Jammed Node Detection and Routing in a Multihop Wireless Sensor Network Using Hybrid Techniques

被引:10
作者
Meenalochani, M. [1 ]
Sudha, S. [1 ]
机构
[1] Natl Inst Technol, Dept Elect & Elect Engn, Tiruchirappalli 620015, Tamil Nadu, India
关键词
Wireless sensor network; Security; Jamming attack; Fuzzy inference system; Ant colony optimization;
D O I
10.1007/s11277-018-6042-5
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Wireless sensor networks are susceptible to various Denial-of-Service attacks due to their open deployment. Jamming attack at the physical layer is a type of Denial-of-Service attack in which an adversary node prevents channel access or disrupts the communication between the nodes by emitting noise signals. Due to this, the compromised nodes are interrupted either from sending out packets or receiving packets. As these nodes are unaware of the intrusion, they continuously attempt to access the jammed channel and retransmit lost packets resulting in energy drainage. This energy depletion though primarily leads to node failure, it ultimately reduces network lifetime enforcing intrusion detection. With this intention, a hybrid algorithm based on Fuzzy logic and Ant Colony Optimization for detection of jamming attack is proposed. Detection of jammed node is through fuzzy logic and thereon for successful data routing, Ant Colony Optimization is used. The proposal is simulated in MATLAB and the results are compared with the Ant Colony Optimization technique proposed earlier. The results confirm the supremacy of the proposed hybrid optimization technique over the Ant Colony Optimization.
引用
收藏
页码:663 / 675
页数:13
相关论文
共 21 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]  
[Anonymous], 2014, P 8 INT C SENS TECHN
[3]   Wormhole-based antijamming techniques in sensor networks [J].
Cagalj, Mario ;
Capkun, Srdjan ;
Hubaux, Jean-Pierre .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2007, 6 (01) :100-114
[4]  
Dorigo M., 1999, Proceedings of the 1999 Congress on Evolutionary Computation-CEC99 (Cat. No. 99TH8406), P1470, DOI 10.1109/CEC.1999.782657
[5]   Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks [J].
Li, Mingyan ;
Koutsopoulos, Iordanis ;
Poovendran, Radha .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2010, 9 (08) :1119-1133
[6]   Fuzzy based Estimation of Received Signal Strength in a Wireless Sensor Network [J].
Meenalochani, M. ;
Sudha, S. .
PROCEEDING OF THE THIRD INTERNATIONAL SYMPOSIUM ON WOMEN IN COMPUTING AND INFORMATICS (WCI-2015), 2015, :624-628
[7]  
Misra S., 2010, INFORM WARFARE WORTH, DOI [10.3390/s100403444, DOI 10.3390/S100403444]
[8]   JAID: An algorithm for data fusion and jamming avoidance on distributed sensor networks [J].
Mpitziopoulos, Aristides ;
Gavalas, Damianos ;
Konstantopoulos, Charalampos ;
Pantziou, Grammati .
PERVASIVE AND MOBILE COMPUTING, 2009, 5 (02) :135-147
[9]   A Survey on Jamming Attacks and Countermeasures in WSNs [J].
Mpitziopoulos, Aristides ;
Gavalas, Damianos ;
Konstantopoulos, Charalampos ;
Pantziou, Grammati .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (04) :42-56
[10]   Jamming attack detection and countermeasures in wireless sensor network using ant system [J].
Muraleedharan, Rajani ;
Osadciw, Lisa Ann .
WIRELESS SENSING AND PROCESSING, 2006, 6248