A jamming attack detection technique for opportunistic networks

被引:13
作者
Singh, Jagdeep [1 ]
Woungang, Isaac [2 ]
Dhurandher, Sanjay Kumar [3 ]
Khalid, Khuram [2 ]
机构
[1] St Longowal Inst Engn & Technol, Dept Comp Sci & Engn, Longowal, Punjab, India
[2] Ryerson Univ, Dept Comp Sci, Toronto, ON, Canada
[3] Netaji Subhas Univ Technol, Dept Informat Technol, New Delhi, India
关键词
Jamming detection; Opportunistic networks; Routing; Statistical information; Energy;
D O I
10.1016/j.iot.2021.100464
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Opportunistic networks (OppNets) are dispersed in nature, with nodes acting as resource restrictions, with intermittent connectivity. These nodes are subject to various types of attacks, posing a security risk in data transmission. One of the most common attacks that cause jamming among the message forwarding nodes in infrastructure-less networks is Denial of Service (DoS) attack. Most of the methods addressing this type of attack rely on cryptographic algorithms, which are too difficult to implement. In this paper, a novel jamming attack detection technique (JADT) for OppNets, is proposed, which relies on the use of some statistical measures collected from the relay nodes and a prescribed threshold on the packet delivery ratio (PDR) to discover a jamming attack while decrypting the acknowledgement, stopping the message transmission and rebroadcasting the message through a different channel. The proposed JADT is evaluated using the ONE simulator, showing its superiority against the Fuzzy Geocasting mechanism in Opportunistic Networks (F-GSAF) scheme in terms of packet delivery ratio and overhead ratio, under varying TTL and buffer size.
引用
收藏
页数:10
相关论文
共 16 条
  • [1] Abdellatif M. M., 2017, P IEEE 13 WIMOB, P1
  • [2] Altaweel A, 2019, IEEE CONF COMM NETW, P73
  • [3] A Survey on Opportunistic Routing in Wireless Communication Networks
    Chakchouk, Nessrine
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (04): : 2214 - 2241
  • [4] Detection of Jamming Attacks in Mobile Ad Hoc Networks using Statistical Process Control
    El Houssaini, Mohammed-Alamine
    Aaroud, Abdessadek
    El Hore, Ali
    Ben-Othman, Jalel
    [J]. 7TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT 2016) / THE 6TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2016) / AFFILIATED WORKSHOPS, 2016, 83 : 26 - 33
  • [5] Kasturi G.S., 2020, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., V11, P49
  • [6] Kasturi G. S., 2020, INT C WIR INT DISTR, P99
  • [7] Kernen A., 2009, P 2 INT C SIM TOOLS, DOI [10.4108/ICST.SIMUTOOLS2009.5674, DOI 10.4108/ICST.SIMUTOOLS2009.5674]
  • [8] Energy-Efficient Check-and-Spray Geocast Routing Protocol for Opportunistic Networks
    Khalid, Khuram
    Woungang, Isaac
    Dhurandher, Sanjay Kumar
    Singh, Jagdeep
    Rodrigues, Joel J. P. C.
    [J]. INFORMATION, 2020, 11 (11) : 1 - 18
  • [9] A Bayesian game model and network availability model for small cells under denial of service (DoS) attack in 5G wireless communication network
    Lalropuia, K. C.
    Gupta, Vandana
    [J]. WIRELESS NETWORKS, 2020, 26 (01) : 557 - 572
  • [10] Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications
    Lu, Zhuo
    Wang, Wenye
    Wang, Cliff
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (08) : 1746 - 1759