBILE COMPUTING, VOL. 11, NO. 5, MAY 2012