Skip to main content
Log in

An adaptive neuro-fuzzy logic based jamming detection system in WSN

  • Focus
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

Wireless sensor network (WSN) is employed in variety of applications ranging from agriculture to military. WSN is vulnerable to various security attacks, in which jamming attacks obstruct and disturb the exchange of information between sensor nodes in WSN by transmitting signals to jam legitimate transmission to cause a denial of service. Hence, it is essential to secure the sensor networks from jamming attacks. In this paper, two approaches: fuzzy inference system (FIS) and adaptive neuro-fuzzy inference system (ANFIS)-based jamming detection system are proposed for detecting the presence of jamming by computing two jamming detection metrics, namely, packet delivery ratio and received signal strength indicator. FIS approach is based on Takagi–Sugeno fuzzy logic which optimizes the jamming detection metrics. ANFIS approach combines fuzzy logic and learning ability of the neural network to optimize the metrics for detecting various types of jamming. The proposed approaches are compared with existing system and themselves. The simulation result shows that the proposed ANFIS approach detects the jamming attacks as high as true detection ratio.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  • Abbasi AA, Younis M (2007) A survey on clustering algorithms for wireless sensor networks. Comput Commun 30(14–15):2826–2841

    Article  Google Scholar 

  • Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422

    Article  Google Scholar 

  • Alrajeh NA, Khan S, Shams B (2013) Intrusion detection systems in wireless sensor networks: a review. Int J Distrib Sens Netw 2013:1–7

    Article  Google Scholar 

  • Azad P, Sharma V (2013) Cluster head selection in wireless sensor networks under fuzzy environment. ISRN Sens Netw 2013:1–8

    Article  Google Scholar 

  • Boyinbode O, Le H, Mbogho A, Takizawa M, Poliah R (2010) A survey on clustering algorithms for wireless sensor networks. In: Proceedings of the 13th international conference on network-based information systems, pp 358–364. https://doi.org/10.1109/nbis.2010.59

  • Cakiroglu M, Ozcerit AT (2008) Jamming detection mechanisms for wireless sensor networks. In: Proceedings of the 3rd international conference on scalable information systems, pp 4–6, June 2008

  • Chen J-S, Hong Z-W, Wang N-C, Jhuang S-H (2010) Efficient cluster head selection methods for wireless sensor networks. J Netw 5(8):964–970

    Google Scholar 

  • Crosby GV, Pissinou N, Gadze J (2006) A framework for trust-based cluster head election in wireless sensor networks. In: Proceedings of 2nd IEEE workshop on dependability and security in sensor networks and systems, Columbia, pp 13–22

  • Devi R, Jha RK, Gupta A, Jain S, Kumar P (2017) Implementation of intrusion detection system using adaptive neuro-fuzzy inference system for 5G wireless communication network. Int J Electron Commun 74:94–106

    Article  Google Scholar 

  • Egbogah EE, Fapojuwo AO (2011) A survey of system architecture requirements for health care-based wireless sensor networks. Sensors 11:4875–4898

    Article  Google Scholar 

  • Fei H, Jiang M, Celentano L, Xiao Y (2008) Robust medical ad hoc sensor networks (MASN) with wavelet-based ECG data mining. Ad Hoc Netw 6(7):986–1012

    Article  Google Scholar 

  • Ferdous R, Muthukkumarasamy V, Sithirasenan E (2011) Trust-based cluster head selection algorithm for mobile ad hoc networks. In: IEEE 10th international conference on trust, security and privacy in computing and communications (TrustCom), Changsha, pp 589–596

  • Ganeshkumar P, Vijayakumar KP, Anandaraj M (2016) A novel jammer detection framework for cluster based wireless sensor networks. EURASIP J Wirel Commun Netw. https://doi.org/10.1186/s13638-016-0528-1

    Google Scholar 

  • Hong S, Lim S, Song J (2011) Unified modeling language based analysis of security attacks in wireless sensor networks: a survey. KSII Trans Internet Inf Syst. https://doi.org/10.3837/tiis.2011.04.010

    Google Scholar 

  • Hussain K, Abdullah AH, Iqbal S, Awan KM, Ahsan F (2013) Efficient cluster head selection algorithm for MANET. J Comput Netw Commun 2013:7

    Google Scholar 

  • Jo M, Han L, Duy Tan N, Peter H (2015) A survey: energy exhausting attacks in MAC protocols in WBANs. Telecommun Syst 58(2):153–164. https://doi.org/10.1007/s11235-014-9897-0

    Article  Google Scholar 

  • Kang S, Lee S, Ahn S, An S (2012) Energy efficient topology control based on sociological cluster in wireless sensor networks. KSII Trans Internet Inf Syst 6(1):339–358

    Google Scholar 

  • Kuila P, Jana PK (2012) Improved load balanced clustering algorithm for wireless sensor networks. Adv Comput Netw Secur 7135:399–404

    Article  Google Scholar 

  • Kumar D (2014) Performance analysis of energy efficient clustering protocol for maximizing lifetime of wireless sensor networks. IET Wirel Sens Syst 4(1):9–16

    Google Scholar 

  • Liu X (2012) A survey on clustering routing protocols in wireless sensor networks. Sensors 12(8):11113–11153. https://doi.org/10.3390/s120811113

    Article  Google Scholar 

  • Liu X, Shi J (2012) Clustering routing algorithms in wireless sensor networks: an overview. KSII Trans Internet Inf Syst 6(7):1735–1755

    Google Scholar 

  • Manju VC, Kumar MS (2012) Detection of jamming style DoS attack in wireless sensor network. In: Proceedings of second IEEE international conference on parallel distributed and grid computing (PDGC), pp 563–567

  • Mario S, Boris D, Srdjan C (2010) Detection of reactive jamming in sensor networks. ACM Trans Sens Netw. https://doi.org/10.1145/1824766.1824772

    Google Scholar 

  • Mathur N, Glesk I, Buis A (2016) Comparison of adaptive neuro-fuzzy inference system (ANFIS) and Gaussian processes for machine learning (GPML) algorithms for the prediction of skin temperature in lower limb prostheses. Med Eng Phys 38(10):1083–1089

    Article  Google Scholar 

  • Misra S, Singh R, Rohith Mohan SV (2010) Information warfare-worthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system. Sensors 10(4):3444–3479

    Article  Google Scholar 

  • Mo S, Chen H, Yinglong L (2011) Clustering-based routing for top-k querying in wireless sensor networks. EURASIP J Wirel Commun Netw 2011:73

    Article  Google Scholar 

  • Mokammel Haque M, Pathan A-SK, Hong CS, Huh E-N (2008) An asymmetric key-based security architecture for wireless sensor networks. KSII Trans Internet Inf Syst. https://doi.org/10.3837/tiis.2008.05.004

    Google Scholar 

  • Paramasivan B, Kaliappan M (2014) Secure and fair cluster head selection protocol for enhancing security in mobile ad hoc networks. Sci World J 2014:1–6

    Article  Google Scholar 

  • Park S-J, Vedantham R, Sivakumar R, Akyildiz IF (2008) GARUDA: achieving effective reliability for downstream communication in wireless sensor networks. IEEE Trans Mob Comput 7(2):214–230

    Article  Google Scholar 

  • Rajshekhar Chalak A, Misra S, Obaidat MC (2010) A cluster-head selection algorithm for wireless sensor networks. In: 17th IEEE international conference on electronics, circuits, and systems ICECS, pp 130–133

  • Rani TP, Jayakumar C (2012) Survey on key pre distribution for security in wireless sensor networks. Adv Comput Sci Inf Technol Netw Commun 84:248–252. https://doi.org/10.1007/978-3-642-27299-8_26

    Google Scholar 

  • Shi E, Perrig A (2004) Designing secure sensor networks. IEEE Wirel Commun 11(6):38–43

    Article  Google Scholar 

  • Shon T, Park Y (2009) A hybrid adaptive security framework for IEEE 802.15.4-based wireless sensor networks. KSII Trans Internet Inf Syst. https://doi.org/10.3837/tiis.2009.06.002

    Google Scholar 

  • Siddhabathula K, Dong Q, Liu D, Wright M (2012) Fast jamming detection in sensor networks. In: Proceedings of IEEE international conference on communications, pp 934–938

  • Sikander G, Zafar MH, Raza A, Babar MI, Mahmud SA, Khan GM (2013) A survey of cluster based routing schemes for wireless sensor network. Smart Comput Rev 13(4):261–275

    Google Scholar 

  • Singh SP, Sharma SC (2015) A survey on cluster based routing protocols in wireless sensor networks. Procedia Comput Sci 45:687–695

    Article  Google Scholar 

  • Vijayakumar KP, Ganeshkumar P, Anandaraj M (2015) A novel jamming detection technique in wireless sensor networks. KSII Trans Internet Inf Syst 9(10):4223–4249

    Google Scholar 

  • Vijayakumar KP, Ganeshkumar P, Anandaraj M, Selvaraj K, Sivakumar P (2018) Fuzzy logic–based jamming detection algorithm for cluster based wireless sensor network. Int J Commun Syst 31:e3567. https://doi.org/10.1002/dac.3567

    Article  Google Scholar 

  • Wang XY, Wong A (2013) Multi-parametric clustering for sensor node coordination in cognitive wireless sensor networks. PLoS ONE. https://doi.org/10.1371/journal.pone.0053434

    Google Scholar 

  • Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the sixth ACM international symposium on mobile ad hoc networking and computing, pp 46–57, Nov 2005

  • Yadav RK, Kumar V, Kumar R (2015) A discrete particle swarm optimization based clustering algorithm for wireless sensor networks. Adv Intell Syst Comput 338:137–144

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to K. P. Vijayakumar.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Human and animal rights

We have not performed any experiments which involve animals or humans.

Additional information

Communicated by P. Pandian.

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Vijayakumar, K.P., Pradeep Mohan Kumar, K., Kottilingam, K. et al. An adaptive neuro-fuzzy logic based jamming detection system in WSN. Soft Comput 23, 2655–2667 (2019). https://doi.org/10.1007/s00500-018-3636-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-018-3636-5

Keywords

Navigation