Using a lightweight security mechanism to detect and localize jamming attack in wireless sensor networks

被引:6
|
作者
Alikh, Nashab [1 ]
Rajabzadeh, Amir [1 ]
机构
[1] Razi Univ, Dept Comp Engn & Informat Technol, Kermanshah, Iran
来源
OPTIK | 2022年 / 271卷
关键词
IoT; DoS; WSN; Jamming attack; Localization; Omnidirectional jammer; JAMMER LOCALIZATION;
D O I
10.1016/j.ijleo.2022.170099
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Recent years have seen a rise in the popularity of the Internet of Things (IoT) and its applications, due to its adaptability, usability, varied application potential, and ease of deployment. On the other hand, security threats get more attention. Where wireless sensor networks (WSN), which is the core of IoT, are vulnerable to the jammer's attack due to the fact that they are shared and have open access to a wireless channel. Moreover, the difficult conditions in which nodes are distributed, such as underwater, fires, volcanoes, animal habitats, or battlefields, node localiza-tion is a significant challenge for the majority of WSN applications. Additionally, the lack of accuracy in traditional localization algorithms has prompted researchers to propose optimization techniques capable of improving localization accuracies, such as genetic algorithms, gravitational search algorithms, neural networks, and deep learning; however, these techniques require additional hardware to perform their complex calculations. On the other side, uncomplicated algorithms like Virtual Force Iteration Localization (VFIL), Weighted Centroid Localization (WCL), and Centroid Localization (CL) are less accurate. To bridge that gap, this work proposes a lightweight algorithm for accurately locating the jammer's coordinates. Our algorithm consists of three phases firstly, a simple way to detect a jamming attack. Second novel designed technique to draw the jammed region using the mapping protocol. Moreover, a range-free technique is pro-posed to locate the jammer based on geometric calculations. Finally, A set of simulation exper-iments was undertaken to assess the suggested algorithm's performance. Experiments reveal that the suggested method is capable of precisely locating the jammer. Additionally, the presented method demonstrates superior efficiency in comparison to existing methods.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] An Intelligent Technique to Detect Jamming Attack in Wireless Sensor Networks (WSNs)
    E. Sasikala
    N. Rengarajan
    International Journal of Fuzzy Systems, 2015, 17 : 76 - 83
  • [2] An Intelligent Technique to Detect Jamming Attack in Wireless Sensor Networks (WSNs)
    Sasikala, E.
    Rengarajan, N.
    INTERNATIONAL JOURNAL OF FUZZY SYSTEMS, 2015, 17 (01) : 76 - 83
  • [3] Localization for Jamming Attack in Wireless Sensor Networks
    Zhang, Jing
    Xu, Li
    Shen, Qun
    Ji, Xiaorong
    INTELLIGENT DATA ANALYSIS AND APPLICATIONS, 2015, 370 : 361 - 369
  • [4] Efficient security mechanism to counter the malicious attack in wireless sensor networks
    Sunil Gupta
    Harsh K. Verma
    A. L. Sangal
    CSI Transactions on ICT, 2014, 2 (1) : 35 - 41
  • [5] Pulse jamming attack detection using swarm intelligence in wireless sensor networks
    Sudha, I.
    Mustafa, Mohammed Ahmed
    Suguna, R.
    Karupusamy, Sathishkumar
    Ammisetty, Veeraswamy
    Shavkatovich, Shavkatov Navruzbek
    Ramalingam, M.
    Kanani, Pratik
    OPTIK, 2023, 272
  • [6] Lightweight Security Protocol for Wireless Sensor Networks
    Biswas, Kamanashis
    2014 IEEE 15TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), 2014,
  • [7] A Statistical Approach to Detect Jamming Attacks in Wireless Sensor Networks
    Osanaiye, Opeyemi
    Alfa, Attahiru S.
    Hancke, Gerhard P.
    SENSORS, 2018, 18 (06)
  • [8] Hybrid anti-jamming attack for wireless sensor networks
    Sun Z.
    Xu Y.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2019, 41 (09): : 2132 - 2140
  • [9] The Security Mechanism for Wireless Sensor Networks
    Gao, Feng
    Hu, Zhihua
    ADVANCES IN CIVIL ENGINEERING II, PTS 1-4, 2013, 256-259 : 2392 - +
  • [10] Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System
    Misra, Sudip
    Singh, Ranjit
    Mohan, S. V. Rohith
    SENSORS, 2010, 10 (04) : 3444 - 3479