Impact of High-Mobility Radio Jamming in Large-Scale Wireless Sensor Networks

  • Chulho Won
  • Jong-Hoon Youn
  • Hesham Ali
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4097)


Denial-Of-Service (DOS) attack is recognized as a biggest threat against the operation of large-scale wireless sensor networks (WSN). Especially, high-mobility radio jamming like vehicles carrying radio jamming device can cause a serious damage in performance of WSNs. Because of resource-constraint design of sensor node, it is hard to provide enough protection against high-mobility jamming attack. Therefore, large-scale WSNs are extremely vulnerable to that type of DOS attack. Recognizing the importance of the problem, we conducted a simulation study to investigate the impact of radio jamming on the performance of a large-scale WSN. Based on the simulation results, the moving speed of radio jamming source has the most conspicuous effects on the WSN performance such as packet delivery success ratio and delay. As the speed changes from 8 m/sec to 1 m/sec, the success ratio drops by up to 10%. On the other hand, the delay increases by up to 55%.


Sensor Network Sensor Node Wireless Sensor Network Packet Delay Success Ratio 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Shah, R.C., Roy, S., Jain, S., Brunette, W.: Data MULEs: Modeling and Analysis of A Three-tier Architecture for Sparse Sensor Networks. In: Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications (SPNA), Anchorage, Alaska (May 2003)Google Scholar
  2. 2.
    Ember, EM2420 2.4 GHz IEEE 802.15.4/ZigBee RF Transceiver, Available at :
  3. 3.
    Crossbow Technology Inc., Avoiding RF Interference between WiFi and Zigbee, Available at:
  4. 4.
    Perkins, C.E., Royer, E.M.: Ad-hoc On Demand Distance Vector Routing. In: Proceedings of the WMCSA 1999 (1999)Google Scholar
  5. 5.
    Karp, B., Kung, H.T.: GPSR: Greedy Perimeter Stateless Routing for Wireless Networks. In: Proceedings of the Mobicom (2000)Google Scholar
  6. 6.
    Fang, Q., Gao, J., Guibas, L.J.: Locating and Bypassing Routing Holes in Sensor Networks. In: Proceedings of the Infocom (2004)Google Scholar
  7. 7.
    Fuji, T., Nishioka, S.: Selective Handover for Traffic Balance in Mobile Radio Communications. In: Proceedings of the ICC (1992)Google Scholar
  8. 8.
    Shah, A.R., Hmimy, H., Yost, G.: Models and Methodology of Coverage Verification in Cellular Systems. In: Proceedings of the IEEE Vehicular Technology Conference (1998)Google Scholar
  9. 9.
    Qin, L., Kunz, T.: Proactive Route Maintenance in DSR. ACM SIGMOBILE Mobile Computing and Communication Reviews 6(3) (July 2002)Google Scholar
  10. 10.
    Wood, A.D., Stankovic, J.A.: Denial of Service in Sensor Networks. IEEE Computer 35, 48–56 (2002)Google Scholar
  11. 11.
    Wood, A.D., Stankovic, J.A., Son, S.H.: JAM: A Jammed-Area Mapping Service for Sensor Networks. In: Proceedings of the 24th IEEE International Real Time Systems Symposium (2003)Google Scholar
  12. 12.
    Ahmed, N., et al.: The Holes Problem in Wireless Sensor Neworks: A Survey. Technical Report, UNSW-CSE-TR-043, The University of South Wales, Sydney, Australia (2004)Google Scholar
  13. 13.
    NS2 Simulator for 802.1.5.4, Available at:
  14. 14.
    Crossbow Technology Inc., MICAz Wireless Measurement System, Available at:
  15. 15.
    Steibeis-Transfer Centre, Compatibility of IEEE802.15.4 (Zigbee) with IEEE802.11 (WLAN), Bluetooth, and Microwave Ovens in 2.4 GHz ISM-Band, Available at:
  16. 16.
    Howit, I., Gutierrez, J.A.: IEEE 802.15.4 Low Rate-Wireless Personal Area Network Coexistence. Issues Wireless Communications and Networking 3, 1481–1486 (2003)Google Scholar
  17. 17.
    Howitt, I., Mitter, V., Gutierrez, J.: Empirical Study for IEEE 802.11 and Bluetooth Interoperability. In: Proceedings of the IEEE Vehicular Technology Conference (Spring 2001)Google Scholar
  18. 18.
    Golmie, N.: Bluetooth Dynamic Scheduling and Interference Mitigation. ACM Mobile Networks, MONET 9(1) (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Chulho Won
    • 1
  • Jong-Hoon Youn
    • 1
  • Hesham Ali
    • 1
  1. 1.Computer Science DepartmentUniversity of Nebraska at OmahaOmahaUSA

Personalised recommendations