Professional Documents
Culture Documents
2010
2010
2010
Abstract—Denial-of-Service (DoS) attacks are recognized as a The objective of the jammer is to find the cluster head, near
biggest threats due to the resources constrained proterty in to cluster head, and currupt transmissions of the cluster head
wireless sensor networks(WSN).Especially, using some mobile by causing packet collision. Because cluster head play an
nodes , we can attack the cluster heads in clustering netwrok, important role, it collects and fuses data from the legitimate
this jamming can cause a serious damage in perfomance of nods in cluster and tranform to the BS. An advantage of our
WSNs. Because the cluster head collect and fuse the data from attack is that the base station cann’t receive message form
all nodes in cluter, and forward to the base station. It is hard to the network almostly.
provide enough protection against this type of attack. We
conducted a simulation to investigate the impat of the mobile II. RELATED WORK
jamming in cluster WSNs. The simulation results demonstrate
that the mobile jamming we prosoed is more devastating than In order to cope with the threat of mobile jamming
traditional jamming attacks. attack, it is important to understand the charactristics of
clustering wireless sensor network. Whether wireless sensor
Keywords-wireless sensor networ,mobile jamming; cluster network adopt the distributed clustering protocol or the
centralized clustering protocol, LEACH 【 3 】 is the first one
I. INTRODUCTION WSN clustering routing protocols, which was designed by
Wireless sensor networks receive more and more Heinzelman. soon after, LEACH-C 【 4 】 、 EEUC[5] 、
attention because of their wide application in military as well EECS[6]、HEED[7] and other protocols are advanced. The
as in living life[1]. The most esentional applications are clustering sensor network have some characters. First,
monitor service systems, such as military monitor system or networking process is divided into two stages, cluster
security system[2]. Since the WSN are composed of formation and steady-state phase. Second, once the cluster
numerous economical but resource constrained sensor nodes, heads were elected, the cluster head nodes must let all the
securing sensor network is a challenging task. Many other nodes in the network know that who is on the role for
researchers had proposed several kinds of attacks to cause the current round. Adopting LEACH, each cluster head
concerns in security issue. The fundamental characteristic of node broadcasts an advertisement message using a
wireless networks that renders then vulnerable to attacks is nonersistent carrier-sense multiple access MAC protocl[].
the broadcast nature of their mudium. The Denial-of-Service
attacks, especially the energy efficient DoS attacks have This message is a small message containing the node’s ID.
most devastating influence among this attacks. The reason is Each non-cluster head node determines its cluster for this
that the sensor node has limited power resource and it will round by choosing the cluster head that requrirs the
fail to operate when energy exhausted. minimum communication energy, based on the received
The jamming attacks is quite simple. It can be excuted in signal strengh of the advertisement from each cluster head.
link layer or in physical layer. In link layer, the jamming Adopting LEACH-C, the cluster head nodes were chosen by
attack can disrupt the communication between sensor nodes base station based on its current location and energy level of
around the jammer. Beside, this attack is particularly each nodes. Once the cluster heads and associated clusters
effective since (1) no special hardware is needed; (2) it can are found, the RS broadcasts a message that contains the
be implemented by listening to the open mediun and cluster head ID for each node. Last , in steady-state phase,
breadcasting a simply frequency signal. Although the the leach and leach-c have the same steady-state protocol.
jammer are deployed randomly, the damage on the network The steady-state operation is broken into frames, where
is still makedly. Up to now, several measures have ben nodes send their data to the cluster head at most once per
proposed to defense against the jamming attacks[8]. frame during their allocated transmission slot. Once the
In this paper, we present a mobile jamming attack in cluster head receives all the data, it performs data
clustering wireless sensor network. Clustering network is an aggregation to enchance the common signal and reduce the
important framework, because it adopts an application-
uncorrelated noise among the siganls.
special protocol architecture. Here, we call a jammer whith
mobility as a mobile jammer, which is placed randomly.
V9-6
2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
AsshowninFigure5.
18000
mobile jamming
16000 normal jamming
14000
12000
数数数数数
10000
8000
6000
4000
2000
0
0 50 100 150 200 250 300
时时 (s)
Figure 3. Schematic diagram of the node distribution Figure 5. comparison the data of the BS.
0
0 50 100 150 200 250 300
时时( s)
V9-7
2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
networks and mobile algorithm, by improving the algorithm [4] Heinzelman W B, Chandrakasan A P, Balakrishnan H. An
to reduce energy comsumption and increase adaptability. application-specific protocol architecture for wireless microsensor
networks[J]. IEEE Transactions on Wireless Communications. 2002,
1(4): 660-670.
ACKNOWLEDGMENT
[5] Zeng J, Mu C, Jiang M. Game Theoretic Distributed Energy Control
This work is supported by the youth foudation of henan in Sensor Networks[C]. Computer and Information Technology, 2007:
polytechnic university No.210-2 1015-1019
[6] Ye M, Li C, Chen G, et al. EECS: An energy efficient clustering
scheme in wireless sensor networks 10a.2[C]24th IEEE International
REFERENCES Performance, Computing, and Communications Conference, IPCCC
2005, Apr 7-9 2005: 535-540.
[1] Akyildiz I F, Su W, Sankarasubramaniam Y, et al. Wireless sensor
networks: A survey[J]. Computer Networks. 2002, 38(4): 393-422.
[7] Younis O, Fahmy S. HEED: A hybrid, energy-efficient,
distributed clustering approach for ad hoc sensor networks[J]. IEEE
[2] Perrig A, Stankovic J, Wagner D. Security in wireless sensor Transactions on Mobile Computing. 2004, 3(4): 366-379
networks[J]. Communications of the ACM. 2004, 47(6): 53-57.
[8] Sun H M, Hsu S P, Chen C M. Mobile Jamming attack and its
[3] W. Heinzelman, A. Chandrakasan, H. Balakrishnan. Energy-efficient countermeasure in wireless sensor networks[C]. Niagara Falls,
Communication Protocol for Wireless Micro Sensor Networks[C]. ON, Canada: Institute of Electrical and Electronics Engineers
Proceedings of the 33rd Annual Hawaii International Conference on Computer Society, Piscataway, NJ 08855-1331, United States,
System Sciences, Maui, HI, 2000: 1-10. 2007.
[9] The Network Simulator. NS2 [EB/OL]. http://www.isi.edu/nsnam/ns/.
V9-8