Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System

被引:44
|
作者
Misra, Sudip [1 ]
Singh, Ranjit [1 ]
Mohan, S. V. Rohith [2 ]
机构
[1] Indian Inst Technol, Sch Informat Technol, Kharagpur 721302, W Bengal, India
[2] Indian Inst Technol, Dept Math, Kharagpur 721302, W Bengal, India
关键词
wireless sensor networks; jamming detection; fuzzy inference system; information warfare;
D O I
10.3390/s100403444
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
The proposed mechanism for jamming attack detection for wireless sensor networks is novel in three respects: firstly, it upgrades the jammer to include versatile military jammers; secondly, it graduates from the existing node-centric detection system to the network-centric system making it robust and economical at the nodes, and thirdly, it tackles the problem through fuzzy inference system, as the decision regarding intensity of jamming is seldom crisp. The system with its high robustness, ability to grade nodes with jamming indices, and its true-detection rate as high as 99.8%, is worthy of consideration for information warfare defense purposes.
引用
收藏
页码:3444 / 3479
页数:36
相关论文
共 50 条
  • [31] A new clustering approach in wireless sensor networks using fuzzy system
    Mahnaz Toloueiashtian
    Homayun Motameni
    The Journal of Supercomputing, 2018, 74 : 717 - 737
  • [32] A new clustering approach in wireless sensor networks using fuzzy system
    Toloueiashtian, Mahnaz
    Motameni, Homayun
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (02): : 717 - 737
  • [33] Intrusion Detection Algorithm Based on Neighbor Information Against Sinkhole Attack in Wireless Sensor Networks
    Han, Guangjie
    Li, Xun
    Jiang, Jinfang
    Shu, Lei
    Lloret, Jaime
    COMPUTER JOURNAL, 2015, 58 (06): : 1280 - 1292
  • [34] Modeling and simulation of defense game model for jamming attack in wireless sensor networks using evolutionary game theory
    Pitchai, K. Mohaideen
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (05):
  • [35] Code Attestation Based Intrusion Detection System for Compression Attack in Wireless Sensor Networks
    Surti, Neelam A.
    Jinwala, Devesh C.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2015, 10 (05): : 209 - 216
  • [36] Ranger Intrusion Detection System for Wireless Sensor Networks with Sybil Attack Based on Ontology
    Chen, Rung-Ching
    Haung, Yung-Fa
    Hsieh, Chia-Fen
    NEW ASPECTS OF APPLIED INFORMATICS, BIOMEDICAL ELECTRONICS AND INFORMATICS AND COMMUNICATION, 2010, : 176 - +
  • [37] Intrusion detection system against SinkHole attack in wireless sensor networks with mobile sink
    Guerroumi, Mohamed
    Derhab, Abdelouahid
    Saleem, Kashif
    2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 307 - 313
  • [38] Low Complexity Signed Response Based Sybil Attack Detection Mechanism in Wireless Sensor Networks
    Khan, M. Saud
    Khan, Noor M.
    JOURNAL OF SENSORS, 2016, 2016
  • [39] Early Fire Detection System Using Wireless Sensor Networks
    Kadri, Benamar
    Bouyeddou, Benamar
    Moussaoui, Djillali
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON APPLIED SMART SYSTEMS (ICASS), 2018,
  • [40] A Misused Key Detection Mechanism Using the Token in Wireless Sensor Networks
    Kang, Dong-Min
    Park, Min-woo
    Han, Young-Ju
    Park, Seon-Ho
    Chung, Tai-Myoung
    12TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY: ICT FOR GREEN GROWTH AND SUSTAINABLE DEVELOPMENT, VOLS 1 AND 2, 2010, : 238 - 242