Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite

Abstract

The 802.15.4 Wireless Sensor Networks (WSN) becomes more economical, feasible and sustainable for new generation communication environment, however their limited resource constraints such as limited power capacity make them difficult to detect and defend themselves against variety of attacks. The radio interference attacks that generate for WSN at the Physical Layer cannot be defeated through conventional security mechanisms proposed for 802.15.4 standards. The first section introduces the deployment model of two-tier hierarchical cluster topology architecture and investigates different jamming techniques proposed for WSN by creating specific classification of different types of jamming attacks. The following sections expose the mitigation techniques and possible built-in mechanisms to mitigate the link layer jamming attacks on proposed two-tier hierarchical clustered WSN topology. The two-tier hierarchical cluster based topology is investigated based on contention based protocol suite through OPNET simulation scenarios.

Share and Cite:

Sari, A. (2015) Two-Tier Hierarchical Cluster Based Topology in Wireless Sensor Networks for Contention Based Protocol Suite. International Journal of Communications, Network and System Sciences, 8, 29-42. doi: 10.4236/ijcns.2015.83004.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Wood, A. and Stankovic, J. (2002) Denial of Service in Sensor Networks. IEEE Computer, 35, 54-62.
http://dx.doi.org/10.1109/MC.2002.1039518
[2] Gurwinder, K. and Rachit, G.M. (2012) Energy Efficient Topologies for Wireless Sensor Networks. International Journal of Distributed and Parallel Systems (IJDPS), 3, 179-192.
[3] Virmani, D. and Jain, S. (2013) Cluserting Based Topology Control Protocol for Data Delivery in Wireless Sensor Networks. International Journal of Computer Science and Issues, 1-12.
[4] Xu, Y., Bien, S., Mori, Y., Heidemann, J. and Estrin, D. (2008) Topology Control Protocols to Conserve Energy in Wireless ad Hoc Networks. CENS Technical Report UCLA, Number 6, Los Angeles, 128-134.
[5] Lee, J.-S. and Chang, C.-C. (2007) Secure Communications for Cluster-Based ad Hoc Networks Using Node Identities. Journal of Network and Computer Applications, 30, 1377-1396.
http://dx.doi.org/10.1016/j.jnca.2006.10.003
[6] Wu, B., Wu, J., Fernandez, E.B., Ilyas, M. and Magliveras, S. (2007) Secure and Efficient Key Management in Mobile ad Hoc Networks. Journal of Network and Computer Applications, 30, 937-954.
http://dx.doi.org/10.1016/j.jnca.2005.07.008
[7] Lv, B., Zhang, X.-F., Wang, C. and Yuan, N.-C. (2008) Study of Channelized Noise Frequency-Spot Jamming Techniques.
[8] Xi, Y.-Y. and Cheng, N.-P. (2011) Performance Analysis of Multi-Tone Frequency Sweeping Jamming for Direct Sequence Spread Spectrum Systems.
[9] Murray, S. (1975) Generic Multi-Directional Barrage Jamming System. US Patent No. 3879732.
[10] Schuerger, J. and Garmatyuk, D. (2008) Deceptive Jamming Modelling in Radar Sensor Networks. Military Communications Conference, San Diego, 16-19 November 2008, 1-7.
[11] Xu, W., Wood, T., Trappe, W. and Zhang, Y.Y. (2004) Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service. Proceedings of the 2004 ACM Workshop on Wireless Security, ACM, New York, 80-89.
http://dx.doi.org/10.1145/1023646.1023661
[12] Sari, A. and Necat, B. (2012) Securing Mobile Ad-Hoc Networks against Jamming Attacks through Unified Security Mechanism. International Journal of Ad Hoc, Sensor & Ubiquitous Computing (IJASUC), 3, 79-94.
http://dx.doi.org/10.5121/ijasuc.2012.3306
[13] Law, Y., Hartel, P., den Hartog, J. and Havinga, P. (2005) Link-Layer Jamming Attacks on S-MAC. Proceedings of the Second European Workshop on Wireless Sensor Networks, 31 January-2 February 2005, 217-225.
http://dx.doi.org/10.1109/EWSN.2005.1462013
[14] Sari, A. (2015) Lightweight Robust Forwarding Scheme for Multi-Hop Wireless Networks. International Journal of Communications, Network and System Sciences, 8, 19-28.
http://dx.doi.org/10.4236/ijcns.2015.83003
[15] Xu, W.Y., Ma, K., Trappe, W. and Zhang, Y. (2006) Jamming Sensor Networks: Attack and Defense Strategies. IEEE Network, 20, 41-47.
http://dx.doi.org/10.1109/MNET.2006.1637931
[16] Wood, A. and Stankovic, J.A. (2002) Denial of Service in Sensor Networks. Computer, 35, 54-62.
http://dx.doi.org/10.1109/MC.2002.1039518
[17] Balogun, V. and Krings, A. (2014) Mitigating Constant Jamming in Cognitive Radio Networks Using Hybrid FEC Code. IEEE 28th International Conference on Advanced Information Networking and Applications (AINA), Victoria, 13-16 May 2014, 704-711.
[18] Mpitziopoulos, A., Gavalas, D., Konstantopoulos, C. and Pantziou, G. (2009) A Survey on Jamming Attacks and Countermeasures in WSNs. IEEE Communications Surveys & Tutorials, 11, 42-56.
http://dx.doi.org/10.1109/SURV.2009.090404
[19] Sari, A. and Necat, B. (2012) Impact of RTS Mechanism on TORA and AODV Protocol’s Performance in Mobile Ad Hoc Networks. International Journal of Science and Advanced Technology (IJSAT), 2, 188-191.
[20] Wilhelm, M., Martinovic, I., Schmitt, J.B. and Lenders, V. (2011) Short Paper: Reactive Jamming in Wireless Networks—How Realistic Is the Threat? Proceedings of the Fourth ACM Conference on Wireless Network Security, ACM, New York, 47-52.
[21] Chen, D., Deng, J. and Varshney, P.K. (2003) Protecting Wireless Networks against a Denial of Service Attack Based on Virtual Jamming. MOBICOM-Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking, San Diego, 14-19 September 2003.
[22] Gokhale, V., Ghosh, S. and Gupta, A. (2010) Classification of Attacks on Wireless Mobile Ad Hoc Networks and Vehicular Ad Hoc Networks: A Survey. In: Khan Pathan, A., Ed., Security of Self-Organizing Networks, MANET WSN WMN VANET, Auerbach Publications, 195-225.
http://dx.doi.org/10.1201/EBK1439819197-12
[23] Xu, W., Trappe, W., Zhang, Y.Y. and Wood, T. (2005) The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. MobiHoc ’05: Proceedings of the 6th ACM International Symposium on Mobile ad Hoc Networking and Computing, Urbana-Champaign, 25-28 May 2005, 46-57.
http://dx.doi.org/10.1145/1062689.1062697
[24] Sari, A. (2014) Security Approaches in IEEE 802.11 MANET. International Journal of Communications, Network and System Sciences, 7, 365-372.
http://dx.doi.org/10.4236/ijcns.2014.79038
[25] Ju, K. and Chung, K. (2012) Jamming Attack Detection and Rate Adaptation Scheme for IEEE 802.11 Multi Hop Tactical Networks. International Journal of Security and Its Applications, 6, 149-154.
[26] Mahajan, R. and Nair, S. (2013) Performance Evaluation of Zigbee Protocol Using Opnet Modeler for Mine Safety. International Journal of Computer Science and Network, 2, 62-66.
[27] OPNET Technologies Inc. “Opnet Simulator”.
www.opnet.net

Copyright © 2023 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.