Cargando…
Random Access Performance of Distributed Sensors Attacked by Unknown Jammers
In this paper, we model and investigate the random access (RA) performance of sensor nodes (SN) in a wireless sensor network (WSN). In the WSN, a central head sensor (HS) collects the information from distributed SNs, and jammers disturb the information transmission primarily by generating interfere...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2017
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5713034/ https://www.ncbi.nlm.nih.gov/pubmed/29156570 http://dx.doi.org/10.3390/s17112667 |
_version_ | 1783283331192848384 |
---|---|
author | Jeong, Dae-Kyo Wui, Jung-Hwa Kim, Dongwoo |
author_facet | Jeong, Dae-Kyo Wui, Jung-Hwa Kim, Dongwoo |
author_sort | Jeong, Dae-Kyo |
collection | PubMed |
description | In this paper, we model and investigate the random access (RA) performance of sensor nodes (SN) in a wireless sensor network (WSN). In the WSN, a central head sensor (HS) collects the information from distributed SNs, and jammers disturb the information transmission primarily by generating interference. In this paper, two jamming attacks are considered: power and code jamming. Power jammers (if they are friendly jammers) generate noises and, as a result, degrade the quality of the signal from SNs. Power jamming is equally harmful to all the SNs that are accessing HS and simply induces denial of service (DoS) without any need to hack HS or SNs. On the other hand, code jammers mimic legitimate SNs by sending fake signals and thus need to know certain system parameters that are used by the legitimate SNs. As a result of code jamming, HS falsely allocates radio resources to SNs. The code jamming hence increases the failure probability in sending the information messages, as well as misleads the usage of radio resources. In this paper, we present the probabilities of successful preamble transmission with power ramping according to the jammer types and provide the resulting throughput and delay of information transmission by SNs, respectively. The effect of two jamming attacks on the RA performances is compared with numerical investigation. The results show that, compared to RA without jammers, power and code jamming degrade the throughput by up to 30.3% and 40.5%, respectively, while the delay performance by up to 40.1% and 65.6%, respectively. |
format | Online Article Text |
id | pubmed-5713034 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2017 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-57130342017-12-07 Random Access Performance of Distributed Sensors Attacked by Unknown Jammers Jeong, Dae-Kyo Wui, Jung-Hwa Kim, Dongwoo Sensors (Basel) Article In this paper, we model and investigate the random access (RA) performance of sensor nodes (SN) in a wireless sensor network (WSN). In the WSN, a central head sensor (HS) collects the information from distributed SNs, and jammers disturb the information transmission primarily by generating interference. In this paper, two jamming attacks are considered: power and code jamming. Power jammers (if they are friendly jammers) generate noises and, as a result, degrade the quality of the signal from SNs. Power jamming is equally harmful to all the SNs that are accessing HS and simply induces denial of service (DoS) without any need to hack HS or SNs. On the other hand, code jammers mimic legitimate SNs by sending fake signals and thus need to know certain system parameters that are used by the legitimate SNs. As a result of code jamming, HS falsely allocates radio resources to SNs. The code jamming hence increases the failure probability in sending the information messages, as well as misleads the usage of radio resources. In this paper, we present the probabilities of successful preamble transmission with power ramping according to the jammer types and provide the resulting throughput and delay of information transmission by SNs, respectively. The effect of two jamming attacks on the RA performances is compared with numerical investigation. The results show that, compared to RA without jammers, power and code jamming degrade the throughput by up to 30.3% and 40.5%, respectively, while the delay performance by up to 40.1% and 65.6%, respectively. MDPI 2017-11-18 /pmc/articles/PMC5713034/ /pubmed/29156570 http://dx.doi.org/10.3390/s17112667 Text en © 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Jeong, Dae-Kyo Wui, Jung-Hwa Kim, Dongwoo Random Access Performance of Distributed Sensors Attacked by Unknown Jammers |
title | Random Access Performance of Distributed Sensors Attacked by Unknown Jammers |
title_full | Random Access Performance of Distributed Sensors Attacked by Unknown Jammers |
title_fullStr | Random Access Performance of Distributed Sensors Attacked by Unknown Jammers |
title_full_unstemmed | Random Access Performance of Distributed Sensors Attacked by Unknown Jammers |
title_short | Random Access Performance of Distributed Sensors Attacked by Unknown Jammers |
title_sort | random access performance of distributed sensors attacked by unknown jammers |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5713034/ https://www.ncbi.nlm.nih.gov/pubmed/29156570 http://dx.doi.org/10.3390/s17112667 |
work_keys_str_mv | AT jeongdaekyo randomaccessperformanceofdistributedsensorsattackedbyunknownjammers AT wuijunghwa randomaccessperformanceofdistributedsensorsattackedbyunknownjammers AT kimdongwoo randomaccessperformanceofdistributedsensorsattackedbyunknownjammers |