Next Article in Journal
Stochastic Integration H Filter for Rapid Transfer Alignment of INS
Previous Article in Journal
Assessing Crop Coefficients for Natural Vegetated Areas Using Satellite Data and Eddy Covariance Stations
Article Menu
Issue 11 (November) cover image

Export Article

Open AccessArticle
Sensors 2017, 17(11), 2667; https://doi.org/10.3390/s17112667

Random Access Performance of Distributed Sensors Attacked by Unknown Jammers

1
Department of Electronics and Communication Engineering, Hanyang University, Ansan 15588, Korea
2
Research Institute of Engineering and Technology, Hanyang University, Ansan 15588, Korea
3
Division of Electrical Engineering, Hanyang University, Ansan 15588, Korea
*
Author to whom correspondence should be addressed.
Received: 3 October 2017 / Revised: 13 November 2017 / Accepted: 13 November 2017 / Published: 18 November 2017
(This article belongs to the Section Sensor Networks)
View Full-Text   |   Download PDF [520 KB, uploaded 21 November 2017]   |  

Abstract

In this paper, we model and investigate the random access (RA) performance of sensor nodes (SN) in a wireless sensor network (WSN). In the WSN, a central head sensor (HS) collects the information from distributed SNs, and jammers disturb the information transmission primarily by generating interference. In this paper, two jamming attacks are considered: power and code jamming. Power jammers (if they are friendly jammers) generate noises and, as a result, degrade the quality of the signal from SNs. Power jamming is equally harmful to all the SNs that are accessing HS and simply induces denial of service (DoS) without any need to hack HS or SNs. On the other hand, code jammers mimic legitimate SNs by sending fake signals and thus need to know certain system parameters that are used by the legitimate SNs. As a result of code jamming, HS falsely allocates radio resources to SNs. The code jamming hence increases the failure probability in sending the information messages, as well as misleads the usage of radio resources. In this paper, we present the probabilities of successful preamble transmission with power ramping according to the jammer types and provide the resulting throughput and delay of information transmission by SNs, respectively. The effect of two jamming attacks on the RA performances is compared with numerical investigation. The results show that, compared to RA without jammers, power and code jamming degrade the throughput by up to 30.3% and 40.5%, respectively, while the delay performance by up to 40.1% and 65.6%, respectively. View Full-Text
Keywords: wireless sensor networks; random access channel (RACH); power jamming; code jamming wireless sensor networks; random access channel (RACH); power jamming; code jamming
Figures

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Jeong, D.-K.; Wui, J.-H.; Kim, D. Random Access Performance of Distributed Sensors Attacked by Unknown Jammers. Sensors 2017, 17, 2667.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top