SlideShare a Scribd company logo
1 of 2
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 09, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 547
Defending Reactive Jammers in WSN using A Trigger Identification
Service
Harshad Shelar1 Jilani Momin2 Sainath Patil3 Kiran Jaybhaye4
1,2,3,4
Department of Computer Engineering
1,2,3,4
D.C.O.E.R Pune, India
Abstract— In the last decade, the greatest threat to the
wireless sensor network has been Reactive Jamming Attack
because it is difficult to be disclosed and defend as well as
due to its mass destruction to legitimate sensor
communications. As discussed above about the Reactive
Jammers Nodes, a new scheme to deactivate them
efficiently is by identifying all trigger nodes, where
transmissions invoke the jammer nodes, which has been
proposed and developed. Due to this identification
mechanism, many existing reactive jamming defending
schemes can be benefited. This Trigger Identification can
also work as an application layer .In this paper, on one side
we provide the several optimization problems to provide
complete trigger identification service framework for
unreliable wireless sensor networks and on the other side we
also provide an improved algorithm with regard to two
sophisticated jamming models, in order to enhance its
robustness for various network scenarios.
Key words: Trigger Identification,, Error Tolerant Non-
adaptive Group Testing, Reactive Jamming, NP Hardness,
Jamming Detection
I. INTRODUCTION
Due to its wide applications in various monitoring systems
and invulnerability, the security of wireless sensor networks
has attracted numerous attentions. The most critical threat to
the WSNs are the jamming attack where the jammer disrupts
the delivery of nearest nodes with interface signal. Due to
the researches on this issue, it can be explained and solved
more efficiently.
In recent years, the most effective measures and
technique against the Reactive Jamming are the Jamming
Detection and Jamming Mitigation. At the same time
various network diversities are investigated to provide
immediate solutions.
Here in this paper, for reactive jammers in wireless
sensor network, we present an application-layer real time
trigger identification, which gives the list of trigger nodes
having lightweight algorithms. The above technique
provides great potential to develop as jamming defending.
This technique of trigger identification is very
exciting due to its hardness and ability to identify the trigger
nodes from the set of the victim nodes that are affected due
to the jamming signals from the reactive jammers.
II. RELATED WORK
In our project our main aim is to find first the affected nodes
by corresponding links PDR and RSS, where these affected
nodes are grouped into multiple testing teams. Then the
group testing schedule is done to identify whether the nodes
are triggered or non-triggered at the base station. Then the
result may be routed or may be sent to the sent to the base
station for jamming.
III. THREE KERNEL TECHNIQUES
In this we have the kernel techniques that we have to resort
to in the protocol. Most damage is done by the reactive
jammers that can do larger damage due to its hardness to
detect and efficient attack. For this we brought up with the
group testing process, i.e. the randomized error tolerant
group testing by means of disjunct matrix and designed
random, which avoids unnecessarily large isolated areas. In
existing solutions, they can handle only the single jammer
case due to the lack of knowledge of the range of the
jammer and inevitable overlapping of the jammed areas
bring up the analytical difficulties. So keeping this in mind
we resort the two another techniques as a minimum disk
cover problem in within simple polygon problem and a
clique independent set problem.
To speed up the identification of blood samples
from a large sample population the method of group testing
was proposed. This testing has helped various fields such as
medical testing and medical biology in the recent decades.
IV. TRIGGER IDENTIFICATION PROCEDURE
In this procedure, the time complexity as well as the
transmission overhead is low and it is lightweight so that all
calculations occur at base station. No external hardware are
required. Only the status report messages sent by sensor and
the geographic locations of all sensors are maintained at the
base stations.
The main steps in this procedure are as follows:
1) Jammer Property Estimation- In this base station
calculates the jamming range and the estimated
jammed area based on the boundary locations.
2) Trigger Detection-In this the a short testing
schedule where the broadcast nodes will be
receiving the messages from the base stations.
Then the boundary nodes keep broadcasting to the
entire node including the victim nodes which will
be receiving the messages within the estimated
jammed area for a period T. Then the victim nodes
execute the short testing procedure based on the
messages and a global uniform clock identify
themselves as trigger or non-trigger.
3) Anomaly Detection-In this the potential of the
reactive jamming attack is detect by the base
station, where each boundary node tries to report
their identities to the base station.
Defending Reactive Jammers in WSN using A Trigger Identification Service
(IJSRD/Vol. 2/Issue 09/2014/123)
All rights reserved by www.ijsrd.com 548
Fig: System Architecture
V. CONCLUSION
In this paper we have solved the jamming problem more
efficiently. The only point that left of the jammers was the
jammer mobility. The latency of the identifying the node
was not fast hence it would not have been efficient with the
nodes with the higher speed. One of the main leftover of the
system was the application of the service. The routing of the
jammers and the localizations of the jammers are promising
but still it needs to be developed for the real time
requirement.
As studied for identifying the trigger identification
service framework, we studied different techniques,
procedures as well as executed various algorithms which
include the clique identifying problem, randomized error
tolerant group testing and minimum disk cover for simple
polygon. The efficiency of this framework has been
determined in both by theoretically and through various
models which attack on the service under network settings.
With many possible applications these frameworks consist
of huge potential to detect the trigger nodes and also need
the further studies.
REFERENCES
[1] M. Strasser, B. Danev, and S. Capkun. “Detection
of reactive jamming in sensor networks.” ETH
Zurich D-INFK Technical Report, August 2009.
[2] H. Wang, J. Guo, and Z. Wang. “Feasibility
assessment of repeater jamming technique for
dsss.” WCNC2007. IEEE, pages 2322–2327,
March 2007.
[3] H. Liu, W. Xu, Y. Chen, Z. Liu, “Localizing
Jammers in Wireless Networks”, PWN 2009.
[4] Z. Liu, H. Liu, W. Xu, Y. Chen, “Wireless
Jamming Localization by Exploiting Nodes’
Hearing Ranges”, DCOSS 2010.
[5] Y. Xuan, Y. Shen, Nam P. Nguyen and My T.
Thai” Trigger Identification Service for Defending
Reactive Jammers in WSN.” MAY 2012.

More Related Content

What's hot

Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Sigma web solutions pvt. ltd.
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
Kapil Dev
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
Elham Hormozi
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
eSAT Publishing House
 

What's hot (20)

Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
 
Cut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor NetworkCut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor Network
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
 
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
 
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKNOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
Fault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor NetworkFault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor Network
 
C0511318
C0511318C0511318
C0511318
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless network
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
 

Similar to Defending Reactive Jammers in WSN using a Trigger Identification Service.

Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
ijtsrd
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
Editor IJARCET
 

Similar to Defending Reactive Jammers in WSN using a Trigger Identification Service. (20)

Dd4301605614
Dd4301605614Dd4301605614
Dd4301605614
 
IRJET- A Survey on Swarm Optimization Technique in Wireless Sensor Network
IRJET- A Survey on Swarm Optimization Technique in Wireless Sensor NetworkIRJET- A Survey on Swarm Optimization Technique in Wireless Sensor Network
IRJET- A Survey on Swarm Optimization Technique in Wireless Sensor Network
 
Research Challenges and Characteristic Features in Wireless Sensor Networks
Research Challenges and Characteristic Features in Wireless Sensor NetworksResearch Challenges and Characteristic Features in Wireless Sensor Networks
Research Challenges and Characteristic Features in Wireless Sensor Networks
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor Network
 
Deep Learning Fault Detection Algorithms in WSNs
Deep Learning Fault Detection Algorithms in WSNsDeep Learning Fault Detection Algorithms in WSNs
Deep Learning Fault Detection Algorithms in WSNs
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
 
A self-managing fault management mechanism for wireless sensor networks
A self-managing fault management mechanism for wireless sensor networks A self-managing fault management mechanism for wireless sensor networks
A self-managing fault management mechanism for wireless sensor networks
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
 
Sensors Scheduling in Wireless Sensor Networks: An Assessment
Sensors Scheduling in Wireless Sensor Networks: An AssessmentSensors Scheduling in Wireless Sensor Networks: An Assessment
Sensors Scheduling in Wireless Sensor Networks: An Assessment
 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
G0261041046
G0261041046G0261041046
G0261041046
 
G0261041046
G0261041046G0261041046
G0261041046
 
F33022028
F33022028F33022028
F33022028
 
F33022028
F33022028F33022028
F33022028
 
Achieving Real-Time Target Tracking Using Wireless Sensor Networks1
Achieving Real-Time Target Tracking Using Wireless Sensor Networks1Achieving Real-Time Target Tracking Using Wireless Sensor Networks1
Achieving Real-Time Target Tracking Using Wireless Sensor Networks1
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
 

More from ijsrd.com

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATIONDESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
heathfieldcps1
 

Recently uploaded (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 

Defending Reactive Jammers in WSN using a Trigger Identification Service.

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 09, 2014 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 547 Defending Reactive Jammers in WSN using A Trigger Identification Service Harshad Shelar1 Jilani Momin2 Sainath Patil3 Kiran Jaybhaye4 1,2,3,4 Department of Computer Engineering 1,2,3,4 D.C.O.E.R Pune, India Abstract— In the last decade, the greatest threat to the wireless sensor network has been Reactive Jamming Attack because it is difficult to be disclosed and defend as well as due to its mass destruction to legitimate sensor communications. As discussed above about the Reactive Jammers Nodes, a new scheme to deactivate them efficiently is by identifying all trigger nodes, where transmissions invoke the jammer nodes, which has been proposed and developed. Due to this identification mechanism, many existing reactive jamming defending schemes can be benefited. This Trigger Identification can also work as an application layer .In this paper, on one side we provide the several optimization problems to provide complete trigger identification service framework for unreliable wireless sensor networks and on the other side we also provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios. Key words: Trigger Identification,, Error Tolerant Non- adaptive Group Testing, Reactive Jamming, NP Hardness, Jamming Detection I. INTRODUCTION Due to its wide applications in various monitoring systems and invulnerability, the security of wireless sensor networks has attracted numerous attentions. The most critical threat to the WSNs are the jamming attack where the jammer disrupts the delivery of nearest nodes with interface signal. Due to the researches on this issue, it can be explained and solved more efficiently. In recent years, the most effective measures and technique against the Reactive Jamming are the Jamming Detection and Jamming Mitigation. At the same time various network diversities are investigated to provide immediate solutions. Here in this paper, for reactive jammers in wireless sensor network, we present an application-layer real time trigger identification, which gives the list of trigger nodes having lightweight algorithms. The above technique provides great potential to develop as jamming defending. This technique of trigger identification is very exciting due to its hardness and ability to identify the trigger nodes from the set of the victim nodes that are affected due to the jamming signals from the reactive jammers. II. RELATED WORK In our project our main aim is to find first the affected nodes by corresponding links PDR and RSS, where these affected nodes are grouped into multiple testing teams. Then the group testing schedule is done to identify whether the nodes are triggered or non-triggered at the base station. Then the result may be routed or may be sent to the sent to the base station for jamming. III. THREE KERNEL TECHNIQUES In this we have the kernel techniques that we have to resort to in the protocol. Most damage is done by the reactive jammers that can do larger damage due to its hardness to detect and efficient attack. For this we brought up with the group testing process, i.e. the randomized error tolerant group testing by means of disjunct matrix and designed random, which avoids unnecessarily large isolated areas. In existing solutions, they can handle only the single jammer case due to the lack of knowledge of the range of the jammer and inevitable overlapping of the jammed areas bring up the analytical difficulties. So keeping this in mind we resort the two another techniques as a minimum disk cover problem in within simple polygon problem and a clique independent set problem. To speed up the identification of blood samples from a large sample population the method of group testing was proposed. This testing has helped various fields such as medical testing and medical biology in the recent decades. IV. TRIGGER IDENTIFICATION PROCEDURE In this procedure, the time complexity as well as the transmission overhead is low and it is lightweight so that all calculations occur at base station. No external hardware are required. Only the status report messages sent by sensor and the geographic locations of all sensors are maintained at the base stations. The main steps in this procedure are as follows: 1) Jammer Property Estimation- In this base station calculates the jamming range and the estimated jammed area based on the boundary locations. 2) Trigger Detection-In this the a short testing schedule where the broadcast nodes will be receiving the messages from the base stations. Then the boundary nodes keep broadcasting to the entire node including the victim nodes which will be receiving the messages within the estimated jammed area for a period T. Then the victim nodes execute the short testing procedure based on the messages and a global uniform clock identify themselves as trigger or non-trigger. 3) Anomaly Detection-In this the potential of the reactive jamming attack is detect by the base station, where each boundary node tries to report their identities to the base station.
  • 2. Defending Reactive Jammers in WSN using A Trigger Identification Service (IJSRD/Vol. 2/Issue 09/2014/123) All rights reserved by www.ijsrd.com 548 Fig: System Architecture V. CONCLUSION In this paper we have solved the jamming problem more efficiently. The only point that left of the jammers was the jammer mobility. The latency of the identifying the node was not fast hence it would not have been efficient with the nodes with the higher speed. One of the main leftover of the system was the application of the service. The routing of the jammers and the localizations of the jammers are promising but still it needs to be developed for the real time requirement. As studied for identifying the trigger identification service framework, we studied different techniques, procedures as well as executed various algorithms which include the clique identifying problem, randomized error tolerant group testing and minimum disk cover for simple polygon. The efficiency of this framework has been determined in both by theoretically and through various models which attack on the service under network settings. With many possible applications these frameworks consist of huge potential to detect the trigger nodes and also need the further studies. REFERENCES [1] M. Strasser, B. Danev, and S. Capkun. “Detection of reactive jamming in sensor networks.” ETH Zurich D-INFK Technical Report, August 2009. [2] H. Wang, J. Guo, and Z. Wang. “Feasibility assessment of repeater jamming technique for dsss.” WCNC2007. IEEE, pages 2322–2327, March 2007. [3] H. Liu, W. Xu, Y. Chen, Z. Liu, “Localizing Jammers in Wireless Networks”, PWN 2009. [4] Z. Liu, H. Liu, W. Xu, Y. Chen, “Wireless Jamming Localization by Exploiting Nodes’ Hearing Ranges”, DCOSS 2010. [5] Y. Xuan, Y. Shen, Nam P. Nguyen and My T. Thai” Trigger Identification Service for Defending Reactive Jammers in WSN.” MAY 2012.