Abstract
The wireless mesh network is vulnerable to jamming attacks due to open share of physical medium. Since such attacks induce severe interferences resulting in denial of regular service, highly efficient detection and restoration methods are vital for a secure wireless mesh network. On the other hand, artificial immune mechanisms originated from the immunology are considerable methods to inspire design of an detection and restoration system. In this paper, we propose an immunological anti-jamming method as per the adaptive immune system of human beings to defeat the reactive jamming. The proposed method consists three function modules, i.e., the monitoring agent for monitoring the packet reception, the decision agent for detecting attacks and the recovery agent for restoring the network from the ongoing attacks. Simulation results show that the proposed method is effective to defeat the reactive jamming and to maintain considerable performance of the overall network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Atakan, B., Akan, O.B., Tugcu, T.: Bio-inspired communications in wireless sensor networks. In: Guide to Wireless Sensor Networks. Computer Communications and Networks, pp. 659–685. Springer, London (2009)
Broustis, I., Pelechrinis, K., Syrivelis, D., Krishnamurthy, S.V., Tassiulas, L.: A software framework for alleviating the effects of mac-aware jamming attacks in wireless access networks. Wireless Networks 17(6), 1543–1560 (2011)
Eltahir, I.K.: The impact of different radio propagation models for mobile ad hoc networks (manet) in urban area environment. In: 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, AusWireless 2007 (2007)
Hamieh, A., Ben-Othman, J.: Detection of jamming attacks in wireless ad hoc networks using error distribution. In: 2009 IEEE International Conference on Communications (ICC 2009), pp. 1–6 (2009)
Hofmeyr, S.A.: An Interpretative Introduction to the Immune System. In: Design Principles for the Immune System and Other Distributed Autonomous Systems. Oxford University Press, USA (2001)
Jiang, S., Xue, Y.: Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks. Journal of Network and Computer Applications 34(2), 443–454 (2011)
Kirachaiwanich, D., Liang, Q.: The combined-jamming model for ieee 802.11 fh/mfsk networks. European Transactions on Telecommunications 22(1), 14–24 (2011)
Li, M., Koutsopoulos, I., Poovendran, R.: Optimal jamming attack strategies and network defense policies in wireless sensor networks. IEEE Transactions on Mobile Computing 9(8), 1119–1133 (2010)
Lin, Y., Li, M.: Distributed detection of jamming and defense in wireless sensor networks. In: 43rd Annual Conference on Information Sciences and Systems (CISS 2009), pp. 829–834 (March 2009)
Lin, Z., van der Schaar, M.: Mac layer jamming mitigation using a game augmented by intervention. EURASIP Journal on Wireless Communications and Networking 2010, 78:1–78:14 (April 2010)
Liu, Q., Yin, J., Jokar, P., Hu, X.: Enhanced detection and restoration of low-rate denial-of-service in wireless multi-hop networks. In: 2013 International Conference on Computing, Networking and Communications (ICNC 2013), pp. 195–199 (2013)
Pelechrinis, K., Broustis, I., Krishnamurthy, S.V., Gkantsidis, C.: A measurement-driven anti-jamming system for 802.11 networks. IEEE/ACM Transactions on Networking 19(4), 1208–1222 (2011)
Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (aodv) routing (2003)
Richa, A., Scheideler, C., Schmid, S., Zhang, J.: A jamming-resistant mac protocol for multi-hop wireless networks. In: Lynch, N.A., Shvartsman, A.A. (eds.) DISC 2010. LNCS, vol. 6343, pp. 179–193. Springer, Heidelberg (2010)
Siddhabathula, K., Dong, Q., Liu, D., Wright, M.: Fast jamming detection in sensor networks. In: IEEE International Conference on Communications (ICC 2012), pp. 934–938 (2012)
Strasser, M., Danev, B., Čapkun, S.: Detection of reactive jamming in sensor networks. ACM Transactions on Sensor Networks 7(2), 16:1–16:29 (2010)
Thamilarasu, G., Sridhar, R.: Game theoretic modeling of jamming attacks in ad hoc networks. In: 18th International Conference on Computer Communications and Networks (ICCCN 2009), pp. 1–6 (2009)
Wood, A.D., Stankovic, J.A., Zhou, G.: Deejam: Defeating energy-efficient jamming in ieee 802.15.4-based wireless networks. In: 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2007), pp. 60–69 (June 2007)
Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2005), pp. 46–57. ACM, New York (2005)
Yi, P., Wu, Y., Chen, J.: Towards an artificial immune system for detecting anomalies in wireless mesh networks. China Communications 8(3), 107–117 (2011)
Zdarsky, F.A., Robitzsch, S., Banchs, A.: Security analysis of wireless mesh backhauls for mobile networks. Journal of Network and Computer Applications 34(2), 432–442 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer International Publishing Switzerland
About this paper
Cite this paper
Liu, Q., Yin, J., Yu, S. (2013). A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds) Cyberspace Safety and Security. CSS 2013. Lecture Notes in Computer Science, vol 8300. Springer, Cham. https://doi.org/10.1007/978-3-319-03584-0_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-03584-0_18
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-03583-3
Online ISBN: 978-3-319-03584-0
eBook Packages: Computer ScienceComputer Science (R0)