By Topic

Defending against energy efficient link layer jamming denial of service attack in wireless sensor networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Mahmood, A.R. ; Comput. & Syst. Eng. Dept., Alexandria Univ., Alexandria, Egypt ; Aly, H.H. ; El-Derini, M.N.

Wireless Sensor Networks (WSNs) are vulnerable to attacks due to their limited software and hardware capabilities. Energy efficient link layer jamming attacks have proven to be a real threat to wireless sensor networks. This type of attacks is able to prevent network communication for relatively long periods as it does not spend a lot of power while jamming. This paper proposes and evaluates two modifications to the Lightweight Medium Access Control (LMAC) [3] protocol. The first is Data Packet Separation Slot Size Randomization (DS-SSR); the second is Round Robin (RR) slot size assignment. The paper shows that (DS-SSR) can increase the WSN resistance against the Energy efficient denial of service link layer jamming attacks. The paper also shows that employing RR slightly eliminates the negative impact on the network throughput when using countermeasures against energy efficient jamming. Two measures are used to evaluate the resistance of the proposed protocol against the attack: lifetime advantage and censorship rate. Experimental results show that about 8% reduction of the attacker lifetime advantage can be achieved with DS-SSR LMAC compared to other countermeasure. Furthermore, results show that the censorship rate of our proposed protocol was similar to the other countermeasures.

Published in:

Computer Systems and Applications (AICCSA), 2011 9th IEEE/ACS International Conference on

Date of Conference:

27-30 Dec. 2011