A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology | SpringerLink
Skip to main content

A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology

  • Conference paper
Cyberspace Safety and Security (CSS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8300))

Included in the following conference series:

Abstract

The wireless mesh network is vulnerable to jamming attacks due to open share of physical medium. Since such attacks induce severe interferences resulting in denial of regular service, highly efficient detection and restoration methods are vital for a secure wireless mesh network. On the other hand, artificial immune mechanisms originated from the immunology are considerable methods to inspire design of an detection and restoration system. In this paper, we propose an immunological anti-jamming method as per the adaptive immune system of human beings to defeat the reactive jamming. The proposed method consists three function modules, i.e., the monitoring agent for monitoring the packet reception, the decision agent for detecting attacks and the recovery agent for restoring the network from the ongoing attacks. Simulation results show that the proposed method is effective to defeat the reactive jamming and to maintain considerable performance of the overall network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 5719
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 7149
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Atakan, B., Akan, O.B., Tugcu, T.: Bio-inspired communications in wireless sensor networks. In: Guide to Wireless Sensor Networks. Computer Communications and Networks, pp. 659–685. Springer, London (2009)

    Chapter  Google Scholar 

  2. Broustis, I., Pelechrinis, K., Syrivelis, D., Krishnamurthy, S.V., Tassiulas, L.: A software framework for alleviating the effects of mac-aware jamming attacks in wireless access networks. Wireless Networks 17(6), 1543–1560 (2011)

    Article  Google Scholar 

  3. Eltahir, I.K.: The impact of different radio propagation models for mobile ad hoc networks (manet) in urban area environment. In: 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, AusWireless 2007 (2007)

    Google Scholar 

  4. Hamieh, A., Ben-Othman, J.: Detection of jamming attacks in wireless ad hoc networks using error distribution. In: 2009 IEEE International Conference on Communications (ICC 2009), pp. 1–6 (2009)

    Google Scholar 

  5. Hofmeyr, S.A.: An Interpretative Introduction to the Immune System. In: Design Principles for the Immune System and Other Distributed Autonomous Systems. Oxford University Press, USA (2001)

    Google Scholar 

  6. Jiang, S., Xue, Y.: Providing survivability against jamming attack for multi-radio multi-channel wireless mesh networks. Journal of Network and Computer Applications 34(2), 443–454 (2011)

    Article  Google Scholar 

  7. Kirachaiwanich, D., Liang, Q.: The combined-jamming model for ieee 802.11 fh/mfsk networks. European Transactions on Telecommunications 22(1), 14–24 (2011)

    Article  Google Scholar 

  8. Li, M., Koutsopoulos, I., Poovendran, R.: Optimal jamming attack strategies and network defense policies in wireless sensor networks. IEEE Transactions on Mobile Computing 9(8), 1119–1133 (2010)

    Article  Google Scholar 

  9. Lin, Y., Li, M.: Distributed detection of jamming and defense in wireless sensor networks. In: 43rd Annual Conference on Information Sciences and Systems (CISS 2009), pp. 829–834 (March 2009)

    Google Scholar 

  10. Lin, Z., van der Schaar, M.: Mac layer jamming mitigation using a game augmented by intervention. EURASIP Journal on Wireless Communications and Networking 2010, 78:1–78:14 (April 2010)

    Google Scholar 

  11. Liu, Q., Yin, J., Jokar, P., Hu, X.: Enhanced detection and restoration of low-rate denial-of-service in wireless multi-hop networks. In: 2013 International Conference on Computing, Networking and Communications (ICNC 2013), pp. 195–199 (2013)

    Google Scholar 

  12. Pelechrinis, K., Broustis, I., Krishnamurthy, S.V., Gkantsidis, C.: A measurement-driven anti-jamming system for 802.11 networks. IEEE/ACM Transactions on Networking 19(4), 1208–1222 (2011)

    Article  Google Scholar 

  13. Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (aodv) routing (2003)

    Google Scholar 

  14. Richa, A., Scheideler, C., Schmid, S., Zhang, J.: A jamming-resistant mac protocol for multi-hop wireless networks. In: Lynch, N.A., Shvartsman, A.A. (eds.) DISC 2010. LNCS, vol. 6343, pp. 179–193. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  15. Siddhabathula, K., Dong, Q., Liu, D., Wright, M.: Fast jamming detection in sensor networks. In: IEEE International Conference on Communications (ICC 2012), pp. 934–938 (2012)

    Google Scholar 

  16. Strasser, M., Danev, B., Čapkun, S.: Detection of reactive jamming in sensor networks. ACM Transactions on Sensor Networks 7(2), 16:1–16:29 (2010)

    Google Scholar 

  17. Thamilarasu, G., Sridhar, R.: Game theoretic modeling of jamming attacks in ad hoc networks. In: 18th International Conference on Computer Communications and Networks (ICCCN 2009), pp. 1–6 (2009)

    Google Scholar 

  18. Wood, A.D., Stankovic, J.A., Zhou, G.: Deejam: Defeating energy-efficient jamming in ieee 802.15.4-based wireless networks. In: 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2007), pp. 60–69 (June 2007)

    Google Scholar 

  19. Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attacks in wireless networks. In: 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2005), pp. 46–57. ACM, New York (2005)

    Chapter  Google Scholar 

  20. Yi, P., Wu, Y., Chen, J.: Towards an artificial immune system for detecting anomalies in wireless mesh networks. China Communications 8(3), 107–117 (2011)

    Google Scholar 

  21. Zdarsky, F.A., Robitzsch, S., Banchs, A.: Security analysis of wireless mesh backhauls for mobile networks. Journal of Network and Computer Applications 34(2), 432–442 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this paper

Cite this paper

Liu, Q., Yin, J., Yu, S. (2013). A Bio-inspired Jamming Detection and Restoration for WMNs: In View of Adaptive Immunology. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds) Cyberspace Safety and Security. CSS 2013. Lecture Notes in Computer Science, vol 8300. Springer, Cham. https://doi.org/10.1007/978-3-319-03584-0_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-03584-0_18

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-03583-3

  • Online ISBN: 978-3-319-03584-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics