TDSJ-IoT: Trivial Data Transmission to Sustain Energy From Reactive Jamming Attack in IoT

TDSJ-IoT: Trivial Data Transmission to Sustain Energy From Reactive Jamming Attack in IoT

Ambika N.
Copyright: © 2021 |Pages: 13
DOI: 10.4018/978-1-7998-3479-3.ch038
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Internet of things aids in providing a common platform for the devices of different caliber and platform to communicate with each other. These devices complete their doings with minimum human intervention. As continuous supervision is eliminated in this technology, the devices are liable to different kinds of attacks. Jamming attacks is one kind of attack in the IoT arena. The proposed work aims in minimizing reactive attacks in the environment. The work considers bringing up the reliability to the communication by 4%, the effectiveness is increased by 7.6%, and energy is minimized by 6.3% compared with the previous work.
Chapter Preview
Top

Introduction

Internet-of-things (Stankovic, 2014) is a combination of sensor technology with Radio Frequency Identification Device (RFID) (Jia, 2012) (Fan, Gong, Du, Li, & Yang, 2015), Geological Information System (GIS) (Liu, 2014) (Lopez, Lopez, Prieto, & Quinde, 2017) and Global positioning system (GPS) (Kumar, 2017) (Mala, Thushara, & Subbiah, 2017) (Jisha, Jyothindranath, & Kumary, 2017). The devices communicate with each other using integrated technology. The integration has aided to improve the quality of one’s life minimizing human efforts. The technology consisting of a variety of devices aims to think, hear which aid in their doings and share information with each other. Four components are used to do the same. Sensing, heterogeneous access, information processing, applications, and services come together to bring the technology into play. The devices using the underlying technology turn the doings to become smarter. The applications include transportation (Melis, 2016) (Masek, et al., 2016), agriculture (Mat, 2016) (Popović, 2017), industry automation (Shrouf, 2014), emergency response (Yang, 2013) (Rathore, 2016) and healthcare (Muhammad, 2017) (Mano, 2016). Security (Andrea, 2015) and privacy components can be added to make the technology better.

Security in these devices is one of the prior issues to be considered as these devices will not be under continuous supervision. Hence the devices are liable to different kinds of attacks. Jamming attack (Alaba, 2017) (Kasinathan, 2013) is one such attack where the packets dispatched to the destination is hindered to reach the same. This leads to loss of packets and rarely the packets may reach the destination improperly. Many kinds of jammers are available. This includes basic jammers – reactive jammers, constant jammers, deceptive jammers, and random jammers. The second category of jammers namely intelligent jammers is of two kinds - statistical jammers and protocol-aware jammers. Each jammer has different characteristics and is active on different layers of the network. The descriptions of them are narrated in section 2.

The proposed work minimizes reactive jamming attack (Grover, 2014) (Babar, 2013) in the network. The work adopts some precautions to be taken to identify the adversaries before in hand. The methodology used will be able to detect the intruder earlier in the stage. Three kinds of precautions are taken in the proposed work. First, the devices are to sense the channel before commencing communication with any other device. They will be in continuous vigilance monitoring their surroundings. Second, to find the appropriate route, the device broadcasts sample bits addressing the receiving device. The reactive adversary sensing the packets are liable to transmit its packets. Hence the packets of the legitimate source will not reach the desired destination or will take a lot of time to reach its destination. The receiver affixes the time and path from which the packet it has received. Using this information the further communication path is set. As the device is continuously sensing the channel it will be able to figure out jammers to some extent. Third, every device dispatching the packets will be equipped with device-id. Using the device-id, a hash code is derived which uniquely identifies the device. The hash code is prefixed to the transmitted packets. The receivers analyze the prefixed code along with signal strength and continuous with the communication if found legitimate. Using these steps reliability to the communication is increased by 4%, the effectiveness is increased by 7.6% and energy is minimized by 6.3% compared with the previous work.

The work is divided into eight sections. The introduction to the work is provided in section 1. Different kinds of jamming attacks are detailed in section 2 and Literature survey is explained in section 3. Section 4 contains the detailing of the proposed work. The details of the simulation are done in NS2 is provided in section 5 and the analysis of the same is provided in section 6. Section 7 details the future work to be taken. The work is concluded in section 8.

Key Terms in this Chapter

Internet of Things: The Internet of Things shortly known as IoT is a system of interrelated computing devices. The objects of interest are provisioned with unique identifications. This facility aids in transfer data over a network without human-to-computer interaction.

Reactive Jamming Attack: This kind of jammer is effective in MAC layer. The adversary emits radio signal on detecting any activity in the channel. These jammers keep the channel busy.

Hash Code: Hash code is a numeric value generated that helps in identifying the object.

Complete Chapter List

Search this Book:
Reset