International Journal of Engineering and Science Invention (IJESI)
Jammers in wsn
1. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 5, MAY 2012 793
A Trigger Identification Service for
Defending Reactive Jammers in WSN
Ying Xuan, Yilin Shen, Nam P. Nguyen, and My T. Thai, Member, IEEE
Abstract—During the last decade, Reactive Jamming Attack has emerged as a great security threat to wireless sensor networks, due
to its mass destruction to legitimate sensor communications and difficulty to be disclosed and defended. Considering the specific
characteristics of reactive jammer nodes, a new scheme to deactivate them by efficiently identifying all trigger nodes, whose
transmissions invoke the jammer nodes, has been proposed and developed. Such a trigger-identification procedure can work as an
application-layer service and benefit many existing reactive-jamming defending schemes. In this paper, on the one hand, we leverage
several optimization problems to provide a complete trigger-identification service framework for unreliable wireless sensor networks.
On the other hand, we provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its
robustness for various network scenarios. Theoretical analysis and simulation results are included to validate the performance of this
framework.
Index Terms—Reactive jamming, jamming detection, trigger identification, error-tolerant nonadaptive group testing, optimization,
NP-hardness.
Ç
1 INTRODUCTION
S INCE the last decade, the security of wireless sensor
networks (WSNs) has attracted numerous attentions,
due to its wide applications in various monitoring systems
On the other hand, various network diversities are
investigated to provide mitigation solutions [6]. Spreading
spectrum [12], [5], [8] making use of multiple frequency
and vulnerability toward sophisticated wireless attacks. bands and MAC channels, Multipath routing benefiting
Among these attacks, jamming attack where a jammer node from multiple pre-selected routing paths [6] are two good
disrupts the message delivery of its neighboring sensor examples of them. However, in this method, the capability
nodes with interference signals, has become a critical threat of jammers are assumed to be limited and powerless to
to WSNs. Thanks to the efforts of researchers toward this catch the legitimate traffic from the camouflage of these
issue, as summarized in [12], various efficient defense diversities. However, due to the silent behavior of reactive
strategies have been proposed and developed. However, a jammers, they have more powers to destruct these mitiga-
reactive variant of this attack, where jammer nodes stay tion methods. To this end, other solutions are in great need.
quite until an ongoing legitimate transmission (even has a A mapping service of jammed area has been presented in
single bit) is sensed over the channel, emerged recently and [11], which detects the jammed areas and suggests that
called for stronger defending system and more efficient routing paths evade these areas. This works for proactive
detection schemes. jamming, since all the jammed nodes are having low PDR
Existing countermeasures against Reactive Jamming and thus incapable for reliable message delay. However, in
attacks consist of jamming (signal) detection and jamming the case of reactive jamming, this is not always the case.
mitigation. On the one hand, detection of interference Only a proportion of these jammed nodes, named trigger
signals from jammer nodes is nontrivial due to the nodes, whose transmissions wake up the reactive jammers,
discrimination between normal noises and adversarial are blocked to avoid the jamming effects.
signals over unstable wireless channels. Numerous at- In this paper, we present an application-layer real-time
tempts to this end monitored critical communication related trigger-identification service for reactive-jamming in wire-
objects, such as Receiver Signal Strength (RSS), Carrier Sensing less sensor networks, which promptly provides the list of
Time (CST), Packet Delivery Ratio (PDR), compared the trigger-nodes using a lightweight decentralized algorithm,
results with specific thresholds, which were established without introducing neither new hardware devices, nor
from basic statistical methods and multimodal strategies significant message overhead at each sensor node.
[9], [12]. By such schemes, jamming signals could be This service exhibits great potentials to be developed as
discovered, but to locate the jammer nodes based on these reactive jamming defending schemes. As an example, by
signals is much more complicated and has not been settled. excluding the set of trigger nodes from the routing paths,
the reactive jammers will have to stay idle since transmis-
sions cannot be sensed. Even though the jammers move
. The authors are with the Department of Computer Information Science and around and detect new sensor signals, the list of trigger
Engineering, University of Florida, CSE Building, Gainesville, Florida nodes will be quickly updated, so are the routing tables. As
32611-6120. E-mail: {yxuan, yshen, nanguyen, mythai}@cise.ufl.edu.
another example, without prior knowledge of the number
Manuscript received 1 Mar. 2010; revised 9 Mar. 2011; accepted 18 Mar. of jammers, the radius of jamming signals and specific
2011; published online 6 Apr. 2011.
For information on obtaining reprints of this article, please send e-mail to:
jamming behavior types, it is quite hard to locate the
tmc@computer.org, and reference IEEECS Log Number TMC-2010-03-0103. reactive jammers even the jammed areas are detected (e.g.,
Digital Object Identifier no. 10.1109/TMC.2011.86. by Wood et al. [11]). However, with the trigger nodes
1536-1233/12/$31.00 ß 2012 IEEE Published by the IEEE CS, CASS, ComSoc, IES, & SPS
2. 794 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 5, MAY 2012
localized, we can narrow down the possible locations of (packet or bit) to disrupt the sensed signal (called jammer
reactive jammers. wake-up period), instead of the whole channel, which
Although the benefits of this trigger-identification means once the sensor transmission finishes, the jamming
service are exciting, its hardness is also obvious, which attacks will be stopped (called jammer sleep period). Three
dues to the efficiency requirements of identifying the set of concepts are introduced to complete this model.
trigger nodes out of a much large set of victim nodes, that Jamming range R. Similar to the sensors, the jammers are
are affected jamming signals from reactive jammers with equipped with omnidirectional antennas with uniform
possibly various sophisticated behaviors. To address these
power strength on each direction. The jammed area can be
problem, a novel randomized error-tolerant group testing
regarded as a circle centered at the jammer node, with a
scheme as well as minimum disk cover for polygons are
proposed and leveraged. radius R, where R is assumed greater than rs , for simulating
The basic idea of our solution is to first identify the set of a powerful and efficient jammer node. All the sensors within
victim nodes by investigating corresponding links’ PDR this range will be jammed during the jammer wake-up
and RSS, then these victim nodes are grouped into multiple period. The value of R can be approximated based on the
testing teams. Once the group testing schedule is made at the positions of the boundary sensors (whose neighbors are
base station and routed to all the victim nodes, they then jammed but themselves not), and then further refined.
locally conducts the test to identify each of them as a trigger Triggering range r. On sensing an ongoing transmission,
or nontrigger. The identification results can be stored locally the decision whether or not to launch a jamming signal
for reactive routing schemes or delivered to the base station depends on the power of the sensor signal Ps , the arrived
for jamming localization process. signal power at the jammer Pa with distance r from the
In the remainder of this paper, we first present the sensor, and the power of the background noise Pn .
problem definition in Section 2, where the network model, According to the traditional signal propagation model,
victim model, and attacker models are included. Then, we the jammer will regard the arrived signal as a sensor
introduce three kernel techniques for our scheme, Rando- transmission as long as the Signal-Noise-Ratio is higher than
mized Error-Tolerant Nonadaptive Group Testing, Clique-inde- some threshold, i.e., SNR ¼ Pn > where Pa ¼ Ps Á Y with
Pa
r
pendent Set (CIS), and Minimum Disk Cover in a Simple and called jamming decision threshold and path-loss factor,
Polygon in Section 3. The core of this paper: trigger-node ÁPn 1
Y as a log-normally random variable. Therefore, r ! ðPs ÁY Þ is
identification and its error-tolerant extension toward sophis- a range within which the sensor transmission will definitely
ticated jammer behaviors are presented, respectively, in trigger the jamming attack, named as triggering range. As will
Sections 4 and 5. A series of simulation results for evaluating
be shown later, this range r is bounded by R from above, and
the system performance and validating the theoretical
rs from below, where the distances from either bounds are
results are included in Section 6. We present related works
in Section 7 and summarize the paper in Section 8. decided by the jamming decision threshold . For simplicity,
we assume triggering range is the same for each sensor.
Jammer distance. Any two jammer nodes are assumed
2 PROBLEM MODELS AND NOTATIONS not to be too close to each other, i.e., the distance between
2.1 Network Model jammer J1 and J2 is ðJ1 ; J2 Þ R. The motivations behind
We consider a wireless sensor network consisting of this assumptions are three-fold: 1) the deployment of
n sensor nodes and one base station (larger networks with jammers should maximize the jammed areas with a limited
multiple base stations can be split into small ones to satisfy number of jammers, therefore large overlapping between
the model). Each sensor node is equipped with a globally jammed areas of different jammers lowers down the attack
synchronized time clock, omnidirectional antennas, efficiency; 2) ðJ1 ; J2 Þ should be greater than R, since the
m radios for in total k channels throughout the network, transmission signals from one jammer should not interfere
where k m. For simplicity, the power strength in each the signal reception at the other jammer. Otherwise, the
direction is assumed to be uniform, so the transmission latter jammer will not able to correctly detect any sensor
range of each sensor can be abstracted as a constant rs and transmission signals, since they are accompanied with high
the whole network as a unit disk graph (UDG) G ¼ ðV ; EÞ, RF noises, unless the jammer spends a lot of efforts in
where any node pair i; j is connected iff the euclidean denoising or embeds jammer-label in the jamming noise for
distance between i; j: ði; jÞ rs . We leave asymmetric the other jammers to recognize. Both ways are infeasible for
powers and polygonal transmission area for further study. an efficient attack; 3) the communications between jammers
are impractical, which will expose the jammers to anomaly
2.2 Attacker Model detections at the network authority.
We consider both a basic attacker model and several
advanced attacker models in this paper. Specifically, we 2.2.2 Advanced Attacker Model
provide a solution framework toward the basic attacker To evade detections, the attackers may alter their behaviors
model, and validate its performance toward multiple to evade the detection, for which two advanced reactive
advanced attacker models theoretically and experimentally. jamming models: probabilistic attack and asymmetric response
time delay are considered in this paper. In the first one, the
2.2.1 Basic Attacker Model jammer responds each sensed transmission with a prob-
Conventional reactive jammers [12] are defined as mal- ability independently. In the second one, the jammer
icious devices, which keep idle until they sense any ongoing delays each of its jamming signals with an independently
legitimate transmissions and then emit jamming signals randomized time interval.
3. XUAN ET AL.: A TRIGGER IDENTIFICATION SERVICE FOR DEFENDING REACTIVE JAMMERS IN WSN 795
Fig. 1. Sensor periodical status report message.
We do not specify the possible changes of jamming
range R as an advanced model, since the trigger set in this
case will not change, though the victim set varies. Further,
we do not theoretically analyze the effects of various
jamming decision threshold in this paper version, but we
evaluate all these above factors in the simulation section.
Jammer mobilities are out of the scope of this paper, which
assumes that the jammers are static during our trigger-
Fig. 2. Nodes in gray and blue are victim nodes around jammer nodes,
identification phase. This is quite reasonable, since the time where blue nodes are also trigger nodes, which invoke the jammer
length of this phase is short, as to be shown later. nodes. Nodes surrounding the jammed are boundary nodes, while the
others are unaffected nodes.
2.3 Sensor Model
Besides monitoring the assigned network field and generat- consider only proactive jammers, while reactive jammers
ing alarms in case of special events (e.g., fire, high can bring up larger damage due to efficient attack and
temperature), each sensor periodically sends a status report hardness to detect. To this end, we embed a group testing
message to the base station, which includes a header and a process, i.e., the randomized error-tolerant group testing by
main message body containing the monitored results, means of our designed random ðd; zÞ-disjunct matrix, to the
battery usage, and other related content. As shown in routing update scheme, which avoids unnecessarily large
Fig. 1, the header is designated for antijamming purpose, isolated areas as [11] does. Moreover, most existing
which is 4-tuple: Sensor_ID as the ID of the sensor node, topology-based solutions [23], [24] can only handle the
Time_Stamp as the sending out time indicating the single-jammer case, since lacking of knowledge over the
sequence number, as well as a Label referring to the node’s jamming range and inevitable overlapping of the jammed
current jamming status, and TTL as the time-to-live field areas bring ups the analytical difficulties, for which we
which is initialized as the 2D with network diameter D. resort to a minimum disk cover problem in a simple polygon
According to the jamming status, all the sensor nodes can problem and a clique-independent set problem.
be categorized into four classes: trigger nodes T N, victim
nodes V N, boundary nodes BN, and unaffected node UN. 3.1 Error-Tolerant Randomized Nonadaptive Group
Trigger nodes refer to the sensor nodes whose signals awake Testing
the jammers, i.e., within a distance less than r from a Group Testing was proposed since WWII to speed up the
jammer. Victim nodes are those within a distance R from an identification of affected blood samples from a large sample
activated jammer and disturbed by the jamming signals.
population. This scheme has been developed with a
Since R r, T N V N. Other than these disturbed sensors,
complete theoretical system and widely applied to medical
UN and BN are the unaffected sensors while the latter ones
testing and molecular biology during the past several
have at least one neighbor in V N, hence BN UN, and
V N UN ¼ ;. The Label field of each sensor indicates the decades [1]. Notice that the nature of our work is to
smallest class it belongs to. The relationships among these identify all triggers out of a large pool of victim nodes, so
classes are shown in Fig. 2. this technique intuitively matches our problem.
There are two issues orthogonal to our solution. On one The key idea of group testing is to test items in multiple
hand, the detection of jammed signals at each sensor node is designated groups, instead of individually. The principles
orthogonal to this work, and can be completed via of traditional group testing are sketched in the Appendix,
sophisticated reactive jamming detection techniques, such which can be found on the Computer Society Digital
as comparing the SNR, PDR, and RSS with predefined Library at http://doi.ieeecomputersociety.org/10.1109/
thresholds, as shown in [9]. With regard to the effects of TMC.2011.86.
detection errors on our solution, we provide some
theoretical analysis at the end of Section 5.1.1. On the other 3.1.1 Traditional Nonadaptive Group Testing
hand, the detailed attack schemes adopted by the reactive The key idea of group testing is to test items in multiple
jammers are orthogonal with our application-layer service. designated groups, instead of testing them one by one. The
As long as the jamming detection techniques that we resort traditional method of grouping items is based on a
to can efficiently detect these malicious signals, either high designated 0-1 matrix MtÂn where the matrix rows
RF noises, fraud message segments, etc., our solution represent the testing group and each column refers to an
service is feasible. item (Fig. 3). M½i; jŠ ¼ 1 if the jth item appears in the ith
testing group, and 0 otherwise. Therefore, the number of
rows of the matrix denotes the number of groups tested in
3 THREE KERNEL TECHNIQUES parallel and each entry of the result vector V refers to the
In this section, three kernel techniques for the proposed test outcome of the corresponding group (row), where 1
protocol are introduced. Most existing antijamming works denotes positive outcome and 0 denotes negative outcome.
4. 796 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 5, MAY 2012
We only show the performance of this new construction,
namely, ETG algorithm in this section. The details of the
construction and analysis are included in the Appendix,
available in the online supplemental material.
Theorem 3.1. The ETG algorithm produces a ðd; zÞ-disjunct
Fig. 3. Binary testing matrix M and testing outcome vector V . Assumed
that item 1 (first column) and item 2 (second column) are positive, then
matrix with probability p0 where p0 can be arbitrarily
only the first two groups return negative outcomes, because they do not approaching 1.
contain these two positive items. On the contrary, all the other four
groups return positive outcomes. . The worst-case number of rows of this matrix is
bounded by
Given that there are at most d n positive items among
2
in total n ones, all the d positive items can be efficiently and 3:78ðd þ 1Þ2 log n þ 3:78ðd þ 1Þ log
correctly identified on condition that the testing matrix M is 1 À p0
d-disjunct: any single column is not contained by the union À 3:78ðd þ 1Þ þ 5:44ðd þ 1Þðz À 1Þ;
of any other d columns. Owing to this property, each
much smaller than 4:28d2 log 1Àp0 þ 4:28d2 log n þ
2
negative item will appear in at least one row (group) where 2 2nÀ1
9:84dz þ 3:92z ln 1Àp0 .
all the positive items do not show up, therefore, by filtering
all the items appearing in groups with negative outcomes, all the . If z
t, the worst-case number of rows becomes
left ones are positive. Although providing such simple
ln nðd þ 1Þ2 À 2ðd þ 1Þ lnð1 À p0 Þ
decoding method, d-disjunct matrix is nontrivial to con- t¼
struct [1], [2] which may involve with complicated ð À
ðd þ 1ÞÞ2
computations with high overhead, e.g., calculation of where ¼ ðd=ðd þ 1ÞÞd and asymptotically t ¼
irreducible polynomials on Galois Field. In order to Oðd2 log nÞ.
alleviate this testing overhead, we advanced the determi-
nistic d-disjunct matrix used in [7] to randomized error- Proof. See Section B in the Appendix, available in the online
tolerant d-disjunct matrix, i.e., a matrix with less rows but supplemental material. u
t
remains d-disjunct w.h.p. Moreover, by introducing this Theorem 3.2. The ETG algorithm has smaller time complexity
pffiffiffi
matrix, our identification is able to handle test errors under Oðd2 n log nÞ than Oðn2 log nÞ, when d n.
sophisticated jamming environments.
In order to handle errors in the testing outcomes, the 3.2 Minimum Disk Cover in a Simple Polygon
error-tolerant nonadaptive group testing has been developed Given a simple polygon with a set of vertices inside, the
using ðd; zÞ-disjunct matrix, where in any d þ 1 columns, problem of finding a minimum number of variable-radii
each column has a 1 in at least z rows where all the other d disks that not only cover all the given vertices, but also are
columns are 0. Therefore, a ðd; 1Þ-disjunct matrix is exactly all within the polygon, can be efficiently solved.
d-disjunct. Straightforwardly, the d positive items can still The latest results due to the near linear algorithm
be correctly identified, in the presence of at most z À 1 test proposed recently by Kaplan et al. [25], which investigates
errors. In the literature, numerous deterministic designs for the medial axis and voronoi diagram of the given polygon,
ðd; zÞ-disjunct matrix have been provided (summarized in and provides the optimal solution using Oð$ þ ðlog $ þ
[1]), however, these constructions often suffer from high- log6 ÞÞ time and Oð$ þ log log Þ space, where the number
computational complexity, thus are not efficient for of edges of the polygon is $ and nodes within it as . We
practical use and distributed implementation. On the other employ this algorithm to estimate the jamming range R.
hand, to our best knowledge, the only randomized
construction for ðd; zÞ-disjunct matrix dues to Cheng’s work 3.3 Clique-Independent Set
via q-nary matrix [19], which results in a ðd; zÞ-disjunct Cliques-Independent Set is the problem to find a set of
matrix of size t1 Â n with probability p0 , where t1 is maximum number of pairwise vertex-disjoint maximal
cliques, which is referred to as a maximum clique-independent
2 2n À 1 set (MCIS) [4]. Since this problem serves as the abstracted
4:28d2 log þ 4:28d2 log n þ 9:84dz þ 3:92z2 ln ;
1 À p0 1 À p0 model of the grouping phase of our identification, its hardness
with time complexity Oðn2 log nÞ. Compared with this work, is of great interest in this scope. To our best knowledge, it has
we advance a classic randomized construction for d- already been proved to be NP-hard for cocomparability,
disjunct matrix, namely, random incidence construction planar, line, and total graphs; however, its hardness on UDG
[1], [2], to generate ðd; zÞ-disjunct matrix which can not only is still open. We propose its NP-complete proof in the
generate comparably smaller t  n matrix, but also handle Appendix, available in the online supplemental material.
the case where z is not known beforehand, instead, only the There have been numerous polynomial exact algorithms
error probability of each test is bounded by some constant for solving this problem on graphs with specific topology,
. Although z can be quite loosely upper bounded by
t, yet e.g., Helly circular-arc graph and strongly chordal graph
t is not an input. The motivation of this construction lies in [4], but none of these algorithms gives the solution on UDG.
the real test scenarios, the error probability of each test is In this paper, we employ the scanning disk approach in [3] to
unknown and asymmetric, hence it is impossible to find all maximal cliques on UDG, and then find all the
evaluate z before knowing the number of pools. MCIS using a greedy algorithm.
5. XUAN ET AL.: A TRIGGER IDENTIFICATION SERVICE FOR DEFENDING REACTIVE JAMMERS IN WSN 797
4 TRIGGER-NODE IDENTIFICATION
We propose a decentralized trigger-identification proce-
dure. It is lightweight in that all the calculations occur at the
base station, and the transmission overhead as well as the
time complexity is low and theoretically guaranteed. No
extra hardware is introduced into the scheme, except for the
simple status report messages sent by each sensor, and the
geographic locations of all sensors maintained at the base
station. Three main steps of this procedure are as follows: Fig. 4. Estimated R and jammed area.
1. Anomaly Detection—the base station detects potential
4.2 Jammer Property Estimation
reactive jamming attacks, each boundary node tries
to report their identities to the base station. We estimate the jamming range as R and the jammed areas
2. Jammer Property Estimation—The base station calcu- as simple polygons, based on the locations of the boundary
lates the estimated jammed area and jamming range and victim nodes.
R based on the locations of boundary nodes. For sparse-jammer where the distribution of jammers is
3. Trigger Detection relatively sparse and there is at least one jammer whose
jammed area does not overlap with the others, like J2 in Fig. 2.
a. the base station makes a short encrypted testing By denoting the set of boundary nodes for the ith jammed area
schedule message Z which will be broadcasted as BNi , we can estimate the coordinate of this jammer as
to all the boundary nodes. PBNi PBNi !
b. boundary nodes keep broadcasting Z to all the k¼1 Xk Yk
ðXJ ; YJ Þ ¼ ; k¼1 ;
victim nodes within the estimated jammed area jBNi j jBNk j
for a period Q.
c. all the victim nodes locally execute the testing where ðXk ; Yk Þ is the coordinate of a node k is the jammed
procedure based on Z, identify themselves as area BNi and the jamming range R is
triggers or nontriggers. qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
R ¼ min max ðXk À XJ Þ2 þ ðYk À XJ Þ2 ;
4.1 Anomaly Detection 8BNi k2BNi
Each sensor periodically sends a status report message to
for we assume that all the jammers have the same range.
the base station. However, once the jammers are activated For dense-jammer, shown in Fig. 4, we first estimate the
by message transmissions, the base station will not receive jammed areas, which are simple polygons (unnecessarily
these reports from some sensors. By comparing the ratio of convex) containing all the boundary and victim nodes. This
received reports to a predefined threshold , the base process consists of three steps: 1) discovery of convex hulls of
station can thus decide if a jamming attack is happening in the boundary and victim nodes, where no unaffected nodes
the networks. When generating the status report message, are included in the generate convex polygons. 2) for each
each sensor can locally obtain its jamming status and decide boundary node v not on the hull, choose two nodes on the
the value of the Label field (Initially trigger “TN”). In detail, hull and connect v to them in such a way that the internal
if a node v hears jamming signals, it will not try to send out angle at this reflex vertex is the smallest, hence the polygon
messages but keep its label as victim. If v cannot sense is modified by replacing an edge (dotted one in Fig. 4) by
jamming signals, its report will be routed to the base station the two new ones. The resulted polygon is the estimated
as usual, however, if it does not receive ACK from its jammed area. 3) execute the near-linear algorithm [25] to
neighbor on the next hop of the route within a time out find the optimal variable-radii disk cover of all the victim
period, it tries for two more retransmissions. If no ACKs are nodes, but constrained in the polygon, and return the
received, it is quite possible that that neighbor is a victim largest disk radius as R.
node, then v updates Label tuple as boundary “BN” in its
status report. Another outgoing link from v with the most 4.3 Trigger Detection
available capacity is taken to forward this message. If the Since the jammer behavior is reactive, in order to find all the
status report is successfully delivered to the base station trigger nodes, a straightforward way is that let each sensor
with Label ¼ TN, the corresponding node is regarded as broadcast one by one, and listen to possible jamming
unaffected. All the messages are queued in the buffer of the signals. However, this individual detection is quite time
intermediate nodes and forwarded in an FCFS manner. The consuming and all the victim nodes thus have to be isolated
TTL value is reduced by 1 per hop for each message, and for a long detection period, or even returns wrong detection
any message will be dropped once its TTL ¼ 0. result in the presence of mobile jammers. In this case, the
The base station waits for the status report from each network throughput would be dramatically decreased.
node in each period of length P. If no reports have been Therefore, to promptly and accurately find out these
received from a node v with a maximum delay time, then v triggers from a large pool of victim nodes, emerges as the
will be regarded as victim. The maximum delay time is most challenging part of the proposed protocol, for which
related to graph diameter and will be specified later. If the the idea of group testing is applied.
aggregate report amount is less than , the base station In this section, we only consider a basic attack model
starts to create the testing schedule for the trigger nodes, where the jammers deterministically and immediately broad-
based on which the routing tables will be updated locally. casts jamming signals once it senses the sensor signal.
6. 798 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 5, MAY 2012
TABLE 1
Message Containing Trigger
Detection Schedule
Fig. 5. Interference teams.
Second-level, within each testing team, victims are
further divided into multiple testing groups. This is
completed by constructing a randomized ðd; 1Þ-disjunct
matrix, as mentioned in Section 3.1, mapping each sensor
Therefore, as long as at least one of the broadcasting victim node to a matrix column, and make each matrix row as a
nodes is a trigger, some jamming signals will be sensed, and testing group (sensors corresponding to the columns with 1s
vice versa. The performance of this protocol toward in this row are chosen). Apparently, tests within one group
sophisticated attacker models with probabilistic attack will possibly interfere that of another, so each group will be
strategies will be validated in the next section. assigned with a different frequency channel.
All the following is the encrypted testing schedule over
The duration of the overall testing process is t time slots,
all the victim nodes, which is designed at the base station
where the length of each slot is L. Both t and L are
based on the set of boundary nodes and the global topology,
predefined, yet the former depends on the total number of
stored as a message (illustrated in Table 1) and broadcasted
to all the boundary nodes. The broadcasting of the testing victims and estimated number of trigger nodes, and the
scheduling message adopts a routing mechanism similar to latter depends on the transmission rate of the channel.
reverse path forwarding. In detail, all the status report Specifically, at the beginning of each time slot, all the sensors
messages relayed to the base station will record all the designated to test in this slot broadcast a -bit test packet on
nodes’ IDs on their routing paths. Therefore, without the assigned channel to their 1-hop neighbors. Till the end
considering mobile jammers, those routing paths can be of this slot, these sensors keep detecting possible jamming
reused to send out these testing scheduling messages and signals. Each sensors will label itself as a trigger unless in at
evade the jammed areas. least one slot of its testing, no jamming signal is sensed.
After receiving this message, each boundary node broad- The correctness of this trigger identification procedure is
casts this message one time using simple flooding method to theoretically straightforward. Given that all the testing
its nearby jammed area. All the victim nodes execute the teams are interference free, then the testing with different
testing schedule and indicate themselves as nontriggers or teams can be executed simultaneously. Given that we have
triggers. Since all the sensor nodes are equipped with a an upper bound d on the number of trigger nodes and each
global uniform clock, and no message transmissions to the testing group follow the ðd; 1Þ-disjunct matrix, which
base station are required during the detection, the mechan- guarantees that each nontrigger node will be included in
ism is easy to implement and practical for applications. at least one group, which does not contain any trigger node,
As shown in Table 1, for each time slot, m sets of victim so each nontrigger node will not hear jamming signals in at
sensors will be tested. The selection of these sets involves a least one time slot, but the trigger nodes will since the
two-level grouping procedure. jammers are activated once they broadcast the test packets.
First-level, the whole set of victims are divided into Therefore, two critical issues need to be addressed to ensure
several interference-free testing teams. Here, by interference this correctness: how to partition the victim set into
free we mean that if the transmissions from the victim maximal interference-free testing teams and estimate the
nodes in one testing team invokes a jammer node, its number of trigger nodes d, as follows: Though these two
jamming area will not reach the victim nodes in another involve geometric analysis over the global topology, since it only
testing team. Therefore, by trying broadcasting from victim takes the information of boundary and victim nodes as inputs, and
nodes in each testing team and monitoring the jamming is calculated at the base station, no message complexity is
signals, we can conclude if any members in this team are
introduced.
triggers. In addition, all the tests in different testing teams
can be executed simultaneously since they will not interfere 4.3.1 Discovery of Interference-Free Testing Teams
each other. Fig. 5 provides an example for this. Three
As stated above, two disjoint sets of victim nodes are
maximal cliques C1 ¼ fv1 ; v2 ; v3 ; v4 g, C2 ¼ fv3 ; v4 ; v5 ; v6 g,
C3 ¼ fv5 ; v7 ; v8 ; v9 g can be found within three jammed areas. interference-free testing teams iff the transmission within one
Imagine these three cliques are, respectively, the three set will not invoke a jammer node, whose jamming signals
teams we test at the same time. If v4 in the middle team will interfere the communications within the other set.
keeps broadcasting all the time and J2 is awaken frequently, Although we have estimated the jamming range R, it is still
no matter the trigger v2 in the leftmost team is broadcasting quite challenging to find these interference-free teams
or not, v3 will always hear the jamming signals, so these two without knowing the accurate locations of the jammers.
teams interfere each other. In addition, node-disjoint groups Notice that it is possible to discover the set of victim nodes
do not necessarily interference free, as the leftmost and within the same jammed area, i.e., with a distance R from
rightmost teams show. the same jammer node. Any two nodes within the same
7. XUAN ET AL.: A TRIGGER IDENTIFICATION SERVICE FOR DEFENDING REACTIVE JAMMERS IN WSN 799
Fig. 6. Clique C1 ¼ V1 V2 V3 V4 is chosen by CIS, but its concentric circle
CC 0 covers boundary node V0 , then clique C2 ¼ V4 V5 V6 V7 replaces C1 in
Fig. 7. Maximum # interfering cliques.
the testing team for the first round. Clique V1 V2 V3 are left for the next
round.
by and from C1 is r R distance away, whose jamming
jammed area should be at most 2R far from each other, i.e., range can only reach another R distance further, which is
if we induce a new graph G0 ¼ ðV 0 ; E 0 Þ with all these victim thus away from C2 . Therefore, the cliques in the obtained
nodes as the vertex set V 0 and E 0 ¼ fðu; vÞjðu; vÞ 2Rg, the CIS of this kind are selected as testing teams. While the
nodes jammed by the same jammer should form a clique. others are left for the next time slot.
The maximum number of vertex-disjoint maximal cliques In addition, in the worst case, any single maximal clique
(i.e., clique-independent set) of this kind provides an upper C has at most 12 interfering cliques in the CIS, as the
bound of possible jammers within the estimated jammed shadowed ones in Fig. 7. Therefore, at most 13 testing teams
area, where each maximal clique is likely to correspond to are required to cover all these cliques. If the number of
the nodes jammed by the same jammer. channels k given is larger than 13, then a frequency-division
The solution consists of three steps: CIS discovery on the is available, i.e., these interfering cliques can still become
induced graph from the remaining victim without test simultaneous testing teams, on the condition each team can
k
schedules, boundary-based local refinement and interfer- only use minfd13e; mg of the given channels, where m is the
ence-free team detection. We iterate three steps to decide number of radios per sensor. Otherwise, we have to use time
the schedule for every victim node. divisions, i.e., they have to be tested in different time slots.
CIS discovery. We first employ Gupta’s MCE algorithm
4.3.2 Estimation of Trigger Upper Bound
[3] to find all the maximal cliques, then use a greedy
algorithm, as shown in Algorithm 1 to get the CIS. Before bounding the trigger quantity from above, the
triggering range r should be estimated. As mentioned in
Algorithm 1. CIS discovery. the attacker model, r depends not only on the power of both
sensors and jammers, but also the jamming threshold and
path-loss factor
1
Pn Á
r! ;
Ps Á Y
since the real time Pn and Ps are not given, we estimate r
based on the SNR cutoff 0 of the network setting. In fact,
the transmission range of each sensor rs is a maximum
radius to guarantee
Local refinement. Each clique we select is expected to Pa Ps Á Y
SNR ¼ ¼ ! 0 :
represent the jammed area poisoned by the same jammer, P n Pn Á rs
and this area should not cover the boundary nodes.
Therefore, we can estimate r as
However, we did not take this into account when discover-
ing the CIS, and need to locally update it. Specially, for each 1
clique, we find its circumscribed circle CC and the r % rs 0 ;
concentric circle CC 0 with radius R of CC. In the case that
CC 0 covers any boundary nodes, we locally select another where 0 and are parts of the network input, while is
clique by adding/removing nodes from this clique, to see if assumed as a constant, which indicates the aggressiveness
the problem can be solve. If not, we keep this clique as it is, of the jammer. For this estimation, can be first set as 10 db,
otherwise, we update it. This is illustrated in Fig. 6. which is the normally lower bound of SNR in wireless
Team detection. The cliques in CIS can also interfere transmission, and then adaptively adjusted to polish the
each other, e.g., the clique V1 V2 V3 V4 and V5 V7 V8 V9 in Fig. 5. service quality.
This is because the signals from V4 will wake J2 , who will With estimated r, since all the trigger nodes in the same
try to block these signals with noises and affect V5 by the team should be within a 2r distance from each other, by
way. But if any two cliques C1 and C2 are not connected by finding another induced graph G00 ¼ ðWi ; E 00 Þ from the victim
any single edge, then they are straightforwardly inter- nodes Wi in team i, with E 00 ¼ fðu; vÞ 2 E 00 if ðu; vÞ 2rg,
ference free, since the shortest distance between any node in the size of the maximal clique indicates the upper bound of
C1 and C2 is larger than 2R. But the farthest jammer waken the trigger nodes, thus can be an estimate over d.
8. 800 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 5, MAY 2012
The testing delay Tt depends on the number of testing
rounds and the length of each round. Since the reactive
jamming signal disappears as soon as these sensed 1-hop
transmission finishes, each round length is then Oð1Þ. The
number of testing rounds is however complicated and
bounded by Theorem 4.1.
Lemma 4.1. Based on the ETG algorithm, the number of tests to
identify d trigger nodes from jW j victim nodes is upper
bounded by tðjW j; dÞ ¼ Oðd2 dln jW jeÞ w.h.p.
i
Fig. 8. Maximum # jammers invoked by one team.
Theorem 4.1 (Main). The total number of testing rounds is
As mentioned above, all the parallel testing teams selected upper bounded by
are interference free; therefore, we roughly regard each team
to be the jammed area of one jammer. As a deeper Q 13 minfd2 dln jWi je; jWi jg
i
O max ;
investigation, the number of jammers that can be invoked i¼1 m
by the nodes in the same team (six 3-clique within the red P
w.h.p, with di ¼ minf 6 jcs ðGi Þj; jWi jg and cs ðGi Þ is the
s¼1
circles) can be up to 6, since the minimum distance between sth largest clique over an induced unit disk subgraph Gi ¼
two jammers is greater than R and r R, as shown in Fig. 8.
ðWi ; Ei ; 2rÞ in the testing team i.
Therefore on the induced graph, the largest 6 cliques form the d2 dln jW je
possible trigger set. However, since the jammer distribution Proof. First, from Lemma 4.1, at most tðjW j;dÞ ¼ i m
m
cannot be that dense for the sake of energy conserving, the testing rounds are needed to identify all nodes in testing
former estimate over d is large enough. team i. Second, the set of testing teams that can be tested in
parallel is 13, as mentioned earlier. Combining with the
4.4 Analysis of Time and Message Complexity
worst case upper bound of triggers in each team, the
Time complexity. By time complexity we mean the
upper bound on round is derived. t
u
identification delay counted since the attack happens till
all the nodes successfully identify themselves as trigger or
nontrigger. Therefore, the complexity break downs into If the jamming range R is assumed known beforehand,
four parts: similar to [7], the whole time complexity is thus
1. the detection of jamming signals at local links Td ; Q 13d2 dln jWi je; jWi j
i
O max ;
2. the routing of sensor report to the base station from i¼1 m
each sensor node, and the testing schedule to each
and asymptotically bounded by Oðn2 log nÞ. It is asympto-
victim node from the base station, aggregated as Tr ;
3. the calculation of CIS and R at the base station Tc ; tically smaller than that of [7]
4. the testing at each jammed area Tt . ÁðHÞ
’!
X d2 log2 jWj j
j 2
The local jamming signal detection involves the statis- O max ð2 þ oð1ÞÞ 2 ; m ;
tical properties of PDR, RSS, and SNR, which is orthogonal i¼1
j log2 ðdj log2 jWj jÞ
to our work. We regard Td as Oð1Þ since it is an entirely local
where ÁðHÞ refers to the maximum degree of the induced
operation and independent with the network scale.
The routing time overhead is quite complicated, since graph H (in this new solution, maximum degree is not
congestions need to be considered. For simplicity, we involved). By taking the calculation overhead for R into
consider that all the 1-hop transmission takes Oð1Þ time account, the overall time complexity is asymptotically
and bound Tr using the diameter D of the graph. As Oðn2 log n þ n log6 nÞ, which is Oðn log6 nÞ for n ! 4.
mentioned earlier, the base station waits at most Oð2DÞ for Message complexity. On the one hand, the broadcasting
the reports, so that is the upper bound of the one-way of testing schedule Z from the base station to all the victim
routing. As to the other way, we also bound it using Oð2DÞ nodes costs OðnÞ messages in the worst case. On the other
to match any collision and retransmission cases. hand, the overhead of routing reports toward the base
The calculation of CIS resorts to the algorithm in [3], which station depends on the routing scheme used and the
finds OðlÁÞ maximal cliques on UDG within OðlÁ2 Þ time, network topology as well as capacity. The upper bound is
where l ¼ jEj and Á refers to the maximum degree. We used straightforward obtained in a line graph with the base
a greedy algorithm to find a MCIS from these OðlÁÞ cliques
station at one end, whose message complexity is OðnðnÀ1ÞÞ.
with Oðl3 Á3 QÞ time: OðlÁÞ-time for each clique to check 2
With regard to the message overhead of the testing
the overlapping with other cliques, OðlÁÞ-time to find a
process. Considering that there are approximately jWi j victim
clique overlapping with minimum other cliques, and Q dþ1
denotes the number of testing teams. Notice that in practice, nodes in each testing group of team Wi (mentioned in the
sensor networks are not quite dense, so the number of edges l construction of randomized ðd; zÞ-disjunct matrix in Appen-
and maximum degree Á are actually limited to small values. dix, available in the online supplemental material), the
On the other hand, the time complexity of estimating R is up overhead of each testing group in a testing round is jWi j 1-hop
dþ1
to OðnÁ þ nðlog nÁ þ log6 nÞ using the minimum disk cover
2 2
testing message broadcasted by all victim nodes in each group
algorithm as mentioned. of team Wi . Therefore, the overhead message complexity is
9. XUAN ET AL.: A TRIGGER IDENTIFICATION SERVICE FOR DEFENDING REACTIVE JAMMERS IN WSN 801
d x
TABLE 2 Pr½uðiÞ ¼ xŠ ¼ p ð1 À pÞdÀx : ð1Þ
x
Notations
For each test i, the event that it contains at least one trigger
but returns a negative result, has a probability at most
Pr½gðiÞ ¼ 0 uðiÞ ! 1Š ð2Þ
Xd
d x
¼ ð1 À Þx p ð1 À pÞdÀx ð3Þ
! x¼1
x
X
Q
Q
O n2 þ jWi j maxfdi dln jWi je; jWi jgm ;
i¼1
i¼1
¼ ½ð1 À Þp þ 1 À pŠd À ð1 À pÞd ð4Þ
which is Oðn2 log nÞ.
¼ ð1 À pÞd À ð1 À pÞd ð1 À Þp: ð5Þ
5 ADVANCED SOLUTIONS TOWARD SOPHISTICATED Meanwhile, the event that it contains no trigger nodes but
ATTACK MODELS returns a positive result, has a probability
In this section, we consider two sophisticated attacker Pr½gðiÞ ¼ 1 uðiÞ ¼ 0Š ¼ 0: ð6Þ
models: probabilistic attack and variant response time delay,
Since in practical ! 1 , we therefore have the expected
where the jammers rely each sensed transmission with 2
number of false positive and negative tests is, respectively,
different probabilities, instead of deterministically, or delay
at most pt=2 and 0.
the jamming signals with a random time interval, instead Instead of the jamming behavior, the jamming signal
of immediately. This may mismatch with the original detection errors can be analyzed using the same method.
definition of reactive jamming, which targets at transmis- Given that each node detects possible jamming signals
sion signals, instead of nodes or channels. However, clever successfully with probability q, then following (1), we can
jammers can possibly change their strategies to evade similarly have the false negative rate of each test i
possible sensed detections. Also, a common sense indicates
that as long as an activity is sensed by the jammer, it is Pr½gðiÞ ¼ 0 uðiÞ ! 1Š ð7Þ
quite possible that some other activities are following this.
So delaying the response time still guarantees the attack X
d
d x
efficiency, but minimize the risk of being caught by ¼ ð1 À qÞx p ð1 À pÞdÀx ð8Þ
x¼1
x
reactive detections.
Since our scheme is robust and accurate in the steps of
grouping, generating disjunct matrix and decoding the ¼ ½ð1 À qÞp þ 1 À pŠd À ð1 À pÞd ð9Þ
testing results, the only possible test errors arise from the
generation of testing outcomes. Nevertheless, by using ¼ ð1 À qpÞd À ð1 À pÞd ð1 À qÞp; ð10Þ
the error-tolerant disjunct matrix and relaxing the identifi-
1
cation procedures to asynchronous manner, our scheme which is also small considering p ¼ dþ1 .
will provide small false rates in these cases. Some notations
5.1.2 Variant Reaction Time
can be found in Table 2. In this section, the terms test and
group, the terms column and nodes are interchangeable. The introduction of group testing techniques aims to
decrease the identification latency to the minimum, there-
5.1 Upper Bound on the Expected Value of z fore, if the jammer would not respond intermediately after
First, we investigate the properties of both jamming sensing the ongoing transmissions, but instead wait for a
behaviors and obtain the expected number of error tests randomized time delay, the test outcomes would be messed
up. Since it is expensive to synchronize the tests among
in both cases through the following analysis. Since in
sensors, we use a predefined testing length as L, thus the
practice, it is not trivial to establish accurate jamming
test outcome of test i 2 ½1; tŠ is generated within time
models, we derive an upper bound of the error probability i i
interval ½ðdme À 1ÞL; dmeLŠ. There are two possible error
which does not require the beforehand knowledge of the events regarding any test i.
objective jamming models, which is therefore feasible for
real-time identifications. Since it is a relaxed bound, it could . F pðiÞ: test i is negative, but some jamming signals
be further strengthened via learning the jamming history. are delayed from previous tests and interfere this
test, where we have a false positive event;
5.1.1 Probabilistic Jamming Response (Detection) . F nðiÞ: test i is positive, but the jammer activated in
A clever jammer can choose not to respond to some sensed this test delayed its jamming signals to some
ongoing transmissions, in order to evade the detection. subsequent tests, meanwhile, no delayed jamming
Assume that each ongoing transmission has an independent signals from previous tests exists, where we have a
probability to be responded. In our construction algorithm false negative event.
ETG, where each matrix entry is IID and has a probability p Since the jammers in this paper are assumed to block
to be 1, therefore for any single test i with i 2 ½1; tŠ communications only on the channels where transmissions
10. 802 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 5, MAY 2012
p
are sensed, for the following analysis, we claim that the
¼ þ 2ð1 À ð1 À pÞd Þð1 À pÞd
2
interferences can only happen between any two tests i; j
þ ð1 À ð1 À pÞd Þð1 À 2ð1 À ð1 À pÞd ÞÞ
with i jðmod mÞ. Denote the delay of jamming signals as
a random variable X ¼ fxð1Þ; xð2Þ; xð3Þ; . . . xðtÞg where xðiÞ ¼ ð10 À 8 2 À Àd À 1Þ=2;
is the delay for possible jamming signals arisen from test i. where ¼ ðd=ðd þ 1ÞÞd . Intuitively, we can have an upper
1) For event F pðiÞ, consider the test i À m, in order to have bound on the number of error tests as z ¼
t ¼
its jamming signals delayed to test i, we have a bound on ð10 À 8 2 À Àd À 1Þ=2, and take it as an input to construct
xði À mÞ 2 ð0; 2LÞ. Similarly, in order to have the signals of the ðd; zÞ-disjunct matrix. However, notice that z depends
any test j delayed to i, we have xðjÞ 2 ½ðiÀj À 1ÞL; ðiÀj þ 1ÞLŠ.
m m
on t, i.e., the number of rows of the constructed matrix, we
Further the probability density function of X is PðiÞ ¼ therefore derive another bound of t related to
, as shown
Pr½X ¼ xðiÞŠ. Consider all the tests prior to i, which are in the Appendix, available in the online supplemental
i mod m; 1 þ i mod m; . . . ; i À m, we have the probability material.
for F pðiÞ 5.2 Error-Tolerant Asynchronous Testing within
Z ðiÀjþ1ÞL
Each Testing Team
X
iÀm m
ð1 À pÞd PðwÞdwð1 À ð1 À pÞd Þ: ð11Þ By applying the derived worst cast number of error tests
j¼i mod m ðiÀjÀ1ÞL
m into the ETG construction, we can obtain the following
algorithm where tests are conducted in an asynchronous
To simplify this expression, we assume that X=L follows a
manner to enhance the efficiency.
uniform distribution within the range ½0;
12. ,
As shown in Algorithm 2, after all the groups are
which is reasonable and efficient for attackers in practice. decided, conduct group testing on them in m pipelines,
Since the nature of jamming attacks lies in adapting the where in each pipeline any detected jamming signals will
attack frequency due to the sensed transmissions, too large end the current test and trigger the next tests while groups
delay does not make sense to tackle the ongoing transmis- receiving no jamming signals will be required to resend
sions. Under a uniform distribution, the probability of F pðiÞ triggering messages and wait till the predefined round time
becomes has passed. These changes over the original algorithm,
especially the asynchronous testing are located in each
2X
iÀm
ð1 À ð1 À pÞd Þð1 À pÞd testing team, thus will not introduce significant overheads,
j¼max i mod m;iÀmÀ
17. X
t
2 ð1 À ð1 À pÞd Þð1 À pÞd
i¼1
2ð1 À ð1 À pÞd Þð1 À pÞd t:
2) For event F nðiÞ, following the similar arguments above,
we have an upper bound of the probability for F nðiÞ (assume
that any delays larger than l at test i will interfere the tests j
following i where j 2 ½maxði mod m; i À m À
18. À 1Þ; i À mŠ):
Z þ1
d
ð1 À ð1 À pÞ Þ PðwÞdw
l
!
X Z ð m þ1ÞL
iÀj
d
Á 1À PðwÞdwð1 À ð1 À pÞ Þ
j ðiÀjÀ1ÞL
m
ð1 À ð1 À pÞd Þð1 À 2ð1 À ð1 À pÞd ÞÞð
20. ð1 À ð1 À pÞd Þð1 À 2ð1 À ð1 À pÞd ÞÞ: 6 EXPERIMENTAL EVALUATION
6.1 Overview
So the expected number of false negative tests is at most
As a lightweight distribute trigger-identification service, our
TÀ ð1 À ð1 À pÞd Þð1 À 2ð1 À ð1 À pÞd ÞÞt: ð12Þ solution will be experimentally evaluated from four facets:
Therefore, we could use a union bound and obtain a worst . in order to show the benefit of this service, we
case error rate of each test compare it with JAM [11] in terms of the end-to-end
21. XUAN ET AL.: A TRIGGER IDENTIFICATION SERVICE FOR DEFENDING REACTIVE JAMMERS IN WSN 803
Fig. 9. Benefits for routing.
delay and delivery ratio of the detour routes from three parameters J 2 ½1; 20Š, R 2 ½100; 200Š, r 2 ½50; 150Š are
the base station to all the sensor nodes, as the included in Figs. 9a, 9b, and 9c, respectively. Notice that for
number of sensors n, sensor range rs , and number of each experiments, the other two parameters are set as the
jammers J vary within practical intervals. median value of their corresponding intervals. Therefore,
. in order to show the acceleration effect of the clique- R ¼ 150 for Fig. 9c, which matches the extreme case R ¼ r.
independent set in this solution, we compare the Furthermore, for the nodes that are in jammed areas for
complexity of this solution to our previous centra- JAM and that are triggers for our method, in another word,
lized one [7], with varying the above four para- unable to deliver packets to or from the base station, we
meters, where both jamming and triggering range R count the delay as n þ 1, which is an upper bound of the
and r are assumed to be known beforehand. route length.
. in order to show the accuracy of estimating the As shown in Figs. 9a and 9b, when j and R increases,
jamming range by using the polygon disk cover the routing delay goes up, which is quite reasonable since
algorithm, we provide the estimated jamming the jamming areas get larger and more detours have to be
ranges as well as the error rate to the actual values. taken. The length of routes based on JAM quickly climbs up
. in order to show its performance and robustness to the upper bound, while that of our trigger method is
toward tricky attackers, we assess its false positive/ much lower and more stable (less than 900 seconds). When
negative rate and the estimation of R, for those two triggering range r is small, as in Fig. 9c, the end-to-end
advanced jammer models. delay of Trigger-based routing is much smaller than the
The simulation is developed using C++ on a Linux Work- other, while as r increases the two approaches each other,
station with 8 GB RAM. A 1;000 Â 1;000 square sensor field since more victim nodes are triggers.
is created with uniformly distributed n sensor nodes, one
6.3 Improvements on Time Complexity
base station and J randomly distributed jammer nodes. All
the simulation results are derived by averaging 20 random In our previous work [7], we proposed a preliminary idea of
instances. this trigger detection, and provided a disk-based solution.
However, its high time complexity limits its usage in real-
6.2 Benefits for Jamming-Resistent Routing time networks. As mentioned above, the time complexity of
JAM [11] proposed a jamming-resistent routing scheme, our new clique-based detection is proved to be asympto-
where all the detected jammed areas will be evaded and tically lower than the previous, while the message complex-
packets will not pass through the jammed nodes. This ities are approaching each other.
method is dedicated for proactive jamming attacks, which Although the computational overhead for estimating R is
sacrifices significant packet delivery ratio due to the asymptotically huge, the phase is not the key part of our
unnecessarily long routes selected, though the effects of scheme, and can be easily improved by machine learning
jamming signals are avoided. We compare the end-to-end techniques. Therefore, in this section, we assume that both
delay between each sensor node and the base station, of the R and r are known beforehand, and validate the theoretical
selected routes by evading the jammed areas detected by results through simulations on network instances with
JAM, with that of the ones evading only trigger nodes. various settings. Specifically, the network size n ranging
Although there are many existing routing protocols for from 450 to 550 with step 2, transmission rs from 50 to 60
unreliable network environments, the aim of this experi- with step 0.2, and number of jammers J from 3 to 10 with
ment is to show the potential of this service to various step 1. Parameter values lower than these intervals would
applications, instead of being a dedicated routing protocol. make the sensor network less connected and jamming
Three key parameters for routing could be the number of attack less severe, while higher values would lead to
Jammers J, jamming range R, jamming threshold . As impractical dense scenarios and unnecessary energy waste.
mentioned earlier, indicates the aggressiveness of the Since the length of each reactive attack is equal to the
1
attacker and the triggering range r % rs ð0 Þ . Therefore, with transmission delay of the object sensor signal, note that in
rs , 0 and as fixed network inputs, the effect of can be our trigger detection, only one message is broadcast by
exactly indicated by studying the effect of r instead. each sensor in the testing groups. Therefore, it is reasonable
The whole network has n ¼ 1;500 nodes and sensor to predefine the length of each testing round as a constant.
transmission range rs ¼ 50. The results with respect to the We set this as 1 second, which is far more enough for any
22. 804 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 5, MAY 2012
Fig. 10. Time and message complexity.
single packet to be transmitted from one node to its the accuracy of this estimation. As shown in Fig. 11, we
neighboring nodes. Henceforth, the time cost shown in investigate the error rate ÁR for R ¼ ½50; 100Š when there
Section 6.3 only indicates the number of necessary rounds are, respectively, J ¼ 5; 10; 15 jammers.
to find out all the triggers, and can be further reduced. The Two observations are straightforward from these results:
message complexity is measured via the average message 1) all the estimated values are above the actual ones,
cost on each sensor node. however, less than 10 percent difference. This meets our
As shown in Figs. 10a and 10b, this clique-based scheme requirement for a tight upper bound of R. 2) the error rates
completes the identification with steadily less than 10 sec- in case of fewer jammers are lower than those with more
onds, compared to the increasing time overhead with more jammers. This is because the jammer areas can have larger
than 15 seconds of the disk-based solution, as the network overlaps, which introduces estimate inaccuracies.
grows denser with more sensor nodes. Meanwhile, its
amortized communication overheads are only slightly 6.5 Robustness to Various Jammer Models
higher than that of the other solution, whereas both are In order to show the precision of our proposed solution
below 10 messages per victim node. Therefore, the new under different jamming environments, we vary the two
scheme is even more efficient and robust to large-scale
parameters of the jammer behaviors above: Jammer Response
network scenarios.
Probability and Testing Round Length/Maximum Jamming
With the sensor transmission radius growing up, the
Delay L=X and illustrate the resulted false rates in Figs. 12a
time complexity of the disk-based solution gradually
and 12b. To simulate the most dangerous case, we assume a
ascends (Figs. 10d and 10c) due to the increased maximum
hybrid behavior for all the jammers, for example, the
degree ÁðHÞ mentioned in the above analysis. Compara-
tively, the time cost of clique-based solution remains below jammers in the simulation of Fig. 12a not only launch
10 seconds, while the two message complexities are similar. the jamming signals probabilistically, but also delay the
Since sensor nodes are uniformly distributed, the more jamming messages with a random period of time up to 2L.
jammer nodes placed in the networks, the more victim On the other hand, the jammers in the simulation of Fig. 12b
nodes are expected to be tested, the identification complex-
ity will therewith raises, as the performance of disk-based
scheme shows in Figs. 10f and 10e. Encouragingly, the
proposed scheme can still finish the identification promptly
with less than 10 seconds, which grows up much slower
than the other. It has slightly more communication over-
heads (10 messages per victim nodes) but is still affordable
to power-limited sensor nodes.
6.4 Accuracy in Estimating Jammer Properties
Though the estimate of jamming range R is only to provide
an upper bound for R, such that the testing teams obtained
accordingly are interference free, we are also interested in Fig. 11. Estimation error of R.
23. XUAN ET AL.: A TRIGGER IDENTIFICATION SERVICE FOR DEFENDING REACTIVE JAMMERS IN WSN 805
other hand, mitigation schemes which benefit from channel
surfing [13], frequency hopping and spatial retreats [12],
reactively help legitimate nodes escape from the jammed
area or frequency. Unfortunately, being lack of preknow-
ledge over possible positions of hidden reactive jammer
nodes, legitimate nodes cannot efficiently evade jamming
signals, especially in dense sensor network when multiple
mobile nodes can easily activate reactive jammer nodes and
cause the interference. For the sake of overcoming these
limitations above, in [7] we studied on the problem of
Fig. 12. Solution robustness.
identification trigger nodes with a short period of time,
whose results can be employed by jamming-resistent
respond each sensed transmission with probability 0.5 as
routing schemes, to avoid the transmissions of these trigger
well. All the simulation results are derived by averaging 10
nodes and deactivate the reactive jammer nodes. In this
instances for each parameter team.
paper, we complete this trigger identification procedure as
As shown in both figures, we consider the extreme cases
a lightweight service, which is prompt and reliable to
where jammers respond transmission signals with a prob-
various network scenarios.
ability as small as 0.1, or delay the signals to up to 10 testing
rounds later. This actually contradicts with the nature of
reactive jamming attacks, which aim at disrupting the 8 DISCUSSION AND CONCLUSIONS
network communication as soon as any legitimate transmis- One leftover problem to this service framework is the
sion starts. The motivation of such parameter setting is to jammer mobility. Although the identification latency has
show the robustness of this scheme even if the attackers been shown small, it would not be efficient toward jammers
sense the detection and intentionally slow down the attacks. that are moving at a high speed. This would become an
The overall false rates are below 20 percent. interesting direction of this research.
In Fig. 12a, when 1=2 which corresponds to practical Another leftover problem is the application of this service.
cases, we find that the false negative rates generally decrease Jamming-resistent routing and jammer localizations are
from 10 to 5 percent as increases. Meanwhile the false both quite promising, yet the service overhead has to be
positive rate grows gently, but is still below 14 percent, this is further reduced to for real-time requirements.
because as more and more jamming signals are sent, due to As a summary, in order to provide an efficient trigger-
their randomized time delays, more and more following tests identification service framework, we leverage several
will be influenced and become false positive. In Fig. 12b, optimization problem models and provide corresponding
considering the practical cases where L=X 1=2, both rates algorithms to them, which includes the clique-independent
are going down from around 10 to 1 percent, since the problem, randomized error-tolerant group testing, and
maximum jamming delay becomes shorter and shorter minimum disk cover for simple polygon. The efficiency of
compared to the testing round length L, as the number of this framework is proved through both theoretically
interferences between consecutive tests decreases. analysis toward various sophisticated attack models and
simulations under different network settings. With abun-
7 RELATED WORKS dant possible applications, this framework exhibits huge
potentials and deserves further studies.
Existing countermeasures against jamming attacks in WSN
can be categorized into two facets: signal detection and
mitigation, both of which have been well studied and ACKNOWLEDGMENTS
developed with various defense schemes. On the one hand, This work was partially supported by US National Science
a majority of detection methods focus on analyzing specific Foundation Career Award # 0953284 and DTRA, Young
object values to discover abnormal events, e.g., Xu et al. [16] Investigator Award, Basic Research Program # HDTRA1-
studied a multimodel (PDR, RSS) to consistently monitor 09-1-0061 and DTRA # HDTRA1-08-10.
jamming signals. Work based on similar ideas [17], [15], [14]
improved the detection accuracy by investigating sophisti-
cated decision criteria and thresholds. However, reactive REFERENCES
jamming attacks, where the jammer node are not continu- [1] D.Z. Du and F. Hwang, Pooling Designs: Group Testing in Molecular
ously active and thus unnecessary to cause huge deviations Biology. World Scientific, 2006.
[2] M. Goodrich, M. Atallah, and R. Tamassia, “Indexing Information
of these variables from normal legitimate profiles, cannot be for Data Forensics,” Proc. Third Applied Cryptography and Network
efficiently tackled by these methods. In addition, some Security Conf. (ACNS), 2005.
recent works proposed methods for detecting jammed areas [3] R. Gupta, J. Walrand, and O. Goldschmidt, “Maximal Cliques in
Unit Disk Graphs: Polynomial Approximation,” Proc. Int’l Network
[11] and directing normal communications bypass possible Optimization Conf. (INOC), 2005.
jammed area using wormhole [18]. These solutions can [4] V. Guruswami and C.P. Rangan, “Algorithmic Aspects of Clique-
effectively mitigate jamming attacks, but their performances Transversal and Clique-Independent Sets,” Discrete Applied Math.,
rely on the accuracy of detection on jammed areas, i.e., the vol. 100, pp. 183-202, 2000.
[5] W. Hang, W. Zanji, and G. Jingbo, “Performance of DSSS Against
transmission overhead would be unnecessarily brought up Repeater Jamming,” Proc. IEEE 13th Int’l Conf. Electronics, Circuits
if the jammed area is much larger than its actual size. On the and Systems (ICECS), 2006.