Skip to main content
Log in

Scrutiny of unruly and abuse in wireless networks to mitigate physical layer threats using discriminate based misbehavior prevention

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

The open nature of communication medium in wireless networks becomes easy for the attackers to indulge in jamming attack. Jamming blocks the communication channel with the intent of preventing the flow of useful information. Jammers effectively and stealthy corrupts the packet by injecting high level of noise thereby keeping the channel busy so that the legitimate traffic gets completely blocked, resulting in packet loss at the receiver side. Securing the information from the jammers has become very important. Therefore an effective approach is needed to prevent this attack and this paper proposes Discriminate based Misbehavior Prevention DMP scheme to identify and to detach the jammer that corrupts the packet in wireless network. The proposed scheme consists of three modules. In module one, the log files are analyzed and using the trusting mechanism the suspected traces are identified. In module two, three reshuffling algorithms has been developed for reshuffling and identifying doubtful traces. In module three, the jammer nodes are identified and detached from the network. By simulation studies, it is observed that the proposed scheme attains higher throughput and packet delivery ratio while attaining lower delay.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Attar, A., et al.: A survey of security challenges in cognitive radio networks: solutions and future research directions. Proc. IEEE. 100(12), 3172–3186 (2012)

    Article  Google Scholar 

  2. Bayraktaroglu, E., et al.: On the performance of IEEE 802.11 under jamming. In: Proceedings of IEEE INFOCOM, pp. 1265–1273 (2008)

  3. Broustis, I., et al.: A software framework for alleviating the effects of MAC-aware jamming attacks in wireless access networks. Wirel. Netw. 17(6), 1543–1560 (2011)

    Article  Google Scholar 

  4. Cagalj, M., et al.: Wormhole-based anti jamming techniques in sensor networks. IEEE Trans. Mob. Comput. 6(1), 100–114 (2007)

    Article  Google Scholar 

  5. Chiang, J., et al.: Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Trans. Netw. 19(1), 286–289 (2011)

    Article  Google Scholar 

  6. Christina, P., et al.: Jamming-resistant broadcast communication without shared keys. In: Proceedings USENIX Security Symposium (2009)

  7. Daidone, R., et al.: A solution to the GTS-based selective jamming attack on IEEE 802.15.4 networks. Wirel. Netw. 20(5), 1223–1235 (2014)

    Article  Google Scholar 

  8. Han, J., et al.: Data Mining: Concepts and Techniques, 3rd edn. Morgan Kaufmann Publishers (2001)

  9. He, D., et al.: ReTrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Trans. Inf. Technol. Biomed. 16(4), 623–632 (2012)

    Article  Google Scholar 

  10. Jing, Q., et al.: Security of the Internet of things: perspectives and challenges. Wirel. Netw. 20(8), 2481–2501 (2014)

    Article  Google Scholar 

  11. Konstantinos, P., et al.: A measurement-driven anti-jamming system for 802.11 networks. IEEE/ ACM Trans. Netw. 19(4):1208–1222 (2011)

  12. Konstantinos, P., et al.: On the efficacy of frequency hopping in coping with jamming attacks in 802.11 networks. IEEE Trans. Wirel. Commun. 9(10), 3258–3271 (2010)

    Article  Google Scholar 

  13. Konstantinos, P., et al.: Denial of service attacks in wireless networks: the case of jammers. IEEE Commun. Surv. Tutor. 13(2), 245–257 (2011)

    Article  Google Scholar 

  14. Law, Y.W., et al.: Energy efficient link-layer jamming attacks against wireless sensor network MAC protocols. ACM Trans. Sens. Netw. 5(1), 1–38 (2009)

    Article  MathSciNet  Google Scholar 

  15. Li, C., et al.: Communication efficiency of anti-jamming broadcast in large-scale multi-channel wireless networks. IEEE Trans. Signal Process. 60(10), 5281–5292 (2012)

    Article  MathSciNet  Google Scholar 

  16. Li, X., et al.: LDTS: a lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans. Inf. Forensic. Security 8(6), 924–935 (2013)

    Article  Google Scholar 

  17. Liu, B., et al.: Toward incentivizing anti-spoofing deployment. IEEE Trans. Inf. Forensics Security 9(3), 436–450 (2014)

    Article  Google Scholar 

  18. Nguyen, H., et al.: Alibi framework for identifying reactive jamming nodes in wireless LAN. In: IEEE Global Telecommunication Conference (GLOBECOM 2011), pp. 1–6 (2011)

  19. Proano, A., et al.: Packet-hiding methods for preventing selective jamming attacks. IEEE Trans. Dependable Secure Comput. 9(1), 101–114 (2012)

    Article  Google Scholar 

  20. Richa, A., et al.: An efficient and fair MAC protocol robust to reactive interference. IEEE/ACM Trans. Netw. 21(3), 760–771 (2013)

    Article  Google Scholar 

  21. Shiu, Y.S., et al.: Physical layer security in wireless networks: a tutorial. IEEE Wirel. Commun. 18(2):66–74 (2011)

  22. Singh, J., et al.: A cross-layer based intrusion detection technique for wireless networks. Int. Arab J. Inf. Technol. 9(3), 201–207 (2012)

    Google Scholar 

  23. Thamilarasu, G., et al.: Improving reliability of jamming attack detection in ad hoc networks. Int. J. Commun. Netw. Inf. 3(1), 57–66 (2011)

    Google Scholar 

  24. Wang L., et al.: A combined approach for distinguishing different types of jamming attacks against wireless networks. In: IEEE Pacific Rim (PacRim) Conference on Communications, Computers and Signal Processing (2011)

  25. Wilhelm, M., et al.: Reactive jamming in wireless networks: how realistic is the threat\(\tau \). In: Proceedings of WiSec, pp. 47–52 (2011)

  26. Yan, Z., et al.: A survey on trust management for Internet of things. J. Netw. Comput. Appl. 42, 120–134 (2014)

    Article  Google Scholar 

  27. Yang, H., et al.: Provably secure three-party authenticated key agreement protocol using smart cards. Comput. Netw. 58, 29–38 (2014)

    Article  Google Scholar 

  28. Yao, G., et al.: Passive IP traceback: disclosing the locations of ip spoofers from path backscatter. IEEE Trans. Inf. Forensics Security 10(3), 471–484 (2015)

    Article  Google Scholar 

  29. Zhang, Z., et al.: ECG-cryptography and authentication in body area networks. IEEE Trans. Inf. Technol. Biomed. 16(6), 1070–1078 (2012)

    Article  Google Scholar 

  30. Zhou, J., et al.: Securing m-healthcare social networks: challenges, countermeasures and future directions. IEEE Wirel. Commun. 20(4) (2013)

Download references

Acknowledgments

This work was supported in part by Anna University recognized Research Center Lab at Francis Xavier Engineering College, Tirunelveli, India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Raja Ratna.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ratna, S.R., Ravi, R. Scrutiny of unruly and abuse in wireless networks to mitigate physical layer threats using discriminate based misbehavior prevention. Cluster Comput 19, 87–97 (2016). https://doi.org/10.1007/s10586-015-0529-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-015-0529-6

Keywords

Navigation