Abstract
In recent years, Internet of Things (IoT) has attracted significant attention because of its wide range of applications in various domains. However, security is a growing concern as users of small devices in an IoT network are unable to defend themselves against reactive jamming attacks. These attacks negatively affect the performance of devices and hinder IoT operations. To address such an issue, this paper presents a novel countermeasure detection and consistency algorithm (CDCA), which aims to fight reactive jamming attacks on IoT networks. The proposed CDCA uses a change in threshold value to detect and treat an attack. The algorithm employs channel signal strength to check packet consistency by determining if the data transmission value contradicts the threshold value. The node that sends the threshold value is periodically checked and the threshold value is compared with the current value after data transmission to find out if an attack has occurred in the network. Based on realistic simulation scenarios (e.g., with varying traffic interval, number of malicious nodes, and random mobility patterns), the performance of the proposed CDCA is evaluated using a Cooja simulator. Simulation results demonstrate the superiority of the proposed technique compared with contemporary schemes in terms of performance metrics such as energy consumption, traffic delay, and network throughput.
Similar content being viewed by others
References
Abdalzaher MS, Seddik K, Elsabrouty M, Muta O, Furukawa H, Abdel-Rahman A (2016) Game theory meets wireless sensor networks security requirements and threats mitigation: A survey. Sensors (Switzerland) 16(7):22–27
Aman W, Snekkenes E (2015) Managing Security trade-offs in the internet of things using adaptive security. In Internet Technology and Secured Transactions (ICITST), 2015 10th International Conference for (pp. 362-368). IEEE
Babar SD, Prasad NR, Prasad R (2013) Jamming attack: Behavioral modelling and analysis. In Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE), 2013 3rd International Conference on (pp. 1-5). IEEE
Babar S, Stango A, Prasad N, Sen J, Prasad R (2011) Proposed embedded security framework for internet of things (iot). In Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference on (pp. 1-5). IEEE
Derhab A, Bouras A, Senouci MR, Imran M (2014) Fortifying intrusion detection systems in dynamic Ad Hoc and wireless sensor networks. Int J Distrib Sens Netw 10(12):608162
Ergul E (2017) Relative attribute based incremental learning for image recognition. CAAI Trans Intell Technol 2(1):1–11
Fadele AA, Othman M, Hashem IAT, Alotaibi F (2017) Internet of things Security: A Survey. J Netw Comput Appl 88:10–28
Fu H, Chen H, Zhu Y, Yu W (2017) FARMS : Efficient mapreduce speculation for failure recovery in short jobs. Parallel Comput 61:68–82
Ganeshkumar P, Vijayakumar KP, Anandaraj M (2016) A novel jammer detection framework for cluster-based wireless sensor networks. EURASIP J Wirel Commun Netw 2016(1):35
Goyal D, Tripathy MR (2012) Routing protocols in wireless sensor networks: A survey. In 2012 Second International Conference on Advanced Computing & Communication Technologies (pp. 474-480). IEEE
Hatzivasilis G, Papaefstathiou I, Manifavas C (2017) SCOTRES: Secure Routing for IoT and CPS. IEEE Internet Things J 73100(c):1–1
Heo J, Kim J, Bahk S (2017) Dodge-Jam : Anti-Jamming Technique for Low-power and Lossy Wireless Networks. IEEE Access 2(3):345–359
Huang K, Zhang Q, Zhou C, Xiong N, Qin Y (2017) An efficient intrusion detection approach for visual sensor networks based on traffic pattern learning. IEEE Trans Syst Man Cybern Part A Syst Hum 47(10):2704–2713
Kasinathan P, Pastrone C, Spirito MA, Vinkovits M (2013) Denial-of-Service detection in 6LoWPAN based Internet of Things. In 2013 IEEE 9th international conference on wireless and mobile computing, networking and communications (WiMob) (pp. 600-607). IEEE
Lee JJ, Lim J (2012) Effective and efficient jamming based on routing in wireless ad hoc networks. IEEE Commun Lett 16(11):1903–1906
Li S, Tryfonas T, Li H (2016) The Internet of Things: a security point of view. Internet Res 26(2):337–359
Liu H, Hu L, Ma L (2017) Online RGB-D person re-identification based on metric model update. CAAI Trans Intell Technol 2(1):48–55
Lu C (2014) Overview of Security and Privacy Issues in the Internet of Things. 1–11
Lu Y, Wu S, Fang Z, Xiong N, Yoon S, Park DS (2017) Exploring finger vein based personal authentication for secure IoT. Futur Gener Comput Syst 77:149–160
Mpitziopoulos A, Gavalas D, Konstantopoulos C, Pantziou G (2014) A survey on jamming attacks and countermeasures in WSNs. IEEE Commun Surv Tutorials 11(4):42–56
Nolin J, Olson N (2016) The Internet of Things and convenience. Internet Res 26(2):360–376
Pei E, Han H, Sun Z, Shen B, Zhang T (2015) LEAUCH: low-energy adaptive uneven clustering hierarchy for cognitive radio sensor network. EURASIP J Wirel Commun Netw 2015(1):122
Qiu Y, Ma M (2016) A Mutual Authentication and Key Establishment Scheme for M2M Communication in 6LoWPAN. IEEE Trans Ind Informatics 12(6):2074–2085
Raymond DR, Marchany RC, Brownfield MI, Midkiff SF (2011) Effects of denial-of-sleep attacks on wireless sensor network MAC protocols. IEEE Trans Veh Technol 58(1):367–380
Rehab I, Tian X, Gu F, Ball AD (2018) The influence of rolling bearing clearances on diagnostic signatures based on a numerical simulation and experimental evaluation. Int J Hydromechatronics 1(1):16–46
Restuccia F, D'Oro S, Melodia T (2018) Securing the Internet of Things: New Perspectives and Research Challenges. arXiv preprint arXiv:1803.05022
Sankaran S (2016) Lightweight security framework for IoTs using identity based cryptography. In Advances in Computing, Communications and Informatics (ICACCI), 2016 International Conference on (pp. 880-886). IEEE
Strasser M, Danev B, Čapkun S (2010) Detection of reactive jamming in sensor networks. ACM Trans Sens Networks 7(2):1–29
Suo H, Wan J, Zou C, Liu J (2012) Security in the internet of things: A review. Proc - 2012 Int Conf Comput Sci Electron Eng ICCSEE 2012 3:648–651
Tarkowski M, Rzymowski M, Kulas L, Nyka K (2017) Improved jamming resistance using electronically steerable parasitic antenna radiator. 17th IEEE Int Conf Smart Technol EUROCON 2017 - Conf. Proc, pp 6–8
Romdhani I, Qasem M, Al-Dubai AY, Ghaleb B (2016) Cooja simulator manual. Edinburgh Napier University
Weber SG, Martucci LA, Ries S, Mühlhäuser M (2010) Towards trustworthy identity and access management for the future internet. In Proc. 4th International Workshop on Trustworthy Internet of People, Things & Services (IoPTS) (Vol. 29)
Wood AD, Stankovic JA, Zhou G (2011) DEEJAM : Defeating Energy-Efficient Networks. IEEE Sensors J 2(3):60–69
Xu W, Ma K, Trappe W, Zhang Y (2013) Jamming sensor networks: Attack and defense strategies. IEEE Netw 20(3):41–47
Yang X, Xie L, Han J, Wang Z (2017) Cognitive-affective regulation process for micro-expressions based on Gaussian cloud distribution. CAAI Trans Intell Technol 2(1):56–61
Yaqoob I et al (2017) The rise of ransomware and emerging security challenges in the Internet of Things. Comput Netw 129:444–458
Zhang W, Zhu S, Tang J, Xiong N (2018) A novel trust management scheme based on Dempster–Shafer evidence theory for malicious nodes detection in wireless sensor networks. J Supercomput 74(4):1779–1801
Zou Y, Zhu J, Wang X, Hanzo L (2016) A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends. Proc IEEE 104(9):1727–1765
Acknowledgments
The work is supported by Geran Bantuan Khas Penyelidikan (BKS084-2017) and Deanship of Scientific Research at King Saud University through Research Group Project NO. (RG-1435-051).
Author information
Authors and Affiliations
Corresponding authors
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix
Appendix
Rights and permissions
About this article
Cite this article
Fadele, A.A., Othman, M., Hashem, I.A.T. et al. A novel countermeasure technique for reactive jamming attack in internet of things. Multimed Tools Appl 78, 29899–29920 (2019). https://doi.org/10.1007/s11042-018-6684-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-018-6684-z