An Experimental Analysis of Jamming Attacks on Medium Access in Wireless Sensor Networks

  • Fernando Henrique Gielow UFPR
  • Aldri Santos UFPR
  • Michele Nogueira UFPR

Abstract


The use of wireless sensors is increasingly common today, promoting ubiquitous and pervasive applications. However, wireless communication is susceptible to noise and interference, being vulnerable to several kinds of attack, particularly those which undermine the wireless medium. As wireless devices communicate in specific transmission frequencies, a jamming attack aims at overloading these frequencies with malicious traffic, intending to cause collisions on transmissions of legitimate nodes. Currently, the majority of existing works deal with jamming only through simulations or by analytical models. However, it is important to investigate the impact of these attacks in real networks. This work conducts an experimental study about the impact of jamming attacks in real scenarios, followed by a verification and a comparative between experimental and simulation results, highlighting the differences among them. It is also expected to show the way in which the variation of the used transmission power can increase the efficiency of the jamming attack or improve the quality of communication.

References

Avrora (2008). [link]. acesso: 10/03/2012.

CC2420 (2007). [link]. acesso: 10/03/2012.

Chiang, J. T. and Hu, Y.-C. (2011). Cross-layer jamming detection and mitigation in wireless broadcast networks. IEEE/ACM Trans. Netw., 19(1):286–298.

Hussain, A. and Saqib, N. A. (2011). Protocol aware shot-noise based radio frequency jamming method in 802.11 networks. In IEEE WOCN, pages 1–6.

Levis, P., Madden, S., Polastre, J., Szewczyk, R., Woo, A., Gay, D., Hill, J., Welsh, M., Brewer, E., and Culler, D. (2004). Tinyos: An operating system for sensor networks. In in Ambient Intelligence. Springer Verlag.

Martinovic, I., Pichota, P., and Schmitt, J. B. (2009). Jamming for good: a fresh approach to authentic communication in WSNs, pages 161–168. Proceedings of the Second ACM Conference on Wireless Network Security.

MicaZ. [link]. acesso: 10/03/2012.

Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C., and Pantziou, G. (2009). A survey on jamming attacks and countermeasures in wsns. IEEE Communications Surveys & Tutorials, 11(4):42 – 56.

Ramya, C., Shanmugaraj, M., and Prabakaran, R. (2011). Study on zigbee technology. 3rd International Conference on Electronics Computer Technology (ICECT), 6:297 – 301.

Sang, L. and Arora, A. (2009). Capabilities of low-power wireless jammers. In IEEE INFOCOM, pages 2551–2555.

Werner-Allen, G., Lorincz, K., Johnson, J., Lees, J., and Welsh, M. (2006). Fidelity and yield in a volcano monitoring sensor network. In Proceedings of the 7th symposium on Operating systems design and implementation, OSDI ’06, pages 381–396, Berkeley, CA, USA. USENIX Association.

Xu, W. (2007). On adjusting power to defend wireless networks from jamming. In Proceedings of the 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking&Services (MobiQuitous), MOBIQUITOUS ’07, pages 1–6, Washington, DC, USA. IEEE Computer Society.

Xu, W., Ma, K., Trappe, W., and Zhang, Y. (2006). Jamming sensor networks: attack and defense strategies. IEEE Network, 20(3):41–47.

Xu, W., Trappe, W., Zhang, Y., and Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, MobiHoc ’05, pages 46–57, New York, NY, USA. ACM.
Published
2012-07-16
GIELOW, Fernando Henrique; SANTOS, Aldri; NOGUEIRA, Michele. An Experimental Analysis of Jamming Attacks on Medium Access in Wireless Sensor Networks. In: PROCEEDINGS OF BRAZILIAN SYMPOSIUM ON UBIQUITOUS AND PERVASIVE COMPUTING (SBCUP), 4. , 2012, Curitiba/PR. Anais [...]. Porto Alegre: Sociedade Brasileira de Computação, 2012 . p. 121-130. ISSN 2595-6183.