Jamming Attack in Wireless Sensor Networks using Ant Colony Algorithm

International Journal of Computer Science and Engineering
© 2021 by SSRG - IJCSE Journal
Volume 8 Issue 2
Year of Publication : 2021
Authors : K. Manojkumar, S. Devi

pdf
How to Cite?

K. Manojkumar, S. Devi, "Jamming Attack in Wireless Sensor Networks using Ant Colony Algorithm," SSRG International Journal of Computer Science and Engineering , vol. 8,  no. 2, pp. 6-9, 2021. Crossref, https://doi.org/10.14445/23488387/IJCSE-V8I2P102

Abstract:

The jamming attack is a standout amongst the most genuine danger in Wireless Sensor Networks (WSN). This sort of attack stops the nonstop communications and also vaporizes the essentialness of the sensor hubs. In WSN, a couple of sorts of DoS attacks in different layers might be performed. The physical layer being the most lessened layer and the first to be attacked by jammers. The systems to deflect jamming attacks incorporate installment for network assets, pushback, strong authentication, and identification. In this paper, the physical layer DoS attack is analyzed, and a defense mechanism is proposed utilizing the Ant algorithm, and its performance analysis has been validated. The simulation outcomes demonstrate that the proposed scheme helps in accomplishing the most extreme dependability on DoS claims to enhance the Quality of Service (QoS) and the energy of WSN.

Keywords:

Wireless sensor network, Jamming attack, Ant algorithm.

References:

[1] D. L. Adamy, D. Adamy, EW 102: A Second Course in Electronic Warfare, Artech House Publishers, (2004).
[2] E. Shi, A. Perrig, Designing Secure Sensor Networks, Wireless Communications Magazine, 11(6)(2004) 38-43.
[3] A. D. Wood and J. A. Stankovic, Denial of service in sensor networks, Computer, 35(10)(2002) 54-62.
[4] W. Xu, W. Trappe, Y. Zhang, T. Wood, The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks, in Proc. 6th ACM international symposium on Mobile ad hoc networking and computing, (2005) 46-57.
[5] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, A survey on sensor networks, IEEE Commun. Mag., (2002) 102-114.
[6] Ali Hamieh and Jalel Ben-Othman, Detection of Jamming Attacks in Wireless Ad Hoc Networks using Error Distribution, ANR (French Research National Agency) under CLADIS grant N. 05-SSIA-0018.978-1-4244-3435-0/2009 IEEE.
[7] Tao Jin, Guevara Noubir, and Bishal Thapa, Zero Pre-shared Secret Key Establishment in the Presence of Jammers, Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing, (2009) 219-228.
[8] Yao Liu, Peng Ning, Huaiyu Dai, and An Liu, Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication, IEEE INFOCOM, (2010) 1-9.
[9] Loukas Lazos, Sisi Liu, and Marwan Krunz,Mitigating Control-Channel Jamming Attacks in Multi-channel Ad Hoc Networks, Proceedings of the second ACM conference on Wireless network security, (2009) 169-180.
[10] Hong Huang, Nihal Ahmed, and Pappu Karthik, On a New Type of Denial of Service Attack in Wireless Networks: The Distributed Jammer Network, IEEE Transactions on Wireless Communications, 10(7)(2011).
[11] Alejandro Proan˜o and Loukas Lazos, Packet-Hiding Methods for Preventing Selective Jamming Attacks, IEEE Transactions On Dependable and Secure Computing, 9(1)(2012).
[12] Andrea Richa, Christian Scheideler, Stefan Schmid and Jin Zhang, A Jamming-Resistant MAC Protocol for Multi-Hop Wireless Networks, Distributed Computing Lecture Notes in Computer Science 6343(2010) 179-193.
[13] Varad A. Sarve, Dr. Swati S. Sherekar and Dr. Vilas M. Thakare, Learning the Channel Uncertainty for Defensive Security Enhancements in MANET with Trust Management SSRG International Journal of Mobile Computing and Application 4.1 (2017) 21-27.
[14] Jerry T. Chiang and Yih-Chun Hu, Cross-Layer Jamming Detection and Mitigation in Wireless Broadcast Networks, IEEE/ACM Transactions on Networking, 19(1)(2011).
[15] Mario Cagalj, Srdjan Capkun, and Jean-Pierre Hubaux, Wormhole-Based Antijamming Techniques in Sensor Networks Mario, IEEE Transactions on Mobile Computing, 6(1)(2007).
[16] Sisi Liu, Loukas Lazos, and Marwan Krunz, Thwarting Control-Channel Jamming Attacks from Inside Jammers,IEEE Transactions on Mobile Computing, 11(9)(2012).
[17] Zhenhua Liu, Hongbo Liu, Wenyuan Xu, and Yingying Chen, Exploiting Jamming-Caused Neighbor Changes for Jammer Localization, IEEE Transactions On Parallel And Distributed Systems, 23(3)(2012).
[18] E. M. Saad, M. El Adawy, H. A. Keshk, and Shahira M. Habashy Ant Algo Modification, Helwan University.
[19] Rajani Muraleedharan and Lisa Ann Osadciw, Jamming Attack Detection and Countermeasures In Wireless Sensor Network Using Ant System, Syracuse University.