Skip to main content
Log in

Securing jammed network using reliability behavior value through neuro-fuzzy analysis

  • Published:
Sadhana Aims and scope Submit manuscript

Abstract

Wireless multi-hop networks are often exposed to serious physical layer jamming attack. In this attack, the jammer node corrupts the packet by injecting high level of noise and keeps the channel busy and thus blocks the legitimate communication. If multiple jammers collude together, this attack will become very severe. To prevent this attack, a simple yet effective Reliability Behavior Neuro-Fuzzy system has been proposed and it operates in three modules. In module one, each route node obtains its behavior value from the route path and neighboring paths using direct and indirect behavior observations. In module two, based on the behavior value, three factor identification methods have been presented to identify the reliability value of nodes. In module three, using the reliability value the route nodes are level positioned and classified into groups by a neuro-fuzzy classifier. By simulation studies, it is observed that the proposed scheme significantly not only identifies misbehaving nodes with higher detection rate and lower false positive and but also achieves higher network throughput and lower jamming throughput.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6

Similar content being viewed by others

References

  • Adnane A, Bidan C and Rafael T S 2013 Trust-based security for the OLSR routing protocol. Comput. Commun.

  • Amariucai G T 2009 Physical layer security in wireless networks: Intelligent jamming and Eavesdropping. Ph.D. Louisiana State University. Louisiana

  • Bao F, Chen I R, Chang M J and Cho J H 2012 Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Network Service Manag. 9(2): 169–183

  • Chiang J T and Hu Y C 2011 Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Trans. Networking 19(1): 1063–6692

  • Furdek M and Kapov N S 2013 Attack-survivable routing and wavelength assignment for high-power jamming. In: 17 th international conference optical network design and modeling (ONDM). 70–75

  • Josang A, Ismail R and Boyd C 2007 A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2): 618–644

  • Li C, Dai H, Xiao L and Ning P 2012 Communication efficiency of anti-jamming broadcast in large-scale multi-channel wireless networks. IEEE Trans. Signal Process. 60(10): 5281–5292

  • Liu H, Frias J D and Hongxun S M 2007 Using a two-timer scheme to detect selfish nodes in mobile ad-hoc networks. Proceedings of international conference on communications, internet and information technology 38(1): 40–46

  • Mar J, Yeh Y C and Hsiao I F 2010 An ANFIS-IDS against de-authentication DOS attacks for a WLAN. International symposium on information theory and its applications (ISITA) 548–553

  • Mustafa H, Zhang X, Liu Z, Xu W and Perrig A 2012 Jamming-resilient multipath routing. IEEE Trans. Dependable Secure Comput. 9(6): 852–864

  • Nguyen H, Pongthawornkamol T and Nahrstedt K 2011 Alibi framework for identifying reactive jamming nodes in wireless LAN. IEEE Globecom

  • Noubir G and Lin G 2003 Low-power DoS attacks in data wireless lans and countermeasures. Mobile Comput. Commun. Rev. 7(3): 29–30

  • Pelechrinis K, Koufogiannakis C and Krishnamurthy S V 2010 On the efficacy of frequency hopping in coping with jamming attacks in 802.11 networks. IEEE Trans. Wireless Commun. 9(10): 3258–3271

  • Proano A and Lazos L 2012 Packet-hiding methods for preventing selective jamming attacks. IEEE Trans. Dependable Secure Comput. 9(1): 101–114

  • Ratna S R, Ravi R and Beulah S 2014 An intelligent approach based on neuro- fuzzy detachment scheme for preventing jamming attack in wireless networks. J. Intell. Fuzzy Logic. doi: 10.3233/IFS-141363. ISSN 1064–1246(Print). 1875-8967 Online (in press)

  • Richa A, Scheideler C, Schmid S and Zhang J 2013 An efficient and fair MAC protocol robust to reactive interference. IEEE/ACM Trans. Networking 21(3): 760–771

  • Sarker J H and Mouftah H T 2012 Mitigating the effect of jamming signals in wireless ad hoc and sensor networks. IET Commun. 6(3): 311–317

  • Shila D M, Yu C and Anjali T 2010 Mitigating selective forwarding attacks with a channel-aware approach in WMNs. IEEE Trans. Wireless Commun. 9(5): 1661–1675

  • Shiu Y S, Chang S Y, Wu H C, Huang S C H and Chen H H 2011 Physical layer security in wireless networks: A tutorial. IEEE Wireless Commun. 18(2): 66–74

  • Singh S, Sarje A K and Misra M 2012 Client-side counter phishing application using adaptive neuro-fuzzy inference system. Fourth international conference on computational intelligence and communication networks (CICN) 788–792

  • Spuhler M, Giustiniano D, Lenders V, Wilhelm M and Jens B S 2014 Detection of reactive jamming in DSSS-based wireless communications. IEEE Trans. Wireless Commun. 13(3): 1593–1603

  • Tomohiro T and Michio S 1985 Fuzzy identification of systems and its applications to modelling and control. IEEE Trans. Syst., Man Cybern. 15(1): 116–132

  • Xiaoyong L, Zhou F and Du J 2013 LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Trans. Inform. Forensics Security 8(6): 924–935

  • Xuan Y, Shen Y, Nguyen N P and Thai M T 2012 A trigger identification service for defending reactive jammers in WSN. IEEE Trans. Mobile Comput. 11(5): 793–806

  • Zhan G, Shi W and Deng J 2012 TARF: Design and implementation of TARF: A trust-aware routing framework for WSNs. IEEE Trans. Dependable Secure Comput. 9(2): 184–197

Download references

Acknowledgements

This work was supported in part by Anna University, Chennai recognized research center lab at Francis Xavier Engineering College, Tirunelveli, India.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S RAJA RATNA.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

RATNA, S.R., RAVI, R. Securing jammed network using reliability behavior value through neuro-fuzzy analysis. Sadhana 40, 1139–1153 (2015). https://doi.org/10.1007/s12046-015-0377-3

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12046-015-0377-3

Keywords

Navigation