Skip to main content

24.04.2024 | Special Issue Paper

A detailed review of wireless sensor network, jammer, the types, location, detection and countermeasures of jammers

verfasst von: Zainab Shaker Matar Al-Husseini, Hussain K. Chaiel, Amel Meddeb, Ahmed Fakhfakh

Erschienen in: Service Oriented Computing and Applications

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This review article explores jamming attacks, a critical security threat disrupting communication in wireless sensor networks (WSNs). We begin by introducing WSNs and highlighting the detrimental effects of jamming. The article then delves into various research directions for mitigating jamming in WSNs. This includes exploring different jamming techniques, their impact, and potential countermeasures. We categorize jamming techniques and analyze existing detection and localization mechanisms. Furthermore, we examine current security approaches for combating jamming attacks in WSNs. We identify unresolved research challenges in this area and compare our survey with previous work on jamming in WSNs. This review provides a comprehensive overview of jamming threats in WSNs, outlining existing solutions and future research directions for robust network security.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) A survey on sensor networks. IEEE Commun Mag 40:102–114CrossRef Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) A survey on sensor networks. IEEE Commun Mag 40:102–114CrossRef
2.
Zurück zum Zitat Mann PS, Singh S, Kumar A (2016) Computational intelligence based meta heuristic for energy-efficient routing in wireless sensor networks. In: Congress on evolutionary computation (CEC). IEEE, pp 4460–4467 Mann PS, Singh S, Kumar A (2016) Computational intelligence based meta heuristic for energy-efficient routing in wireless sensor networks. In: Congress on evolutionary computation (CEC). IEEE, pp 4460–4467
4.
Zurück zum Zitat Singh SK, Singh MP (2010) Singh DK (2010) Routing protocols in wireless sensor networks—a survey. Int J Comput Sci Eng Surv 1(2):63–83CrossRef Singh SK, Singh MP (2010) Singh DK (2010) Routing protocols in wireless sensor networks—a survey. Int J Comput Sci Eng Surv 1(2):63–83CrossRef
5.
Zurück zum Zitat Tamandani Y, Bokhari M (2015) SEPFL routing protocol based on fuzzy logic control to extend the lifetime and throughput of the wireless sensor network. Wirel Netw, pp 1–5 Tamandani Y, Bokhari M (2015) SEPFL routing protocol based on fuzzy logic control to extend the lifetime and throughput of the wireless sensor network. Wirel Netw, pp 1–5
6.
Zurück zum Zitat A. Moh’d, H. Marzi, N. Aslam, et al (2011) A secure platform of wireless sensor networks. Elsevier, Amsterdam A. Moh’d, H. Marzi, N. Aslam, et al (2011) A secure platform of wireless sensor networks. Elsevier, Amsterdam
11.
Zurück zum Zitat Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422CrossRef Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422CrossRef
13.
Zurück zum Zitat Nishimura CE (1993) IUSS dual use: monitoring whales and earthquakes using SOSUS. Mar Technol Soc J 27(4):13–21 Nishimura CE (1993) IUSS dual use: monitoring whales and earthquakes using SOSUS. Mar Technol Soc J 27(4):13–21
14.
Zurück zum Zitat Chong CY, Kumar SP (2003) Sensor networks: evolution, opportunities, and challenges. Proc IEEE 91:1247–1256CrossRef Chong CY, Kumar SP (2003) Sensor networks: evolution, opportunities, and challenges. Proc IEEE 91:1247–1256CrossRef
15.
Zurück zum Zitat Gardner JW, Varadan VK, Awadelkarim OO (2003) Microsensors, MEMS, and smart devices. Wiley, New York Gardner JW, Varadan VK, Awadelkarim OO (2003) Microsensors, MEMS, and smart devices. Wiley, New York
19.
Zurück zum Zitat Soliman HH, Hikal NA, Sakr NA (2012) A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks. Egypt Inform J 13(3):225–238CrossRef Soliman HH, Hikal NA, Sakr NA (2012) A comparative performance evaluation of intrusion detection techniques for hierarchical wireless sensor networks. Egypt Inform J 13(3):225–238CrossRef
21.
24.
Zurück zum Zitat Chao CM, Hsiao TY (2009) Design of structure-free and energy-balanced data aggregation in wireless sensor networks. In: 11th IEEE international conference on high performance computing and communications, HPCC 2009, pp. 222–229. https://doi.org/10.1109/HPCC.2009.63. Chao CM, Hsiao TY (2009) Design of structure-free and energy-balanced data aggregation in wireless sensor networks. In: 11th IEEE international conference on high performance computing and communications, HPCC 2009, pp. 222–229. https://​doi.​org/​10.​1109/​HPCC.​2009.​63.
25.
Zurück zum Zitat Yeganeh MH, Yousefi H, Alinaghipour N, Movaghar A (2011) RDAG: a structure-free real-time data aggregation protocol for wireless sensor networks. In: Proceedings - 17th IEEE international conference on embedded and real-time computing systems and applications, RTCSA 2011, vol 1, pp 51–60. https://doi.org/10.1109/RTCSA.2011.70. Yeganeh MH, Yousefi H, Alinaghipour N, Movaghar A (2011) RDAG: a structure-free real-time data aggregation protocol for wireless sensor networks. In: Proceedings - 17th IEEE international conference on embedded and real-time computing systems and applications, RTCSA 2011, vol 1, pp 51–60. https://​doi.​org/​10.​1109/​RTCSA.​2011.​70.
28.
Zurück zum Zitat Pantazis NA (2023) A survey on power control issues in wireless sensor networks. IEEE Commun Surv Tutor 9(4):86–107MathSciNetCrossRef Pantazis NA (2023) A survey on power control issues in wireless sensor networks. IEEE Commun Surv Tutor 9(4):86–107MathSciNetCrossRef
41.
Zurück zum Zitat Cortés-Leal A, Del-Valle-soto C, Cardenas C, Valdivia LJ, Del Puerto-Flores JA (2022) Performance metric analysis for a jamming detection mechanism under collaborative and cooperative schemes in industrial wireless sensor networks. Sensors 22(1):178. https://doi.org/10.3390/s22010178CrossRef Cortés-Leal A, Del-Valle-soto C, Cardenas C, Valdivia LJ, Del Puerto-Flores JA (2022) Performance metric analysis for a jamming detection mechanism under collaborative and cooperative schemes in industrial wireless sensor networks. Sensors 22(1):178. https://​doi.​org/​10.​3390/​s22010178CrossRef
42.
43.
Zurück zum Zitat Xu W, Ma K, Trappe W, Zhang Y (2006) Jamming sensor networks: attack and defense strategies. IEEE Netw 20:41–47CrossRef Xu W, Ma K, Trappe W, Zhang Y (2006) Jamming sensor networks: attack and defense strategies. IEEE Netw 20:41–47CrossRef
44.
Zurück zum Zitat Jinisha JJ, Jerine S (2021) Survey on various attacks and intrusion detection mechanisms in wireless sensor networks. Turk J Comput Math Educ 12(11):3694–3704 Jinisha JJ, Jerine S (2021) Survey on various attacks and intrusion detection mechanisms in wireless sensor networks. Turk J Comput Math Educ 12(11):3694–3704
45.
Zurück zum Zitat Wood AD, Stankovic JA, Zhou G (2007) DEEJAM: defeating energy-efficient jamming in IEEE 802.15. 4-based wireless networks. In: 4th Annual IEEE communications society conference on sensor, mesh and Ad Hoc communications and networks. IEEE, pp 60–69 Wood AD, Stankovic JA, Zhou G (2007) DEEJAM: defeating energy-efficient jamming in IEEE 802.15. 4-based wireless networks. In: 4th Annual IEEE communications society conference on sensor, mesh and Ad Hoc communications and networks. IEEE, pp 60–69
47.
Zurück zum Zitat Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the international symposium on mobile Ad Hoc networking and computing (MobiHoc), pp 46–57. https://doi.org/10.1145/1062689.1062697 Xu W, Trappe W, Zhang Y, Wood T (2005) The feasibility of launching and detecting jamming attacks in wireless networks. In: Proceedings of the international symposium on mobile Ad Hoc networking and computing (MobiHoc), pp 46–57. https://​doi.​org/​10.​1145/​1062689.​1062697
50.
Zurück zum Zitat Pelechrinis K, Iliofotou M, Krishnamurthy SV (2010) Denial of service attacks in wireless networks: The case of jammers. IEEE Commun Surv Tutor 13(2):245–257CrossRef Pelechrinis K, Iliofotou M, Krishnamurthy SV (2010) Denial of service attacks in wireless networks: The case of jammers. IEEE Commun Surv Tutor 13(2):245–257CrossRef
51.
Zurück zum Zitat Cortés-Leal A, Del-Valle-Soto C, Cardenas C, Valdivia LJ, Del Puerto-Flores JA (2022) “Performance metric analysis for a jamming detection mechanism under collaborative and cooperative schemes in industrial wireless sensor networks. Sensors 22(1):178. https://doi.org/10.3390/s22010178CrossRef Cortés-Leal A, Del-Valle-Soto C, Cardenas C, Valdivia LJ, Del Puerto-Flores JA (2022) “Performance metric analysis for a jamming detection mechanism under collaborative and cooperative schemes in industrial wireless sensor networks. Sensors 22(1):178. https://​doi.​org/​10.​3390/​s22010178CrossRef
55.
Zurück zum Zitat Broustis I, Pelechrinis K, Syrivelis D, Krishnamurthy SV, Tassiulas L (2009) FIJI: Fighting implicit jamming in 802.11 WLANs. In: Lecture notes of the institute for computer sciences, social-informatics and telecommunications engineering, vol 19 LNICST, pp 21–40. https://doi.org/10.1007/978-3-642-05284-2_2 Broustis I, Pelechrinis K, Syrivelis D, Krishnamurthy SV, Tassiulas L (2009) FIJI: Fighting implicit jamming in 802.11 WLANs. In: Lecture notes of the institute for computer sciences, social-informatics and telecommunications engineering, vol 19 LNICST, pp 21–40. https://​doi.​org/​10.​1007/​978-3-642-05284-2_​2
57.
Zurück zum Zitat Bellardo J, Savage S (2003) 802.11 {Denial-of-Service} attacks: real vulnerabilities and practical solutions. In: 12th USENIX security symposium (USENIX Security 03) Bellardo J, Savage S (2003) 802.11 {Denial-of-Service} attacks: real vulnerabilities and practical solutions. In: 12th USENIX security symposium (USENIX Security 03)
58.
Zurück zum Zitat Tague P, Slater D, Poovendran R, Noubir G (2008) Linear programming models for jamming attacks on network traffic flows. In: 2008 6th international symposium on modeling and optimization in mobile, Ad Hoc, and wireless networks and workshops. IEEE, pp 207–216. https://doi.org/10.1109/WIOPT.2008.4586066 Tague P, Slater D, Poovendran R, Noubir G (2008) Linear programming models for jamming attacks on network traffic flows. In: 2008 6th international symposium on modeling and optimization in mobile, Ad Hoc, and wireless networks and workshops. IEEE, pp 207–216. https://​doi.​org/​10.​1109/​WIOPT.​2008.​4586066
59.
Zurück zum Zitat Li M, Koutsopoulos I, Poovendran R (2007) Optimal jamming attacks and network defense policies in wireless sensor networks. In: IEEE INFOCOM 2007-26th IEEE international conference on computer communications. IEEE, pp 1307–1315 Li M, Koutsopoulos I, Poovendran R (2007) Optimal jamming attacks and network defense policies in wireless sensor networks. In: IEEE INFOCOM 2007-26th IEEE international conference on computer communications. IEEE, pp 1307–1315
61.
Zurück zum Zitat Panyim K, Hayajneh T, Krishnamurthy P, Tipper D (2009) On limited-range strategic/random jamming attacks in wireless ad hoc networks. In: IEEE 34th conference on local computer networks. IEEE, pp 922–929 Panyim K, Hayajneh T, Krishnamurthy P, Tipper D (2009) On limited-range strategic/random jamming attacks in wireless ad hoc networks. In: IEEE 34th conference on local computer networks. IEEE, pp 922–929
63.
Zurück zum Zitat Huang H, Ahmed N, Karthik P (2011) On a new type of denial of service attack in wireless networks: the distributed jammer network. IEEE Trans Wirel Commun 10(7):2316–2324CrossRef Huang H, Ahmed N, Karthik P (2011) On a new type of denial of service attack in wireless networks: the distributed jammer network. IEEE Trans Wirel Commun 10(7):2316–2324CrossRef
67.
Zurück zum Zitat Liu Z, Liu H, Xu W, Chen Y (2011) Exploiting jamming-caused neighbor changes for jammer localization. IEEE Trans Parallel Distrib Syst 23(3):547–555CrossRef Liu Z, Liu H, Xu W, Chen Y (2011) Exploiting jamming-caused neighbor changes for jammer localization. IEEE Trans Parallel Distrib Syst 23(3):547–555CrossRef
69.
Zurück zum Zitat Jain SK, Garg K (2009) A hybrid model of defense techniques against base station jamming attack in wireless sensor networks. In: 2009 first international conference on computational intelligence, communication systems and networks Jain SK, Garg K (2009) A hybrid model of defense techniques against base station jamming attack in wireless sensor networks. In: 2009 first international conference on computational intelligence, communication systems and networks
71.
Zurück zum Zitat Misra S, Singh R, Rohith Mohan SV (2010) Information warfare-worthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system. Sensors 10:3444–3479CrossRef Misra S, Singh R, Rohith Mohan SV (2010) Information warfare-worthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system. Sensors 10:3444–3479CrossRef
73.
Zurück zum Zitat Khattab S, Mosse D, Melhem R (2008). Jamming mitigation in multi-radio wireless networks: reactive or proactive? In: Proceedings of the 4th international conference on Security and privacy in communication networks, pp 1–10 Khattab S, Mosse D, Melhem R (2008). Jamming mitigation in multi-radio wireless networks: reactive or proactive? In: Proceedings of the 4th international conference on Security and privacy in communication networks, pp 1–10
77.
Zurück zum Zitat Wang H, Zhang L, Li T, Tugnait J (2011) Spectrally efficient jamming mitigation based on code-controlled frequency hopping. IEEE Trans Wirel Commun 10:728–732CrossRef Wang H, Zhang L, Li T, Tugnait J (2011) Spectrally efficient jamming mitigation based on code-controlled frequency hopping. IEEE Trans Wirel Commun 10:728–732CrossRef
78.
Zurück zum Zitat Yoon SU, Murawski R, Ekici E, Park S, Mir ZH (2010) Adaptive channel hopping for interference robust wireless sensor networks. In: 2010 IEEE international conference on communications. IEEE, pp 1–5 Yoon SU, Murawski R, Ekici E, Park S, Mir ZH (2010) Adaptive channel hopping for interference robust wireless sensor networks. In: 2010 IEEE international conference on communications. IEEE, pp 1–5
79.
Zurück zum Zitat Pelechrinis K, Koufogiannakis C, Krishnamurthy SV (2009) Gaming the jammer: Is frequency hopping effective? In: 2009 7th international symposium on modeling and optimization in mobile, ad hoc, and wireless networks Pelechrinis K, Koufogiannakis C, Krishnamurthy SV (2009) Gaming the jammer: Is frequency hopping effective? In: 2009 7th international symposium on modeling and optimization in mobile, ad hoc, and wireless networks
83.
Zurück zum Zitat IEEE Staff (2017). In: 2007 international conference on computer, communications and electronics (Comptelix). IEEE IEEE Staff (2017). In: 2007 international conference on computer, communications and electronics (Comptelix). IEEE
84.
Zurück zum Zitat Ilavarasan S (2018) A survey on jamming attacks in wireless sensor networks. Int J Innov Eng Sci 3(7):1–10. Ilavarasan S (2018) A survey on jamming attacks in wireless sensor networks. Int J Innov Eng Sci 3(7):1–10.
Metadaten
Titel
A detailed review of wireless sensor network, jammer, the types, location, detection and countermeasures of jammers
verfasst von
Zainab Shaker Matar Al-Husseini
Hussain K. Chaiel
Amel Meddeb
Ahmed Fakhfakh
Publikationsdatum
24.04.2024
Verlag
Springer London
Erschienen in
Service Oriented Computing and Applications
Print ISSN: 1863-2386
Elektronische ISSN: 1863-2394
DOI
https://doi.org/10.1007/s11761-024-00396-w

Premium Partner