Cargando…
On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks
In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) protocol, with two well-known protocols, the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR). For this purpose, we have developed a simulator, which faithfully reifies the work...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2015
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4431270/ https://www.ncbi.nlm.nih.gov/pubmed/25825979 http://dx.doi.org/10.3390/s150407619 |
_version_ | 1782371312596942848 |
---|---|
author | Del-Valle-Soto, Carolina Mex-Perera, Carlos Monroy, Raul Nolazco-Flores, Juan Arturo |
author_facet | Del-Valle-Soto, Carolina Mex-Perera, Carlos Monroy, Raul Nolazco-Flores, Juan Arturo |
author_sort | Del-Valle-Soto, Carolina |
collection | PubMed |
description | In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) protocol, with two well-known protocols, the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR). For this purpose, we have developed a simulator, which faithfully reifies the workings of a given protocol, considering a fixed, reconfigurable ad hoc network given by the number and location of participants, and general network conditions. We consider a scenario that can be found in a large number of wireless sensor network applications, a single sink node that collects all of the information generated by the sensors. The metrics used to compare the protocols were the number of packet retransmissions, carrier sense multiple access (CSMA) inner loop retries, the number of nodes answering the queries from the coordinator (sink) node and the energy consumption. We tested the network under ordinary (without attacks) conditions (and combinations thereof) and when it is subject to different types of jamming attacks (in particular, random and reactive jamming attacks), considering several positions for the jammer. Our results report that MPH has a greater ability to tolerate such attacks than DSR and AODV, since it minimizes and encapsulates the network segment under attack. The self-configuring capabilities of MPH derived from a combination of a proactive routes update, on a periodic-time basis, and a reactive behavior provide higher resilience while offering a better performance (overhead and energy consumption) than AODV and DSR, as shown in our simulation results. |
format | Online Article Text |
id | pubmed-4431270 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2015 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-44312702015-05-19 On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks Del-Valle-Soto, Carolina Mex-Perera, Carlos Monroy, Raul Nolazco-Flores, Juan Arturo Sensors (Basel) Article In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) protocol, with two well-known protocols, the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR). For this purpose, we have developed a simulator, which faithfully reifies the workings of a given protocol, considering a fixed, reconfigurable ad hoc network given by the number and location of participants, and general network conditions. We consider a scenario that can be found in a large number of wireless sensor network applications, a single sink node that collects all of the information generated by the sensors. The metrics used to compare the protocols were the number of packet retransmissions, carrier sense multiple access (CSMA) inner loop retries, the number of nodes answering the queries from the coordinator (sink) node and the energy consumption. We tested the network under ordinary (without attacks) conditions (and combinations thereof) and when it is subject to different types of jamming attacks (in particular, random and reactive jamming attacks), considering several positions for the jammer. Our results report that MPH has a greater ability to tolerate such attacks than DSR and AODV, since it minimizes and encapsulates the network segment under attack. The self-configuring capabilities of MPH derived from a combination of a proactive routes update, on a periodic-time basis, and a reactive behavior provide higher resilience while offering a better performance (overhead and energy consumption) than AODV and DSR, as shown in our simulation results. MDPI 2015-03-27 /pmc/articles/PMC4431270/ /pubmed/25825979 http://dx.doi.org/10.3390/s150407619 Text en © 2015 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Del-Valle-Soto, Carolina Mex-Perera, Carlos Monroy, Raul Nolazco-Flores, Juan Arturo On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks |
title | On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks |
title_full | On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks |
title_fullStr | On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks |
title_full_unstemmed | On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks |
title_short | On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks |
title_sort | on the routing protocol influence on the resilience of wireless sensor networks to jamming attacks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4431270/ https://www.ncbi.nlm.nih.gov/pubmed/25825979 http://dx.doi.org/10.3390/s150407619 |
work_keys_str_mv | AT delvallesotocarolina ontheroutingprotocolinfluenceontheresilienceofwirelesssensornetworkstojammingattacks AT mexpereracarlos ontheroutingprotocolinfluenceontheresilienceofwirelesssensornetworkstojammingattacks AT monroyraul ontheroutingprotocolinfluenceontheresilienceofwirelesssensornetworkstojammingattacks AT nolazcofloresjuanarturo ontheroutingprotocolinfluenceontheresilienceofwirelesssensornetworkstojammingattacks |