Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System
">
<p>Graphical representation of the trapezoidal function for the input signal-to-noise ratio (SNR).</p> ">
<p>Graphical representation of the trapezoidal function for the input bad packet ratio (BPR) or packets dropped per terminal (PDPT).</p> ">
<p>Graphical representation of the trapezoidal function for the output, jamming index (JI).</p> ">
<p>Input-output surface corresponding to the membership values of inputs (SNR, PDPT) and output (JI).</p> ">
<p>It shows the average Bad Packets Ratio (BPR) or Packets Dropped per Terminal (PDPT) for various jammers and jamming indices for simulation and sampling duration of 20 seconds.</p> ">
<p>Schematic diagram of one of the 720 simulation set-ups, where the inter-nodal distance is 20 m, the jammer is a constant jammer with high output power, the jammer is located inside the WSN grid at coordinates (30,45) with the sink node located at coordinates (85,85), and the WSN has a total of 25 nodes, excluding the sink.</p> ">
<p>It shows the MATLAB simulation output for the set-up shown by <a href="#f6-sensors-10-03444" class="html-fig">Figure 6</a>.</p> ">
<p>It graphically represents the output of the simulation for the set-up depicted by <a href="#f6-sensors-10-03444" class="html-fig">Figure 6</a>.</p> ">
<p>Graphic representation of TDR for different jnr for 100 nodes configuration for 25< JI < = 50.</p> ">
Abstract
:1. Introduction
1.1. Motivation
1.2. Paper Layout
1.3. Contributions
- Contour mapping, based on different lower cut-off values of jamming indices of nodes of the WSN (akin to altitude contours on a geographical relief map) is made possible. This is a better alternative to the present trend of plotting the jammed area, as recommended by different authors such as Wood et al. [7], Nowak et al. [8], Hellerstein et al. [9], and others, because instead of dividing the geographical extent of the WSN into jammed and non-jammed areas, it provides a jamming gradient to the whole area.
- Flexibility in extent of jammed area mapping is possible which would give more working space to the battle field commander, e.g., in a defensive battle, during the pre-contact-with-enemy stage, when the density and health of the WSN is the best, the jammed area may be bounded by a contour of jamming index of 75% (say) and the same may expand to 50% and 25% during the contact-with-enemy stage and counter-attack stage, as the battle progresses and the density and health of the WSN goes on depleting.
- Holistic decision regarding the jammed condition of a node, based on the node parameters and its neighborhood conditions is taken at the base station, and not at the node level, as done in the existing methods. This not only improves the quality of the decision and survivality of the decision making process, but also takes off the extra burden of taking such decisions from the already resource-starved nodes under siege of a jammer.
2. Jamming Attack Models
2.1. Military Models for Electronic Warfare
- Spot Jammer is a jammer which knows the exact radio frequency of the target network, and attacks the network on that frequency (spot frequency) only. It requires less power to jam the network, and is the most efficient and effective jammer. However, it suffers from the disadvantage that the target network can change the frequency (channel surfing/frequency hopping) to evade jamming.
- Sweep Jammer is a jammer which does not know the target frequency, and therefore sweeps across the probable spectrum either periodically or aperiodically, thus jamming the affected networks temporarily. They are less efficient and effective than the spot jammer, but can attack several networks and impose restrictions on freedom of frequency-hopping by the target network.
- Barrage Jammers cover a large bandwidth of the radio spectrum at a time, leaving very little scope for the target network to evade jamming. Also, they can jam a number of networks simultaneously. Barrage jammers require high RF power to maintain the required power spectral density of jamming.
2.2. Jamming Attack Models from Academia
2.2.1. Models of Xu et al. [1]
- Constant Jammer is not aware of the existing protocols of the network (bit-rate, packet-size etc.) and, therefore keeps transmitting bits constantly over a period of time without following any protocol. They are not energy efficient.
- Deceptive Jammer is aware of the target network’s protocol and jams the network by transmitting legitimate packets constantly over a period at a high rate to keep the carrier captured. It is highly effective but is as energy inefficient as the constant jammer.
- Random Jammer functions either like a constant jammer or a deceptive jammer but does so randomly. It is less effective than the jammer whom it imitates (constant or deceptive) but is more energy efficient than it.
- Reactive Jammer also knows the communication protocols of the target network. It keeps listening to the network passively, and attacks the network at its chosen time in a manner as if it is part of the network, following its protocols. It is most effective but not very energy-efficient as it spends considerable amount of energy in constantly listening to the network.
2.2.2. Models of Law et al. [11]
- Periodic Listening Interval Jammer attacks when the nodes are in listening period and sleeps at all other times.
- Periodic Control Interval Jammer attacks when the nodes are in the control period and sleeps during rest of the time.
- Periodic Data Packet Jammer listens to the channel during the control interval and attacks the data segment.
- Periodic Cluster Jammer is meant for attacking networks following encrypted packets. It uses k-means clustering algorithm to separate clusters of the network and statistical estimations to determine the timing of the data segment, and then attacks the same accordingly.
2.2.3. Models of Wood et al. [12]
- Interrupt Jammer is a variation of Reactive Jammer in the sense that instead of listening to the channel constantly, it gets activated by means of a hardware interrupt when a preamble and start of frame delimiter (SFD) are detected from a received frame.
- Activity Jammer is yet another variation of Interrupt Jammer (in fact, that of a Reactive Jammer) meant for encrypted packets where detection of the SFD is other-wise not possible.
- Scan Jammer is similar to the Sweep Jammer. Instead of detecting a packet in a single channel, it searches out all possible channels for a packet during a defined period of time, and having succeeded, it then attacks the channel.
- Pulse Jammer is akin to the Constant Jammer in the sense that it sends small packets constantly to jam a channel.
2.2.4. Models of Muraleedharan et al. [2]
2.3. Analysis of the Existing Models
2.4. Description of the Proposed Jamming Attack Models
- Constant Jammer with Normal Power (CON) is a constant jammer with transmitted RF power comparable with the average RF transmitted power of the target WSN.
- Constant Jammer with High Power (COH) is a constant jammer with high transmitted RF power.
- Deceptive Jammer with Normal Power (DECN) is a deceptive jammer with transmitted RF power comparable with the average RF transmitted power of the target WSN.
- Deceptive Jammer with High Power (DECH) is a deceptive jammer with high transmitted RF power.
- Random Jammer Imitating CON, (RACN).
- Random Jammer Imitating COH, (RACH).
- Random Jammer Imitating DECN, (RADECN).
- Random Jammer Imitating DECH, (RADECH).
- Reactive Jammer with Normal Power (REN) is a reactive jammer with transmitted RF power comparable with the average RF transmitted power of the target WSN.
- Reactive Jammer with High Power (REH) is a reactive jammer with high transmitted RF power.
3. Metrics for Jamming Attack Detection
3.1. Carrier Sensing Time (CST)
3.2. Packet Send Ratio (PSR)
3.3. Packet Delivery Ratio (PDR)
3.4. Bad Packet Ratio (BPR)
3.5. Standard Deviation in Received Signal Strength (SDRSS)
3.6. Bit Error Rate (BER)
3.7. Received Signal Strength (RSS)
3.8. Signal-to-Noise Ratio (SNR) or Signal-to Jammer Power Ratio (SJR)
3.9. Energy Consumption Amount (ECA)
3.10. Selected Metrics for the Proposed System—SNR and BPR
- The received radio power at a node is easily measurable as nodes are/can be provided with RF power meter.
- In our system, the node simply keeps the base station informed about the received radio power, at a time interval as decided by the base station. The base station calculates the jammer (noise) power by subtracting the average legitimate signal power of the node from the current power. The ratio of the two powers is then calculated by the base to get the SNR. Thus there are no over-heads involved at the node level.
- The node keeps the base station informed about the number of good packets and total packets received by it during a time interval, as decided by the base station, in a normal routine way. The base station calculates the BPR (or, PDPT) for each node. Thus, the nodes are not burdened additionally.
- The combination of SNR and BPR (or, PDPT) is capable of detecting any form of jamming attack, as discussed in the previous sections.
4. Existing Jamming Attack Detection Methods and Their Analysis
4.1. Studies by Xu et al. [1]
4.2. Method Suggested by Rajani et al. [2]
4.3. Method Suggested by Cakiroglu et al. [3]
4.4. Method Suggested by Reese et al. [4]
4.5. Method Suggested by Strasser et al. [5]
4.6. Comparison of Existing Methods
4.7. Conclusions from Study of Existing Methods
5. Proposed Method
5.1. Description
5.1.1. Detection of Jamming Attack on a Node Using Fuzzy Inference System
5.1.1.1. Fuzzification Process
5.1.1.2. Fuzzy Inference
- If SNR is LOW and PDPT is LOW then JI is HIGH.
- If SNR is LOW and PDPT is MEDIUM then JI is HIGH.
- If SNR is LOW and PDPT is HIGH then JI is HIGH.
- If SNR is MEDIUM and PDPT is LOW then JI is LOW.
- If SNR is MEDIUM and PDPT is MEDIUM then JI is MEDIUM.
- If SNR is MEDIUM and PDPT is HIGH then JI is HIGH.
- If SNR is HIGH and PDPT is LOW then JI is NO.
- If SNR is HIGH and PDPT is MEDIUM then JI is LOW.
- If SNR is HIGH and PDPT is HIGH then JI is MEDIUM.
5.1.1.3. Defuzzification
5.1.2. Confirmation of Jamming Attack on a Node Through ‘2-Means Clustering’ of Node Neighborhood
- Depending upon the information war conditions, it decides the lower cut-off value of JI, LC for declaring all nodes with JI ≥ LC, as jammed nodes, i.e., jamming detected at these nodes.
- It makes a list of all jammed nodes, i.e., of nodes having JI ≥ LC and finds the number, t of such nodes.
- For each of the t jammed nodes, it does the following:
- Identifies and counts the number of one-hop neighbors, n.
- Out of the n neighbors, it identifies those neighbors who are in the list of jammed nodes and counts their number, nj and names the group of these nodes as jammed neighbors cluster.
- Out of the n neighbors, it identifies those neighbors who are not in the list of jammed nodes and counts their number (n- nj) and names the group of these nodes as non-jammed neighbors cluster.We thus have a total of n nodes divided into 2 clusters in neighborhood of a node under consideration. Therefore, the deciding figure is n/2. If the number of nodes (nj) in the jammed neighbors cluster is more than n/2 then majority of the neighbors are jammed and hence it is confirmed that the node under consideration is also jammed. If nj is less than or equal to n/2, further examination is required for taking any decision. The subsequent steps of the algorithm proceed accordingly.
- If nj > n/2, then it confirms that the node is jammed.
- If nj ≤ n/2, then it does the following:
- Finds the mean jamming index of jammed neighbors cluster, using the formula:
- Finds the mean jamming index of non-jammed neighbors cluster, using the formula:
- Finds centroid X and Y coordinates of jammed neighbors cluster using the formula:
- Finds centroid X and Y coordinates of non-jammed neighbors cluster using the formula:
- Finds the square of the distance, dj of the node under consideration from the centroid of the jammed neighbors cluster using the formula:
- Finds the square of the distance, dnj of the node under consideration from the centroid of the non-jammed neighbors cluster using the formula:
- If:
6. Simulation Set-up and Configuration
6.1. Simulation Parameters for WSN and Jammers
6.2. Special Simulation Parameters for Different Types of Jammers
6.3. Description
7. Results and Performance Evaluation
7.1. Inter-nodal Distances
7.2. Jammer Type
7.3. Jammer Location
7.4. Number of Nodes in the WSN
7.5. Performance Evaluation
7.6. Evaluation of Base Station-Centric (Centralized) Versus Node-Centric (Decentralized) Approaches
7.6.1. Communication Energy Efficiency
- e be the energy in joules required for transmission of one packet over one hop, and
- h be the number of hops between a typical node to the base station.
7.6.2. Computational Energy Efficiency
7.6.3. Speed of Jamming Detection
7.6.4. Accuracy of Detection
8. Conclusions and Future Work
Acknowledgments
References and Notes
- Xu, W.; Trappe, W.; Zhang, Y.; Wood, T. The feasibility of launching and detecting jamming attacks in wireless networks. In MobiHoc ’05, Proceedings of the Sixth ACM International Symposium on Mobile ad hoc Networking and Computing, Alexandria, VA, USA, 07–07 November 2005; pp. 46–57.
- Rajani, M.; Lisa, A.O. Jamming attack detection and countermeasures in wireless sensor network using ant system. Available online: http://www.cognitiveintelligence.com/documents/SPIE2006.pdf/ (accessed on 12 October 2009 at 1:15 PM).
- Çakiroğlu, M.; Özcerit, A.T. Jamming detection mechanisms for wireless sensor networks. Proceedings of the 3rd International Conference on Scalable Information Systems, Vico Equense, Italy, 04–06 June 2008.
- Kristopher, W.R.; Ahmed, S.; George, D. Using standard deviation in signal strength detection to determine jamming in wireless networks. Available online: http://kreese.net/scr/content/documents/SSDModel.reese.pdf/ (accessed on 07 October 2009 at 1:30 PM).
- Mario, S.; Boris, D.; Srdjan, C. Detection of reactive jamming in sensor networks; ETH Zurich D-INFK Technical Report 634; ETH: Zurich, Switzerland, August 2009. [Google Scholar]
- Behrouz, A.F.; Sophia, C.F. Data Communications and Networking; Tata McGraw-Hill: New Delhi, Delhi, India, 2007; pp. 19–21. [Google Scholar]
- Wood, A.; Stankovic, J.; Son, S. JAM: a jammed area mapping service for sensor networks. 24th IEEE Real-Time Systems Symposium, Cancun, Mexico, December 2003; pp. 286–297.
- Nowak, R.; Mitra, U. Boundary estimation in sensor networks: theory and methods. IPSN ’03, Palo Alto, CA, USA, 22–23 April 2003; pp. 162–177.
- Hallerstein, J.M.; Hong, W.; Madden, S.; Stanek, K. Beyond average: towards sophisticated sensing with queries. IPSN ’03; Palo Alto, CA, USA, 22–23 March 2003; pp. 63–79.
- Yee, W.; Lodewijk, L.; Hossel, V.; Doumen, J.; Hartel, P.; Havinga, P. Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. SANS ’05; Alexandria, VA, USA, 7 November 2005; pp. 1567–1576.
- Law, Y.; Hartel, P.; Hartog, J.D.; Havinga, P. Link-layer jamming attacks on S-MAC. 2nd European Workshop on Wireless Sensor Networks, Alexandria, VA, USA, 7 November 2005; pp. 217–225.
- Anthony, D.W.; John, A.S.; Gang, Z. DEEJAM: defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks. SECON 2007, San Diego, CA, USA, June 2007.
- Gang, Z.; Tian, H.; John, A. S.; Tarek, A. RID: radio interference detection in wireless sensor networks. Available online: http://scholar.google.co.in/scholar?start=0&q=jamming+detection+wireless+sensor+network&hl=en/ (accessed on 7 October 2009 at 12:53 PM).
- Kedem, B. Time Series Analysis by Higher Order Crossings; IEEE Press: New York, NY, USA, 1994. [Google Scholar]
- Yager, R.P.; Zaden, L.A. Fuzzy Sets, Neural Networks and Soft Computing; John Wiley & Sons, Inc: New York, NY, USA, 1994; pp. 450–530. [Google Scholar]
- Mamdani, E.H.; Assilian, S. Experiment in linguistic synthesis with a fuzzy logic controller. Int. J. Man-Mach. Stud 1975, 7, 1–13. [Google Scholar]
- Jang, J.S.R.; Sun, C.T.; Mizutani, E. Neuro-Fuzzy and Soft Computing: A Computational Approach to Learning and Machine Intelligence; Dorling Kindersley (India) Pvt. Ltd: New Delhi, India, 2007; pp. 99–115. [Google Scholar]
- Niculescu, D.; Nath, B. Ad-hoc positioning system. Proceedings of IEEE GLOBECOM ’01; San Antonio, TX, USA, November 2001; pp. 2926–2931. [Google Scholar]
- Pickholtz, R.L.; Schilling, D.L.; Milstein, L.B. Theory of spread spectrum communications–a tutorial. IEEE Trans. Commun 1982, 20, 855–884. [Google Scholar]
- Roman, G.C.; Huang, Q.; Hazemi, A. Consistent group membership in ad-hoc networks. Proceedings of the 23rd International Conference on Soft-ware Engineering, Washington, DC, USA, May 2001; pp. 381–388.
- Zhao, F.; Liu, J.; Guibas, L.; Reich, J. Collaborative signal and information processing: an information directed approach. Proc. IEEE 2003, 91, 1199–1209. [Google Scholar]
- Want, R.; Hopper, A.; Falcao, V.; Gibbons, J. The active badge location system. ACM Trans. Inform. Syst 1992, 10, 91–102. [Google Scholar]
- Bahl, P.; Padmanabhan, V. N. RADAR: an in-building RF-based user location and tracking system. Proceedings of the IEEE International Conference on Computer Communications, Tel Aviv, Israel, March 2000; pp. 775–784.
- Chen, Y.; Francisco, J.; Trappe, W.; Martin, R.P. A practical approach to landmark deployment for indoor localization. Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, San Jose, CA, USA, July 2006; pp. 406–414.
- Proakis, J.G. Digital Communications, 4th ed; McGraw-Hill: New York, NY, USA, 2000. [Google Scholar]
- Noubir, G.; Lin, G. Low power DoS attacks in data wireless LANs and countermeasures. SIGMOBILE Mob. Comput. Commun. Rev 2003, 7, 29–30. [Google Scholar]
- Cagalj, M.; Capkun, S.; Hubaux, J. Wormhole-based anti-jamming technique in sensor networks. IEEE Trans. Mob. Comput 2007, 6, 100–114. [Google Scholar]
- Priyantha, N.; Chakraborty, A.; Balakrishnan, H. The cricket location support system. Proceedings of the ACM International Conference on Mobile Computing and Networking, Boston, MA, USA, August 2000; pp. 32–43.
- Chen, Y.; Kleisouris, K.; Li, X.; Trappe, W.; Martin, R.P. The robustness of localization algorithms to signal strength attacks: a comparative study. Proceedings of the International Conference on Distributed Computing in Sensor Systems, San Francisco, CA, USA, 18–20 June 2006; pp. 546–563.
- He, T.; Huang, C.; Blum, B.; Stankovic, J.A.; Abdelzaher, T. Range-free localization schemes in large scale sensor networks. Proceedings of the Ninth Annual ACM International Conference on Mobile Computing and Networking, San Diego, CA, USA, 19 September 2003; pp. 243–254.
- Bluementhal, J.; Grossmann, R.; Golatowski, F.; Timmermann, D. Weighted centroid localization in zigbee-based sensor networks. Proceedings of the IEEE International Symposium on Intelligent Signal Processing, Alcalá de Henares, Spain, 3–5 October 2007; pp. 1–6.
- Rappaport, T. Wireless Communications: Principles and Practice; Prentice Hall: Englewood Cliffs, NJ, USA, 1996. [Google Scholar]
- Lundgren, H.; Nordstr, E.; C. Tschudin, C. Coping with communication gray zones in IEEE 802.11b based ad-hoc networks. Proceedings of the Fifth ACM International Workshop on Wireless Mobile Multimedia, New York, NY, USA, 28 September 2002; ACM Press: Atlanta, GA, USA; pp. 49–55.
Comparison parameter | Xu et al. | Rajani et al. | Cakiroglu et al. | Reese et al. | Strasser et al. |
---|---|---|---|---|---|
Jamming detection done by | Individual nodes | Individual nodes | Individual nodes | Individual nodes | Individual nodes |
Requirement for sampling and threshold fixing | Not required | Required | Required | Required | Required |
Requirement for neighborhood check or threshold fixing | Required | Required | Required | Required | Required |
Requirement to communicate with neighbors during jamming | Required | Required | Required | Required | Required |
Requirement to communicate with base-station to report jamming | Required | Required | Required | Required | Required |
Ability to discriminate different types of jamming | Able | Unable | Unable | Unable | Unable |
Node over-load assessment (1: minimum, 5: maximum) | 2 | 5 | 1 | 3 | 4 |
Accuracy assessment (1: most accurate, 5: least accurate) | 3 | 5 | 2 | 4 | 1 |
Speed assessment (1: fastest, 5: slowest) | 3 | 5 | 4 | 1 | 2 |
Universe of discourse (uod) | Set | a | b | c | d |
---|---|---|---|---|---|
SNR | LOW | −0.5 | 0 | 1 | 1.5 |
MEDIUM | 1 | 1.5 | 10 | 12 | |
HIGH | 10 | 12 | 3,900 | 4,000 | |
PDPT | LOW | −5 | 0 | 10 | 15 |
MEDIUM | 10 | 15 | 25 | 30 | |
HIGH | 25 | 30 | 50 | 55 | |
JI | NO | −5 | 0 | 25 | 30 |
LOW | 25 | 30 | 50 | 55 | |
MEDIUM | 50 | 55 | 75 | 80 | |
HIGH | 75 | 80 | 100 | 105 |
Parameter | WSN | Jammer |
---|---|---|
Frequency (f) | 914.634 MHz | 914.634 MHz |
Wavelength (λ) | 0.328 m | 0.328 m |
Antenna gain | 1 (0dB) | 1 (0dB) |
Antenna directivity | Omni directional | Omni directional |
Transmitted power (Pt) | 8.56 × 10−4 W | Variable |
Receiver sensitivity (Prth) | 3.652 × 10−4 W | 3.652 × 10−4 W |
Maximum radio range | 40 m | 40 m |
Propagation model | Free space | Free space |
Path loss (L) | 1 (0dB) | 1 (0dB) |
Mode of transmission | Simplex unicast | Simplex broadcast |
Packet size | 1000 B | Variable |
Transmission rate | 0.01 MBPS | Variable |
Application layer protocol | CBT | CBT |
Transport layer protocol | UDP | UDP |
Network layer protocol (routing Protocol) | AODV | AODV |
MAC protocol | BMAC. | BMAC |
Type of jammer | Output Power (W) | Packet Size (MB) | Rate (MBPS) | Transmission Duration |
---|---|---|---|---|
Constant Jammer with Normal Power (CON) | 8.56 × 10−4 | 10,000 | 10 | constant |
Constant Jammer with High Power (COH) | 0.2818 | 10,000 | 10 | Constant |
Deceptive Jammer with Normal Power (DECN) | 8.56 × 10−4 | 1,000 | 0.01 | Constant |
Deceptive Jammer with High Power (DECH) | 0.2818 | 1,000 | 0.01 | Constant |
Random Jammer Imitating CON, (RACN) | 8.56 × 10−4 | 10,000 | 10 | Random |
Random Jammer Imitating COH, (RACH) | 0.2818 | 10,000 | 10 | Random |
Random Jammer Imitating DECN, (RADECN) | 8.56 × 10−4 | 1,000 | 0.01 | Random |
Random Jammer Imitating DECH, (RADECH) | 0.2818 | 1,000 | 0.01 | Random |
Reactive Jammer with Normal Power (REN) | 8.56 × 10−4 | 1,000 | 0.01 | Whenever there is a legitimate transmission between any source and the sink. |
Reactive Jammer with High Power (REH) | 0.2818 | 1,000 | 0.01 | Whenever there is a legitimate transmission between any source and the sink. |
Node No. | X-coord | Y-coord | Power received w/o jammer Pnj (nW) | Power received with jammer Pj (nW) | Power received due to jammer Prdj=(Pj- Pnj) (nW) | Signal-to-noise ratio SNR | Packets dropped per terminal PDPT | Jammin g index JI | Decision for LC=75 w/o neighborhood check | Decision with neighborhood check for LC=75 |
---|---|---|---|---|---|---|---|---|---|---|
1 | 20 | 20 | 29.45 | 294.254 | 264.808 | 0.111 | 9.401 | 88.95 | Jammed | Jammed |
2 | 40 | 20 | 39.80 | 304.609 | 264.808 | 0.150 | 10.998 | 88.72 | jammed | jammed |
3 | 60 | 20 | 49.13 | 175.024 | 125.892 | 0.387 | 20.606 | 88.95 | jammed | jammed |
4 | 80 | 20 | 54.19 | 115.692 | 61.435 | 0.869 | 17.518 | 88.95 | Jammed | Not jammed |
5 | 100 | 20 | 49.87 | 84.617 | 34.749 | 1.394 | 11.429 | 53.59 | Not jammed | Not jammed |
6 | 20 | 40 | 39.71 | 1575.69 | 1535.886 | 0.026 | 15.584 | 88.95 | Jammed | Jammed |
7 | 40 | 40 | 59.46 | 1595.35 | 1535.886 | 0.039 | 11.685 | 88.57 | Jammed | Jammed |
8 | 60 | 40 | 85.08 | 292.634 | 207.552 | 0.408 | 9.298 | 88.95 | Jammed | Jammed |
9 | 80 | 40 | 105.7 | 181.73 | 76.034 | 1.372 | 12.257 | 57.95 | Not jammed | Not jammed |
10 | 100 | 40 | 94.41 | 133.392 | 38.982 | 2.361 | 21.084 | 65 | Not jammed | Not jammed |
11 | 20 | 60 | 49.13 | 639.858 | 590.725 | 0.083 | 11.655 | 88.58 | Jammed | Jammed |
12 | 40 | 60 | 85.09 | 675.813 | 590.725 | 0.144 | 16.334 | 88.95 | Jammed | Jammed |
13 | 60 | 60 | 206.9 | 377.517 | 170.654 | 0.972 | 7.818 | 88.95 | Jammed | Jammed |
14 | 80 | 60 | 308.0 | 378.456 | 70.453 | 4.310 | 7.576 | 40 | Not jammed | Not jammed |
15 | 100 | 60 | 235.4 | 272.874 | 37.461 | 6.120 | 11.307 | 46.74 | Not jammed | Not jammed |
16 | 20 | 80 | 54.30 | 199.151 | 144.895 | 0.372 | 21.363 | 88.95 | Jammed | Jammed |
17 | 40 | 80 | 105.7 | 250.591 | 144.895 | 0.724 | 15.084 | 88.95 | Jammed | Jammed |
18 | 60 | 80 | 308.0 | 398.349 | 90.346 | 3.372 | 10.027 | 40.14 | Not jammed | Not jammed |
19 | 80 | 80 | 3852 | 3903.30 | 51.534 | 73.31 | 6.160 | 13.53 | Not jammed | Not jammed |
20 | 100 | 80 | 777.0 | 808.371 | 31.345 | 24.02 | 6.821 | 13.53 | Not jammed | Not jammed |
21 | 20 | 100 | 49.87 | 111.304 | 61.435 | 0.799 | 24.425 | 88.95 | Jammed | Jammed |
22 | 40 | 100 | 94.41 | 155.845 | 61.435 | 1.512 | 11.553 | 47.95 | Not jammed | Not jammed |
23 | 60 | 100 | 235.4 | 284.327 | 48.914 | 4.716 | 8.515 | 40 | Not jammed | Not jammed |
24 | 80 | 100 | 777.0 | 811.775 | 34.749 | 21.74 | 10.025 | 13.66 | Not jammed | Not jammed |
25 | 100 | 100 | 433.4 | 457.586 | 24.225 | 17.18 | 8.913 | 13.53 | Not jammed | Not jammed |
PDPT | Total power received (nW) | Inter-nodal distance (m) | JI | Type of jamming/condition |
---|---|---|---|---|
5 to10 AND | 300 to 400 AND | 10 to 30 AND | 75 to 90 | Constant |
> 20 AND | 10 to 300 AND | 5 to 30 AND | 90 to 100 | Deceptive |
> 20 AND | > 400 AND | 5 to 10 AND | 90 to 100 | Reactive |
10 to 20 AND | > 400 AND | 5 to 10 AND | 50 to 75 | Random |
0 to10 AND | 10 to 4000 AND | 5 to 30 AND | < =50 | Normal condition |
Group of JI | No. of nodes placed by system (O) | No. of nodes placed by experts (E) | (O-E)2/E | No. of nodes correctly placed by system (T) | No. of nodes incorrectly placed by system (F) | TDR = 100.T/E | FDR = 100.F/E | Jnr = 100.E/25 |
---|---|---|---|---|---|---|---|---|
Normal | 4 | 4 | 0 | 4 | 0 | 100% | 0% | 16% |
Low | 5 | 5 | 0 | 5 | 0 | 100% | 0% | 20% |
Medium | 4 | 4 | 0 | 4 | 0 | 100% | 0% | 16% |
High | 12 | 12 | 0 | 12 | 0 | 100% | 0% | 48% |
Total | 25 | 25 | 0 | 25 | 0 | - | - | - |
Jammer Type | True Detection Ratio (TDR %) for 100 nodes configuration | ||||||||
---|---|---|---|---|---|---|---|---|---|
25 < JI < =50 | 50 < JI < = 75 | 75 < JI < = 100 | |||||||
jnr 25% | jnr 50% | jnr 100% | jnr 25% | jnr 50% | jnr 100% | jnr 25% | jnr 50% | jnr 100% | |
DECH | 99.55 | 99.6 | 99.85 | 99.45 | 99.5 | 99.75 | 99.50 | 99.6 | 99.8 |
COH | 99.5 | 99.6 | 99.8 | 99.40 | 99.55 | 99.75 | 99.45 | 99.6 | 99.8 |
DECN | 99.45 | 99.5 | 99.6 | 99.35 | 99.4 | 99.5 | 99.35 | 99.5 | 99.6 |
CON | 99.35 | 99.5 | 99.6 | 99.15 | 99.45 | 99.5 | 99.25 | 99.5 | 99.55 |
REH | 99.25 | 99.4 | 99.55 | 99.10 | 99.2 | 99.25 | 99.20 | 99.3 | 99.4 |
REN | 99.20 | 99.3 | 99.5 | 99.00 | 99.1 | 99.25 | 99 | 99.2 | 99.3 |
RADECH | 99.15 | 99.25 | 99.4 | 99.00 | 99.05 | 99.10 | 99.05 | 99.1 | 99.2 |
RADECN | 99.05 | 99.20 | 99.25 | 98.90 | 99 | 99.10 | 98.95 | 99 | 99.1 |
RACH | 98.90 | 99.10 | 99.15 | 98.80 | 98.90 | 99 | 98.90 | 98.95 | 99.1 |
RACN | 99.00 | 99.05 | 99.10 | 98.60 | 98.70 | 98.8 | 98.85 | 98.9 | 99 |
Jammer Type | False Detection Ratio (FDR %) for 100 nodes configuration | ||||||||
---|---|---|---|---|---|---|---|---|---|
25 < JI < = 50 | 50 < JI < = 75 | 75 < JI < = 100 | |||||||
jnr 25% | jnr 50% | jnr 100% | jnr 25% | jnr 50% | jnr 100% | jnr 25% | jnr 50% | jnr 100% | |
RADECH | 0.6 | 0.3 | 0 | 0.7 | 0.4 | 0 | 0.55 | 0.25 | 0 |
RADECN | 0.5 | 0.25 | 0 | 0.6 | 0.3 | 0 | 0.5 | 0.2 | 0 |
DECH | 0.45 | 0.2 | 0 | 0.5 | 0.3 | 0 | 0.4 | 0.1 | 0 |
COH | 0.3 | 0.01 | 0 | 0.35 | 0.02 | 0 | 0.2 | 0 | 0 |
REH | 0.25 | 0.1 | 0 | 0.28 | 0.12 | 0 | 0.2 | 0.1 | 0 |
RACH | 0.05 | 0.04 | 0 | 0.06 | 0.05 | 0 | 0.04 | 0.03 | 0 |
RACN | 0.03 | 0.02 | 0 | 0.04 | 0.03 | 0 | 0.03 | 0.01 | 0 |
REN | 0.01 | 0.01 | 0 | 0.02 | 0.02 | 0 | 0.01 | 0.01 | 0 |
DECN | 0.01 | 0.01 | 0 | 0.02 | 0.01 | 0 | 0.01 | 0 | 0 |
CON | 0.01 | 0.01 | 0 | 0.01 | 0.01 | 0 | 0.01 | 0 | 0 |
DECH | 0.45 | 0.2 | 0 | 0.5 | 0.3 | 0 | 0.4 | 0.1 | 0 |
DECN | 0.01 | 0.01 | 0 | 0.02 | 0.01 | 0 | 0.01 | 0 | 0 |
Type of jammer | TDR% (proposed model) and ‘Detection Rate %’(model by Cakiroglu et al.) | ||||||
---|---|---|---|---|---|---|---|
Proposed model | Cakiroglu et al. equivalent | jnr 25% | jnr 50% | jnr 100% | |||
Proposed | Cakiroglu | Proposed | Cakiroglu | Proposed | Cakiroglu | ||
DECH | Deceptive (bad) | 99.45 | 99.35 | 99.5 | 99.38 | 99.75 | 99.44 |
COH | Constant (bad) | 99.40 | 99.32 | 99.55 | 99.37 | 99.75 | 99.42 |
DECN | Deceptive | 99.35 | 99.25 | 99.40 | 99.29 | 99.50 | 99.43 |
CON | Constant | 99.15 | 99.20 * | 99.45 | 99.28 | 99.50 | 99.34 |
REH | Reactive (bad) | 99.10 | 99.15* | 99.20 | 99.18 | 99.25 | 99.32* |
REN | Reactive | 99.00 | 99.05* | 99.10 | 99.10 | 99.25 | 99.25 |
RADECH | Random (bad) | 99.00 | 99.06* | 99.05 | 99.06* | 99.10 | 99.16* |
RADECN | - | 98.90 | - | 99.00 | - | 99.10 | - |
RACH | - | 98.80 | - | 98.90 | - | 99.00 | - |
RACN | Random | 98.60 | 98.82* | 98.70 | 98.90* | 98.80 | 99.10* |
Type of jammer | FDR% (proposed model) and ‘False Positive Rate %’(model by Cakiroglu et al.) | ||||||
---|---|---|---|---|---|---|---|
Proposed model | Cakiroglu et al. equivalent | jnr 25% | jnr 50% | jnr 100% | |||
Proposed | Cakiroglu | Proposed | Cakiroglu | Proposed | Cakiroglu | ||
RADECH | Random (bad) | 0.7 | 0.8 | 0.4 | 0.51 | 0 | 0 |
RADECN | - | 0.6 | - | 0.3 | - | 0 | - |
DECH | Deceptive (bad) | 0.5 | 0.57 | 0.3 | 0.4 | 0 | 0 |
COH | Constant (bad) | 0.35 | 0.38 | 0.02 | 0.04 | 0 | 0 |
REH | Reactive (bad) | 0.28 | 0.3 | 0.12 | 0.13 | 0 | 0 |
RACH | - | 0.06 | - | 0.05 | - | 0 | - |
RACN | Random | 0.04 | 0.05 | 0.03 | 0.03 | 0 | 0 |
REN | Reactive | 0.02 | Not clear | 0.02 | Not clear | 0 | 0 |
DECN | Deceptive | 0.02 | Not clear | 0.01 | Not clear | 0 | 0 |
CON | Constant | 0.01 | Not clear | 0.01 | Not clear | 0 | 0 |
© 2010 by the authors; licensee Molecular Diversity Preservation International, Basel, Switzerland. This article is an open-access article distributed under the terms and conditions of the Creative Commons Attribution license ( http://creativecommons.org/licenses/by/3.0/).
Share and Cite
Misra, S.; Singh, R.; Mohan, S.V.R. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System. Sensors 2010, 10, 3444-3479. https://doi.org/10.3390/s100403444
Misra S, Singh R, Mohan SVR. Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System. Sensors. 2010; 10(4):3444-3479. https://doi.org/10.3390/s100403444
Chicago/Turabian StyleMisra, Sudip, Ranjit Singh, and S. V. Rohith Mohan. 2010. "Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System" Sensors 10, no. 4: 3444-3479. https://doi.org/10.3390/s100403444
APA StyleMisra, S., Singh, R., & Mohan, S. V. R. (2010). Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System. Sensors, 10(4), 3444-3479. https://doi.org/10.3390/s100403444