Cargando…

On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks

In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) protocol, with two well-known protocols, the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR). For this purpose, we have developed a simulator, which faithfully reifies the work...

Descripción completa

Detalles Bibliográficos
Autores principales: Del-Valle-Soto, Carolina, Mex-Perera, Carlos, Monroy, Raul, Nolazco-Flores, Juan Arturo
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2015
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4431270/
https://www.ncbi.nlm.nih.gov/pubmed/25825979
http://dx.doi.org/10.3390/s150407619
_version_ 1782371312596942848
author Del-Valle-Soto, Carolina
Mex-Perera, Carlos
Monroy, Raul
Nolazco-Flores, Juan Arturo
author_facet Del-Valle-Soto, Carolina
Mex-Perera, Carlos
Monroy, Raul
Nolazco-Flores, Juan Arturo
author_sort Del-Valle-Soto, Carolina
collection PubMed
description In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) protocol, with two well-known protocols, the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR). For this purpose, we have developed a simulator, which faithfully reifies the workings of a given protocol, considering a fixed, reconfigurable ad hoc network given by the number and location of participants, and general network conditions. We consider a scenario that can be found in a large number of wireless sensor network applications, a single sink node that collects all of the information generated by the sensors. The metrics used to compare the protocols were the number of packet retransmissions, carrier sense multiple access (CSMA) inner loop retries, the number of nodes answering the queries from the coordinator (sink) node and the energy consumption. We tested the network under ordinary (without attacks) conditions (and combinations thereof) and when it is subject to different types of jamming attacks (in particular, random and reactive jamming attacks), considering several positions for the jammer. Our results report that MPH has a greater ability to tolerate such attacks than DSR and AODV, since it minimizes and encapsulates the network segment under attack. The self-configuring capabilities of MPH derived from a combination of a proactive routes update, on a periodic-time basis, and a reactive behavior provide higher resilience while offering a better performance (overhead and energy consumption) than AODV and DSR, as shown in our simulation results.
format Online
Article
Text
id pubmed-4431270
institution National Center for Biotechnology Information
language English
publishDate 2015
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-44312702015-05-19 On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks Del-Valle-Soto, Carolina Mex-Perera, Carlos Monroy, Raul Nolazco-Flores, Juan Arturo Sensors (Basel) Article In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) protocol, with two well-known protocols, the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR). For this purpose, we have developed a simulator, which faithfully reifies the workings of a given protocol, considering a fixed, reconfigurable ad hoc network given by the number and location of participants, and general network conditions. We consider a scenario that can be found in a large number of wireless sensor network applications, a single sink node that collects all of the information generated by the sensors. The metrics used to compare the protocols were the number of packet retransmissions, carrier sense multiple access (CSMA) inner loop retries, the number of nodes answering the queries from the coordinator (sink) node and the energy consumption. We tested the network under ordinary (without attacks) conditions (and combinations thereof) and when it is subject to different types of jamming attacks (in particular, random and reactive jamming attacks), considering several positions for the jammer. Our results report that MPH has a greater ability to tolerate such attacks than DSR and AODV, since it minimizes and encapsulates the network segment under attack. The self-configuring capabilities of MPH derived from a combination of a proactive routes update, on a periodic-time basis, and a reactive behavior provide higher resilience while offering a better performance (overhead and energy consumption) than AODV and DSR, as shown in our simulation results. MDPI 2015-03-27 /pmc/articles/PMC4431270/ /pubmed/25825979 http://dx.doi.org/10.3390/s150407619 Text en © 2015 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Del-Valle-Soto, Carolina
Mex-Perera, Carlos
Monroy, Raul
Nolazco-Flores, Juan Arturo
On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks
title On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks
title_full On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks
title_fullStr On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks
title_full_unstemmed On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks
title_short On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks
title_sort on the routing protocol influence on the resilience of wireless sensor networks to jamming attacks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4431270/
https://www.ncbi.nlm.nih.gov/pubmed/25825979
http://dx.doi.org/10.3390/s150407619
work_keys_str_mv AT delvallesotocarolina ontheroutingprotocolinfluenceontheresilienceofwirelesssensornetworkstojammingattacks
AT mexpereracarlos ontheroutingprotocolinfluenceontheresilienceofwirelesssensornetworkstojammingattacks
AT monroyraul ontheroutingprotocolinfluenceontheresilienceofwirelesssensornetworkstojammingattacks
AT nolazcofloresjuanarturo ontheroutingprotocolinfluenceontheresilienceofwirelesssensornetworkstojammingattacks