无线传感器网络中时延敏感应用的抗干扰数据转发方案

Amrita Ghosal, Subir Halder, Md. Mobashir, Rajesh K. Saraogi, S. DasBit
{"title":"无线传感器网络中时延敏感应用的抗干扰数据转发方案","authors":"Amrita Ghosal, Subir Halder, Md. Mobashir, Rajesh K. Saraogi, S. DasBit","doi":"10.1109/WIRELESSVITAE.2011.5940919","DOIUrl":null,"url":null,"abstract":"Wireless sensor network (WSN) has emerged as an important application area where nodes are generally placed in an unattended environment and therefore are vulnerable to attack by adversaries. Moreover in real time application domains delay even by fraction of a second may deceive the purpose of the application. Therefore, designing an attack-defending scheme for WSN without involving any additional delay in data-forwarding is an important challenge in this domain. The present work proposes a data-forwarding scheme having no additional delay to defend jamming attack in WSN. The scheme considers a multilayer architecture where the layers are made up of hexagonal cells each containing sensor nodes in the form of clusters. The nodes are randomly deployed throughout the network and clusters are formed so that every cell hosts two sets of clusters operating in two different predefined frequencies. We have provided design guideline to determine cell size in terms of network parameters. This guideline ensures that for a cluster head there is at least another cluster head at one-hop distance towards the sink and thereby ensures data-forwarding in shortest path. During data-forwarding, if a frequency is jammed, the cluster operating in that frequency becomes inoperative and the other cluster acts as back-up. We claim that the scheme defends jamming attack without incurring any additional delay and the claim is substantiated through simulation.","PeriodicalId":68078,"journal":{"name":"无线互联科技","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2011-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"A jamming defending data-forwarding scheme for delay sensitive applications in WSN\",\"authors\":\"Amrita Ghosal, Subir Halder, Md. Mobashir, Rajesh K. Saraogi, S. DasBit\",\"doi\":\"10.1109/WIRELESSVITAE.2011.5940919\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless sensor network (WSN) has emerged as an important application area where nodes are generally placed in an unattended environment and therefore are vulnerable to attack by adversaries. Moreover in real time application domains delay even by fraction of a second may deceive the purpose of the application. Therefore, designing an attack-defending scheme for WSN without involving any additional delay in data-forwarding is an important challenge in this domain. The present work proposes a data-forwarding scheme having no additional delay to defend jamming attack in WSN. The scheme considers a multilayer architecture where the layers are made up of hexagonal cells each containing sensor nodes in the form of clusters. The nodes are randomly deployed throughout the network and clusters are formed so that every cell hosts two sets of clusters operating in two different predefined frequencies. We have provided design guideline to determine cell size in terms of network parameters. This guideline ensures that for a cluster head there is at least another cluster head at one-hop distance towards the sink and thereby ensures data-forwarding in shortest path. During data-forwarding, if a frequency is jammed, the cluster operating in that frequency becomes inoperative and the other cluster acts as back-up. We claim that the scheme defends jamming attack without incurring any additional delay and the claim is substantiated through simulation.\",\"PeriodicalId\":68078,\"journal\":{\"name\":\"无线互联科技\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-07-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"无线互联科技\",\"FirstCategoryId\":\"1093\",\"ListUrlMain\":\"https://doi.org/10.1109/WIRELESSVITAE.2011.5940919\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"无线互联科技","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.1109/WIRELESSVITAE.2011.5940919","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

摘要

无线传感器网络(WSN)已成为一个重要的应用领域,其节点通常放置在无人值守的环境中,因此容易受到攻击者的攻击。此外,在实时应用程序领域中,即使是几分之一秒的延迟也可能欺骗应用程序的目的。因此,设计一种不增加数据转发延迟的WSN攻击防御方案是该领域的一个重要挑战。针对无线传感器网络中的干扰攻击,提出了一种无附加延迟的数据转发方案。该方案考虑了多层体系结构,其中层由六边形单元组成,每个单元以簇的形式包含传感器节点。节点在整个网络中随机部署,并形成集群,以便每个单元承载两组以两种不同的预定义频率运行的集群。我们提供了根据网络参数确定单元大小的设计指南。该准则确保对于一个簇头来说,至少有另一个簇头在与汇聚的一跳距离上,从而确保数据在最短路径上转发。在数据转发过程中,如果某个频率被阻塞,在该频率上运行的集群将失效,而另一个集群将充当备份。我们声称该方案在不产生任何额外延迟的情况下防御了干扰攻击,并通过仿真证实了这一说法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A jamming defending data-forwarding scheme for delay sensitive applications in WSN
Wireless sensor network (WSN) has emerged as an important application area where nodes are generally placed in an unattended environment and therefore are vulnerable to attack by adversaries. Moreover in real time application domains delay even by fraction of a second may deceive the purpose of the application. Therefore, designing an attack-defending scheme for WSN without involving any additional delay in data-forwarding is an important challenge in this domain. The present work proposes a data-forwarding scheme having no additional delay to defend jamming attack in WSN. The scheme considers a multilayer architecture where the layers are made up of hexagonal cells each containing sensor nodes in the form of clusters. The nodes are randomly deployed throughout the network and clusters are formed so that every cell hosts two sets of clusters operating in two different predefined frequencies. We have provided design guideline to determine cell size in terms of network parameters. This guideline ensures that for a cluster head there is at least another cluster head at one-hop distance towards the sink and thereby ensures data-forwarding in shortest path. During data-forwarding, if a frequency is jammed, the cluster operating in that frequency becomes inoperative and the other cluster acts as back-up. We claim that the scheme defends jamming attack without incurring any additional delay and the claim is substantiated through simulation.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
19945
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信