Skip to main content
Log in

Compromise-resilient anti-jamming communication in wireless sensor networks

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Jamming is a kind of Denial-of-Service attack in which an adversary purposefully emits radio frequency signals to corrupt the wireless transmissions among normal nodes. Although some research has been conducted on countering jamming attacks, few works consider jamming attacks launched by insiders, where an attacker first compromises some legitimate sensor nodes to acquire the common cryptographic information of the sensor network and then jams the network through those compromised nodes. In this paper, we address the insider jamming problem in wireless sensor networks. In our proposed solutions, the physical communication channel of a sensor network is determined by the group key shared by all the sensor nodes. When insider jamming happens, the network will generate a new group key to be shared only by the non-compromised nodes. After that, the insider jammers are revoked and will not be able to predict the future communication channels used by the non-compromised nodes. Specifically, we propose two compromise-resilient anti-jamming schemes: the split-pairing scheme which deals with a single insider jammer, and the key-tree-based scheme which copes with multiple colluding insider jammers. We implement and evaluate the proposed solutions using Mica2 Motes. Experimental results show that our solutions have low recovery latency and low communication overhead, and hence they are suitable for resource constrained sensor networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Blundo, C., Santis, A. D., Herzberg, A., Kutten, S., Vaccaro, U., & Yung, M. (1993). Perfectly-secure key distribution for dynamic conferences. In Advances in cryptology, Proceedings of CRYPTO 92, (pp. 471–486).

  2. Brown, T., James, J., & Sethi, A. (2006). Jamming and sensing of encrypted wireless ad hoc networks. In ACM Mobihoc.

  3. Chan, H., Perrig, A., & Song, D. (2003). Random key predistribution schemes for sensor networks. In IEEE Security and Privacy Symposim.

  4. Chiang, J. T. & Hu, Y.-C. (2008). Dynamic jamming mitigation for wireless broadcast networks. In IEEE INFOCOM.

  5. Danev, B. & Capkun, S. (2009). Transient-based identification of wireless sensor nodes. In ACM/IEEE IPSN.

  6. Datasheet, C. Chipcon cc1000 radio’s datasheet. http://www.chipcon.com.

  7. Dong, Q. & Liu, D. (2010). Adaptive jamming-resistant broadcast systems with partial channel sharing. In International conference on distributed computing systems (ICDCS).

  8. Dong, Q., Liu, D., & Ning, P. (2008). Pre-authentication filters: Providing dos resistance for signature-based broadcast authentication in wireless sensor networks. In ACM conference on wireless network security (WiSec).

  9. Jiang, X., Hu, W., Zhu, S., & Cao, G. (2010). Compromise-resilient anti-jamming for wireless sensor networks. In International conference on information and communications security.

  10. Karlof, C., Sastry, N., & Wagner, D. (2004). Tinysec: A link layer security architecture for wireless sensor networks. In ACM SenSys.

  11. Kim, Y., Perrig, A., & Tsudik, G. (2004). Tree-based group key agreement. ACM TISSEC, 7(1), 60–96.

    Article  Google Scholar 

  12. Lazos, L., Liu, S., & Krunz, M. (2009). Mitigating control-channel jamming attacks in multi-channel ad hoc networks. In ACM WiSec.

  13. Li, M., Koutsopoulos, I., & Poovendran, R. (2007). Optimal jamming attacks and network defense policies in wireless sensor networks. In IEEE Infocom.

  14. Liu, D., Ning, P., & Li, R. (2003). Establishing pairwise keys in distributed sensor networks. In ACM CCS.

  15. Navda, V., Bohra, A., Ganguly, S., & Rubenstein, D. (2007). Using channel hopping to increase 802.11 resilience to jamming attacks. In IEEE Infocom.

  16. Park, T., & Shin, K. G. (2005). Soft tamper-proofing via program integrity verification in wireless sensor networks. In IEEE transactions on mobile computing.

  17. Perrig, A., Song, D., & Tygar, J. D. (2001). Elk, a new protocol for efficient large-group key distribution. In IEEE Symposium on Security and Privacy.

  18. Poisel, R. (2004). Modern communications jamming principles and techniques. Artech House Publisher. http://www.amazon.com/Communications-Jamming-Principles-Techniques-Information/dp/158053743X.

  19. Popper, C., Strasser, M., & Capkun, S. (2009). Jamming-resistant broadcast communication without shared keys. In USENIX Security Symposium.

  20. Proakis, J. G. (2000). Digital communications (4th ed.). New York: McGraw-Hill.

  21. Rodeh, O., Birman, K., & Dolev, D. (2000). Optimized group rekey for group communication systems. In Network and Distributed System Security Symposium (NDSS).

  22. Schleher, C. (1999). Electronic warfare in the information age. In MArtech House.

  23. Seshadri, A., Perrig, A., van Doorn, L., & Khosla, P. (2004). Swatt: Software-based attestation for embedded devices. In IEEE Symposium on Security and Privacy.

  24. Shaneck, M., Mahadevan, K., Kher, V., & Kim, Y. (2005). Remote software-based attestation for wireless sensors. In ESAS.

  25. Strasser, M., Popper, C., & Capkun, S. (2009). Efficient uncoordinated fhss anti-jamming communication. In ACM Mobihoc.

  26. Strasser, M., Popper, C., Capkun, S., & Cagalj, M. (2008). Jamming-resistant key establishment using uncoordinated frequency hopping. In IEEE Symposium on Security and Privacy (pp. 64–78).

  27. Sun, Y., & Wang, X. (2009). Jammer localization in wireless sensor networks. In Proceedings of the 5th international conference on wireless communications, networking and mobile computing.

  28. Tague, P., Li, M., & Poovendran, R. (2009). Mitigation of control channel jamming under node capture attacks. IEEE Transactions on Mobile Computing, 8(9), 1221–1234.

    Article  Google Scholar 

  29. Tinyos homepage. http://webs.cs.berkeley.edu/tos/.

  30. Towsley, D., Kurose, J., & Pingali, S. (1997). A comparison of sender-initiated and receiver-initiated reliable multicast protocols. IEEE Journal on Selected Areas in Communications (JSAC).

  31. Wang, Q., Xu, P., Ren, K., & Li, X.-Y. (2011). Delay-bounded adaptive ufh-based anti-jamming wireless communication. In IEEE INFOCOM.

  32. Wong, C., Gouda, M., & Lam, S. S. (1998). Secure group communication using key graphs. In ACM special interest group on data communication (SIGCOMM).

  33. Wood, A., Stankovic, J., & Zhou, G. (2007). Deejam: Defeating energy-efficient jamming in ieee 802.15.4-based wireless networks. In IEEE SECON.

  34. Wood, A. D., Stankovic, J. A., & Son, S. H. (2003). Jam: A jammed-area mapping service for sensor networks. In RTSS ’03: Proceedings of the 24th IEEE International Real-Time Systems Symposium.

  35. Xu, W., Trappe, W., & Zhang, Y. (2007). Channel surfing: Defending wireless sensor networks from jamming and interference. In ACM IPSN.

  36. Xu, W., Trappe, W., & Zhang, Y. (2008). Anti-jamming timing channels for wireless networks. In ACM WiSec.

  37. Xu, W., Trappe, W., Zhang, Y., & Wood, T. (2005). The feasibility of launching and detecting jamming attacks in wireless networks. In ACM Mobihoc.

  38. Yang, Y., Wang, X., Zhu, S., & Cao, G. (2007). Distributed software-based attestation for node compromise detection in sensor networks. In IEEE SRDS.

  39. Zhang, W., & Cao, G. (2005). Group rekeying for filtering false data in sensor networks: A predistribution and local collaboration-based approach. In IEEE INFOCOM.

  40. Zhang, W., Zhu, S., & Cao, G. (2009). Predistribution and local collaboration-based group rekeying for wireless sensor networks. In Ad hoc networks.

  41. Zhu, S., Setia, S., & Jajodia, S. (2006). Leap+: Efficient security mechanisms for large-scale distributed sensor networks. In ACM TOSN.

Download references

Acknowledgments

The authors would like to thank anonymous reviewers for their insightful comments and helpful suggestions. This work was supported in part by Army Research Office under MURI grant W911NF-07-1-0318 and NSF CAREER 0643906.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuan Jiang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Jiang, X., Hu, W., Zhu, S. et al. Compromise-resilient anti-jamming communication in wireless sensor networks. Wireless Netw 17, 1513–1527 (2011). https://doi.org/10.1007/s11276-011-0361-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-011-0361-8

Keywords

Navigation