Next Article in Journal
Stochastic Integration H Filter for Rapid Transfer Alignment of INS
Previous Article in Journal
Assessing Crop Coefficients for Natural Vegetated Areas Using Satellite Data and Eddy Covariance Stations
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Random Access Performance of Distributed Sensors Attacked by Unknown Jammers

1
Department of Electronics and Communication Engineering, Hanyang University, Ansan 15588, Korea
2
Research Institute of Engineering and Technology, Hanyang University, Ansan 15588, Korea
3
Division of Electrical Engineering, Hanyang University, Ansan 15588, Korea
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(11), 2667; https://doi.org/10.3390/s17112667
Submission received: 3 October 2017 / Revised: 13 November 2017 / Accepted: 13 November 2017 / Published: 18 November 2017
(This article belongs to the Section Sensor Networks)

Abstract

:
In this paper, we model and investigate the random access (RA) performance of sensor nodes (SN) in a wireless sensor network (WSN). In the WSN, a central head sensor (HS) collects the information from distributed SNs, and jammers disturb the information transmission primarily by generating interference. In this paper, two jamming attacks are considered: power and code jamming. Power jammers (if they are friendly jammers) generate noises and, as a result, degrade the quality of the signal from SNs. Power jamming is equally harmful to all the SNs that are accessing HS and simply induces denial of service (DoS) without any need to hack HS or SNs. On the other hand, code jammers mimic legitimate SNs by sending fake signals and thus need to know certain system parameters that are used by the legitimate SNs. As a result of code jamming, HS falsely allocates radio resources to SNs. The code jamming hence increases the failure probability in sending the information messages, as well as misleads the usage of radio resources. In this paper, we present the probabilities of successful preamble transmission with power ramping according to the jammer types and provide the resulting throughput and delay of information transmission by SNs, respectively. The effect of two jamming attacks on the RA performances is compared with numerical investigation. The results show that, compared to RA without jammers, power and code jamming degrade the throughput by up to 30.3% and 40.5%, respectively, while the delay performance by up to 40.1% and 65.6%, respectively.

1. Introduction

With the development of a wide range of intelligent and tiny wireless sensing devices, wireless sensor networks (WSNs) are being used for many applications in the fields of medical, industry, defense, smart homes, etc. In addition to these applications, WSNs currently drive Internet of Things (IoT) and machine-to-machine communications. WSNs consist of numerous sensor nodes (SNs) that are usually interconnected through radio frequency (RF) communication links.
Since the signal quality on a wireless medium such as RF easily degrades by unwanted interference, WSNs are vulnerable to malfunctioning SNs. In WSNs, attackers can create malicious SNs that can disrupt desired wireless transmission by generating interference and noise [1,2], which is so-called jamming [3]. Jamming attacks severely degrade the performance of WSNs, to a large extent, in energy consumption, throughput and delay.
Jamming attacks may be viewed as a special case of denial of service (DoS) attacks, which prevent or inhibit the normal use or management of communications through flooding a network with useless information using RF signals [4]. In [5], various techniques for detecting the presence of jamming attacks in WSNs are explored. In [6], jamming attacks and network defense policies are modeled together in order to capture the effect of knowledge available at each side. For LTE systems, jamming is also regarded as a major attack that causes significant DoS [7,8]. While most works have focused on the physical-layer aspects of jamming attacks, reference [9] evaluates the resilience of WSNs to jamming attacks in the aspect of the routing protocol.
On the other hand, jamming is also used to prevent eavesdroppers (Eves) from snooping legitimate communications, which is often called friendly jamming [10,11,12] or cooperative jamming [13,14]. The works in [10,12] investigate system-level issues of introducing friendly jammers. However, most works regarding cooperative jamming are in the direction of recently developing physical-layer security. In [13], multi-antenna jammers use null-space artificial noise (AN) that increases interference of Eves, but is avoided by the legitimate user, for which the right knowledge of the channel between the jammer and the Eves is essential. In [14], the cooperative jammers harvest energy transmitted by a source and use it to generate AN to jam the Eves in cognitive IoT networks, in which an auction framework that formulates the jammer selection and the power allocation together is also provided.
In WSNs, the messages are usually short and transmitted through random access (RA) procedures. However, to the best of our knowledge, there is a lack of detailed analysis in RA performance when attacked (or influenced) by jamming. In this paper, we model and investigate RA performance that is degraded by unknown jamming attacks. We assume that a central SN (referred to as the head sensor (HS) in this paper) collects information from distributed SNs through the RA channel (RACH). In order to avoid heavy collisions and contentions among crowded SNs, we assume a collision avoidance mechanism in which SNs transmit short preamble signals first and then send information messages only if they receive an indicator of acquisition (AI) of the preamble from HS. We assume a WSN that adopts direct sequence spread spectrum modulation like in ZigBee [15], IEEE 802.15.4 [16] and UMTS WCDMA [17] applications. Furthermore, two jamming attacks are considered: power and code jamming. In power jamming, attackers (if they are friendly jammers) generate noises and, as a result, degrade the quality of the signal from SNs. Power jamming is equally harmful to all the SNs that are accessing HS. To overcome the prevailing interference, so-called power-ramping by which SNs gradually increase transmitting power in preamble transmission is also modeled in this paper. Power jamming simply induces DoS without any need to hack HS and SNs.
On the other hand, code jammers need to know the boundary of access slots and the access code used to send preambles or the messages since they generate and send fake signals with the same spreading code being used by the legitimate SNs. The access slot can be known if the code jammers successfully look at the synchronization channel from HS and the access code is normally open in common air protocol specifications. Code jamming hence gives different effects compared with power jamming. At the stage of preamble transmission, code jamming reinforces the power level of SNs that use the same access code, but reduces, similarly to power jamming, the signal quality of SNs choosing different codes. As a result of code jamming, some SNs can receive AI more easily and have more chances to transmit the message, which is again jammed by the code jammers using the same code. Code jamming looks like RF spoofing where the jammers transmit a fake signal that masquerades as an actual signal [18]. The code jamming hence increases the failure probability in sending the information messages and intends to mislead the adequate allocation of radio resources.
In this paper, we also present the probability of successful preamble transmission with power ramping according to the jamming types and the resulting throughput and delay of information transmission of SNs, respectively. With numerical investigation, the effect of the two jamming attacks on RA performance of SNs is compared in terms of throughput, as well as delay. The results show that, compared to RA without jammers, power and code jamming degrade the throughput by up to 30.3% and 40.5%, respectively, while the delay performance by up to 40.1% and 65.6%, respectively.
The remainder of the paper is organized as follows. The system model, RA procedure, a power capture model according to jamming types and power ramping for preamble transmission are presented in Section 2. In Section 3, we present the success probability of preamble transmission, the throughput and the access delay. We compare RA performances of SNs attacked by power and code jamming with numerical investigation in Section 4. Finally, conclusions are presented in Section 5. The main notations used in this paper are listed in Table A1 in Appendix C.

2. System Model

2.1. System Description and RA Procedure

We consider a cluster-tree-based WSN that consists of multiple noncooperative SNs and an HS. SNs measure certain (local, ambient) information and send it to the HS through an RF channel called a physical RACH (PRACH is a well-known terminology used in 3GPP standards. In this paper, however, PRACH does not imply a specific one used in current standards, but is a generic term that just indicates some physical-layer definitions for RACH described in the following). Every node is assumed to be equipped with a single omnidirectional antenna. We assume that a frame of PRACH is 20 ms long, which consists of 15 access slots, as in Figure 1. When an SN has information to send, a frame-long message (referred to as MSG) is assumed to encapsulate the information wholly and to be sent to the HS using PRACH. To send MSG successfully, the SN should completes three steps: transmitting a preamble on PRACH, receiving the AI of the preamble from the HS and sending MSG, which is referred to as a transmission cycle (TC) in this paper.

2.1.1. RA Procedure

For a TC, SN starts with preamble transmission (PT). In PT, SN randomly selects an access code in a set of available orthogonal signature codes and an access slot among available slots. HS usually broadcasts a list of available codes and slots for SNs’ information. We assume that the preamble is 256 repetitions of the selected orthogonal spreading code of 16 chips long. It is noted that no user-specific information is carried by the preamble.
If HS receives the preamble successfully, it sends AI on the downlink (from HS to SN) AI channel (AICH in Figure 1). Unless the SN receives the AI adequately, it retransmits the same preamble again at a higher power level after a random back-off delay. Preamble retransmission will continue up to an allowable maximum number or until the preamble request is successfully received [17,19]. Parameter values used in PT (e.g., the transmission power range, the power control parameters and the maximum number of preamble retransmissions) are received through the higher layer control messages from HS.
If PT is successful and AI is correctly received by SN, MSG transmission (MT) will start using the same (selected) signature code used for PT and the same power level used in the latest PT. MSG usually delivers the information data, as well as the control data, which include pilot bits and/or the frame information. A TC is completed after successful PT and MT.

2.1.2. Jamming Types

In power jamming, the jammer is assumed to send arbitrary signals or just sine-waves with full transmitting power at each slot. It causes the same level of interference to every SN in the system. On the other hand, in code jamming, the jammer is assumed to send a preamble using a randomly or specifically selected access code with the full power. It targets influencing the SNs using the same access code, but also works as interference for the other SNs. Since the code jammer works like a legitimate SN, it can hear AI from HS if PT is successful, and then, it sends a fake MSG using the same code, which further distorts the utilization of radio resources in the WSN.

2.1.3. Traffic and RF Channel Model

The arrival of composite PTs (including initial transmissions and retransmissions) is modeled by a Poisson process with rate G, which is also known as the offered traffic. Let N be the number of (legitimate) SNs contending for the same access slot. The distribution of N is therefore:
Pr { N = n } = G n e G n ! , n = 0 , 1 , 2 , .
Let us denote a representative SN by SN-A (i.e., anonymous SN) for the purpose of presentation. Let s and K be the number of available access codes and the number of SNs selecting the same code with SN-A for accessing the same slot, respectively. Given s and N = n , the probability that SN-A collides with other K 1 SNs that choose the same code is given by:
Pr { K = k | s , N = n } = n 1 k 1 1 s k 1 s 1 s n k , 1 k n .
We assume that PRACH suffers from frequency-selective multipath Rayleigh slow-fading. Assuming that the shadowing and attenuation effects can be compensated by the open-loop power control used in UMTS RACH [19], the envelope of the received signal in one path is therefore a Rayleigh random variable. Let us assume that a perfect RAKE receiver with L fingers is used at HS. Additionally, we also assume that μ is the average received power from each path, and the received power of each finger P ( l ) has an exponential distribution, i.e., f P ( l ) ( x ) = e x / μ / μ ( x > 0 ) . Then, the signal powers distributed in L independent paths can be aggregated together so that the total received power P = l = 1 L P ( l ) has a gamma distribution, i.e.,
f P ( x ) = x L 1 e x / μ ( L 1 ) ! μ L , x > 0 .
It is noted that if we assume a narrow-band transmission like in narrow-band IoT, then PRACH can be assumed to suffer from a frequency-non-selective Rayleigh channel. In this case, L = 1 in (3) builds the probability distribution.

2.2. Power Capture Model for Preamble Transmission

Let us consider a typical access slot where there are s access codes available and k SNs (including SN-A) select the same code. Let n p (previously n) denote the number of SNs that are in simultaneous PT, n J be the total number of jammers and n m be the number of SNs that are transmitting MSG in this slot. If code jamming is considered, we assume that there are one code jammer and n J 1 power jammers. Let P i ( p ) , P j ( m ) and P J be the total received power from SN-i transmitting a preamble, from SN-j transmitting MSG and from a hostile jammer, respectively. Since the preamble contains only the repetitions of a selected code, assuming a perfect RAKE receiver, HS can aggregate the power of PTs from those k code-collided SNs (including SN-A) and the jammer (if it uses code jamming) [20,21]. Let β p be the minimum signal-to-interference-plus-noise ratio (SINR) required to decode a preamble successfully. Then, the condition for correct reception of the preamble sent by SN-A (or SNs using the same code) when the attack is power jamming is:
P A ( p ) + i = 2 k P i ( p ) i = k + 1 n p P i ( p ) + j = 1 n m P j ( m ) + n J P J + η β p ,
where η represents interfering power from other sources (for example, from a neighbor WSN using an adjacent RF channel) plus background noise.
If the attack includes code jamming, the above condition becomes:
P A ( p ) + i = 2 k P i ( p ) + P J i = k + 1 n p P i ( p ) + j = 1 n m P j ( m ) + ( n J 1 ) P J + η β p ,
where P J in the numerator is the received power from the code jammer transmitting a fake preamble using the same code and ( n J 1 ) P J is the sum of powers from power jammers and/or the other code jammers that are using different access codes.
Let q denote the probability of successful reception of AI by an SN, which is assumed independent of all other uplink probabilistic matters since AI is received through the downlink. Additionally, let W be the number of SNs that successfully receive AI among K 1 SNs except SN-A. Then:
Pr { W = w | K = k } = k 1 w q w ( 1 q ) k 1 w , 0 w k 1 .

2.3. Power Capture Model for Message Transmission

When an SN receives AI successfully, it sends its MSG that occupies z access slots. Let t ( 1 t z ) denote a time index of the access slots used by delivered MSG. Additionally, let n p , t and n m , t denote the number of SNs transmitting a preamble and the number of SNs transmitting MSG at access slot t, respectively. In MT, the desired MSG from an SN is received by HS through L signal paths. A collision-outage is assumed to occur if the received power, from SN-A for example, of at least one path drops below the power from other SNs that use the same code. If the collision-outage occurs, the desired MSG is corrupted by other MSGs. Recalling that w denotes the number of SNs that receive the same AI with SN-A, the probability of safe reception of MSG from SN-A without collision-outage at HS is given by:
P A ( wco ) = l = 1 L Pr P A ( m , l ) > max i = 1 , 2 , , w P i ( m , l ) ,
where P i ( m , l ) is the received MSG power at the l-th finger from SN-i. It is noted that P i ( m ) = l = 1 L P i ( m , l ) for all i. A closed-form expression of P A ( wco ) is presented in Appendix A.
Since a code jammer behaves similarly to legitimate SNs, it causes further interference additional to the interfering powers in the right-hand side of (7). With code jamming, the above collision-outage probability then becomes:
P A ( wco , c ) = l = 1 L Pr P A ( m , l ) > max max i = 1 , 2 , , w P i ( m , l ) , P J ( m , l ) ,
where P J ( m , l ) is the received power of the l-th finger from the code jammer that transmits a fake message. If the jammer cannot receive the AI, then it is assumed to transmit a fake preamble and hence works like a power jammer. A closed-form expression of P A ( wco , c ) is presented in Appendix B.
Let P i , t ( p ) and P j , t ( m ) be the total received power from SN-i transmitting a preamble and SN-j transmitting MSG (using the different access codes from SN-A) at the t-th ( 1 t z ) access slot, respectively. Let n p , t and n m , t be the corresponding numbers of SNs transmitting a preamble and MSG at the t-th access slot, respectively. Then, the SINR of MSG signals from SN-A, γ A m , is defined by:
γ A ( m ) = ( def ) z P A ( m ) t = 1 z i = 1 n p , t P i , t ( p ) + j = 1 n m , t P j , t ( m ) + z i = 1 w P i ( m ) + n J P J + z η .
Thus, γ A ( m ) β m is the condition for correct reception of MSG sent by SN-A, where β m is the SINR requirement. In this paper, since we model that condition γ A ( m ) β m is applied only when collision-outage is free, γ A ( m ) is equally obtained for power and code jamming.

2.4. Power Ramping for Preamble Transmission and Message Transmission

By using open-loop power estimation, an SN can adjust its initial transmission power based on the received signal strength from the HS [17]. The aim is to let the received power at the HS exceed a predetermined power level. For the initial PT, we assume that all SNs have the same target power level μ L , recalling that μ is an average path power and L is the number of effective paths. If the initial PT fails, a higher target power level is used for retransmission. We assume that μ L is the power increment unit adopted at each of preamble retransmissions as in [22]. Let us denote the number of retransmissions by r, and let m r = ( def ) r + 1 . Then, m r μ L represents the target power level in the r-th preamble retransmission. Hereafter, we denote the average number of preamble retransmissions by m ¯ , and thus, m ¯ μ L means that the average power level is used in PT. Average jamming power is also represented by m J (in the unit of power increment step μ L ), such that m J μ L = P J , where P J is the maximum power level of jamming signals.
After PT is successful, SNs that received AI send MSG with an adjusted power level. Let us denote a power increasing factor for MSG transmission by α ( 1 ) . When an SN receives AI successfully after r or the m ¯ -th preamble retransmission, it sends its MSG using power level α m r μ L or α m ¯ μ L , respectively.

3. RA Performance Analysis

3.1. Success Probability of Preamble Transmission

3.1.1. Success Probability of r-th Preamble Retransmission

Given that n p , n m , k and n J , let us denote the conditional success probability at the r-th preamble retransmission (i.e., at the ( r + 1 ) -th PT) by u ( r | n p , k , n m , n J ) , where { P , S } and furthermore P for power jamming and S for code jamming. The probability can be obtained analogously by the method used in [22] according to the criteria (4) and (5), respectively.
u ( r | n p , k , n m , n J ) = exp β p c μ 1 + β p b ( b 1 ) ! i = 0 a 1 j = 0 i ( b + j 1 ) ! j ! ( i j ) ! β p i ( 1 + β p ) j c μ i j , 1 k n p 1 , exp β p c μ i = 0 a 1 1 i ! β p c μ i , k = n p ,
where the three interim variables a, b and c for the power jamming (i.e., = P ) are defined as:
a = k 1 m ¯ L + m r L , b = n p k m ¯ L + n m α m ¯ L + n J m J L , c = η ,
and for the code jamming (i.e., = C ):
a = k 1 m ¯ L + m r L + m J L , b = n p k m ¯ L + n m α m ¯ L + ( n J 1 ) m J L , c = η .
Aggregating u ( r | n p , k , n m , n J ) for all possible values on n p and k gives:
u ( r | n m , n J ) = n p = 1 k = 1 n p Pr { K = k | N = n p } Pr { N = n p } u ˜ ( r | n p , k , n m , n J ) ,
where an interim function u ˜ ( r | n p , k , n m , n J ) represents either u ˜ P ( r | n p , k , n m , n J ) = u P ( r | n p , k , n m , n J ) for power jamming or:
u ˜ C ( r | n p , k , n m , n J ) = n J s u C ( r | n p , k , n m , n J ) u C , 1 + s n J s u P ( r | n p , k , n m , n J ) u C , 2 ,
for code jamming. Furthermore, u C , 1 and u C , 2 in (14) represent whether SN-A selects the code being jammed by a code jammer or not, respectively. Hereafter, we use u ( r ) = ( def ) u ( r | n m , n J ) for notational brevity.

3.1.2. Derivation of m ¯

Let G 0 and G r denote the arrival rates of the initial PT and the r-th preamble retransmissions, respectively. Let S P be the throughput of PT, and let r max be the maximum number of preamble retransmissions allowed. Let q A denote the probability that SN-A receives AI successfully. The relationship between G 0 and G r is then:
G 0 = S P + G r max { 1 u ( r max ) q A } , G 1 = G 0 { 1 u ( 0 ) q A } , G 2 = G 1 { 1 u ( 1 ) q A } , G r max = G r max 1 { 1 u ( r max 1 ) q A } .
The composite offered traffic is therefore G = r = 0 r max G r . From (15), G r is given by:
G r = G i = 0 r 1 { 1 u ( i ) q A } 1 + j = 1 r m a x i = 0 j 1 { 1 u ( i ) q A } .
The average number of retransmissions m ¯ to measure the corresponding average power level in the unit of μ L is then given by:
m ¯ = r = 0 r max m r G r G = 1 + r = 1 r max m r i = 0 r 1 { 1 u ( i ) q A } 1 + r = 1 r max i = 0 r 1 { 1 u ( i ) q A } .
It should be noted the success probability u ( r ) in (13) is a function of m ¯ , while m ¯ as expressed in (17) is a function of u ( r ) . Therefore, (13) and (17) are to be solved recursively in order to get m ¯ .

3.2. Throughput of Random Access Request

Let q J denote the probability that a jammer receives AI successfully. The success probability of MT after the successful r-th preamble retransmission in the presence of the power jamming and the code jamming for given n m , n m , t , n p , t and n J can be derived as:
T P ( r | n m , n m , t , n p , t , n J ) = n p = 1 k = 1 n p Pr { K = k | N = n p } Pr { N = n p } u P ( r | n p , k , n m , n J ) q A × w = 0 k 1 k 1 w q w ( 1 q ) k 1 w P A ( wco ) ( I ) Pr { γ A ( m ) β m | n m , t , n p , t , w , n J } ( II ) ,
and:
T C ( r | n m , n m , t , n p , t , n J ) = n p = 1 k = 1 n p Pr { K = k | N = n p } Pr { N = n p } q A w = 0 k 1 k 1 w q w ( 1 q ) k 1 w × [ n J s u C ( r | n p , k , n m , n J ) q J P A ( wco , c ) ( III ) + ( 1 q J ) P A ( wco ) + s n J s u P ( r | n p , k , n m , n J ) P A ( wco ) ] Pr { γ A ( m ) β m | n m , t , n p , t , w , n J } ,
respectively. Hereafter, we use T ( r ) = ( def ) T ( r | n m , n m , t , n p , t , n J ) for notational brevity. Practically, the terms ( I ) (also ( III ) ) and ( II ) are not independent when w 1 and a closed-form expression of (18) (also for (19)) is not tractable. In this paper, we assume that the terms are independent for brevity. If w = 0 , ( I ) becomes one, and the independent assumption is valid. Now, the term ( II ) can be derived based on the result in (10):
( II ) = exp β m c μ 1 + β m b ( b 1 ) ! i = 0 a 1 j = 0 i ( b + j 1 ) ! j ! ( i j ) ! β m i ( 1 + β m ) j c μ i j ,
where the three interim variables a, b and c are defined as:
a = z α m r L , b = t = 1 z n p , t m ¯ L + n m , t α m ¯ L + z w α m ¯ L + n J m J L , c = z η .
From (18) and (19), the throughput of the preamble and the message transmission can be derived as:
S T = r = 0 r m a x G r T ( r ) = r = 0 r m a x G i = 0 r m a x 1 { 1 u ( i ) q A } T ( r ) 1 + j = 1 r m a x i = 0 j 1 { 1 u ( i ) q A } .

3.3. Access Delay of Random Access Request

The success of TC consists of both successes of PT and MT. The failure of TC then occurs when the number of preamble retransmissions exceeds r m a x or MT fails after the SN receives AI. If TC is declared to be a failure, SNs restarts PT in a new TC with setting the transmitting power at an initial level, i.e., m r = 1 . Let C be the number of restarts of TC to an end of successful MT. By assuming that all transmission attempts are independent, the distribution of C is given by:
Pr { C = c } = S T G 1 S T G c , c = 0 , 1 , 2 , .
Let T ¯ ( M ) ( r | n m , n m , t , n p , t , n J ) be the probability that MT has failed though PT (i.e., the r-th retransmission), and receiving AI are successful, given n m , n m , t , n p , t and n J . T ¯ ( M ) ( r ) = ( def ) T ¯ ( M ) ( r | n m , n m , t , n p , t , n J ) can be expressed as in (24) and (25) for power and code jamming, respectively.
T ¯ P ( r | n m , n m , t , n p , t , n J ) = n p = 1 k = 1 n p Pr { K = k | N = n p } Pr { N = n p } u P ( r | n p , k , n m , n J ) q A × w = 0 k 1 k 1 w q w ( 1 q ) k 1 w 1 P A ( wco ) Pr { γ A ( m ) β m | n m , t , n p , t , w , n J } ,
T ¯ C ( r | n m , n m , t , n p , t , n J ) = n p = 1 k = 1 n p Pr { K = k | N = n p } Pr { N = n p } q A w = 0 k 1 k 1 w q w ( 1 q ) k 1 w × [ n J s u C ( r | n p , k , n m , n J ) q J 1 P A ( wco , c ) Pr { γ A ( m ) β m | n m , t , n p , t , w , n J } + n J s u C ( r | n p , k , n m , n J ) ( 1 q J ) + s n J s u P ( r | n p , k , n m , n J ) × 1 P A ( wco ) Pr { γ A ( m ) β m | n m , t , n p , t , w , n J } ] .
Let us denote the average delay (in the unit of access slot) occurring in PT and receiving AI by D P . Let D S and D F be the average delay occurred in TC when TC terminates successfully or not, respectively. By using (19) and (25) for D S , and (18) and (24) for D F , we can have, in addition to (16),
D F = 1 Ω F r = 0 r m a x G r G T ¯ ( r ) { ( r + 1 ) D P + z } + 1 r = 0 r m a x G r G ( T ¯ ( r ) + T ( r ) ) ( r m a x + 1 ) D P ,
where Ω F = 1 r = 0 r m a x G r G T ( r ) , and:
D S = 1 Ω S r = 0 r m a x G r G T ( r ) { ( r + 1 ) D P + z } ,
where Ω S = r = 0 r m a x G r T ( r ) / G .
By using (23), (26) and (27), the total access delay D T is given by:
D T = c = 0 Pr { C = c } ( c D F + D S ) .

4. Numerical Results

Computer simulation is done using the parameter values given in Table 1. The number of SNs transmitting preamble signals follows a Poisson distribution with mean G, and we assume that n m = n m , t = n p , t = G for all t. Thus, when G 2 , it is assumed in the simulation that SNs during PT are interfered by other multiple SNs that are transmitting either MSG or preamble. Additionally, scenarios with a different number of jammers n J = 1 , 2 , 3 are also tested, respectively.
Figure 2, Figure 3 and Figure 4 compare the success probability u ( r ) of PT under different jamming attacks by the different numbers of jammers when the offered traffic G is 1, 3 and 5, respectively. In the figures, it is seen that the code jamming is less harmful than the power jamming in terms of the success probability. This is because, referring to (5), the signal power of the code jammer is added to desired signal power from SNs that select the same access code with the jammer, which increases u ( r ) at HS. In power jamming, on the other hand, the whole power is treated as interference. In the same context, it is seen that the performance definitely degrades as the number of power jammers increases in Figure 2, Figure 3 and Figure 4. In code jamming, however, more jammers can contribute to improving the performance: for example, if the number of code jammers increases to 1, 2 and 3, in Figure 2 (when G = 1), u ( 0 ) also increases to 0.38, 0.4 and 0.41, respectively. It should be noted that the code jammers do not always contribute to increasing u ( r ) : for example, when r 3 in Figure 2, it is seen that the more code jammers provide the lower u ( r ) , which is also true for the overall range of tested r in Figure 4 (when G = 5). Furthermore, code jamming (with one or two jammers) sometimes (when 0 r 4 ) gives better performance than PT without jamming especially when G = 5 in Figure 4. Comparing Figure 2, Figure 3 and Figure 4, it is seen that jamming severely degrades the performance of u ( r ) especially in the light offered load. In the very heavy load, code jamming sometimes increases u ( r ) . In terms of u ( r ) , power jamming is more harmful than code jamming over a wide range of parameter values.
Figure 5 compares the throughput of final MSG transmission S T for increasing offered traffic G, where code and power jamming attacks with 1–3 jammers are considered, respectively. If the same number of jammers is considered, the throughput with code jamming is smaller than that with power jamming over all G tested, though code jamming achieves usually better u ( r ) than power jamming in Figure 2, Figure 3 and Figure 4. This is because MSGs from desired SNs have collided with those from the code jammers using the same code. When G = 2 , 21%, 25%, 30%, 36%, 30% and 40% of throughput are lost due to 1 power jammer, 1 code jammer, 2 power jammers, 3 power jammers, 2 code jammers and 3 code jammers, respectively. When G = 3 , the amount of throughput loss is not distinguishable between the numbers of power jammers. Moreover, when G = 4 , the throughput with and without power jamming becomes equal due to the overwhelming interference. However, code jammers further degrade the throughput compared to power jammers over all G tested.
Figure 6 compares the access delay D T of final MSG transmission for increasing offered traffic G, where code and power jamming attacks with 1–3 jammers are considered, respectively. The result in Figure 6 certainly matches that in Figure 5. If the same number of jammers is considered, the delay with code jamming is greater than that with power jamming over all G tested, which is a similar trend that can be expected from Figure 5. When G = 2 , 27%, 34%, 40%, 56%, 40% and 65% of greater delay than without-jamming result due to 1 power jammer, 1 code jammer, 2 power jammers, 3 power jammers, 2 code jammers and 3 code jammers, respectively. When G = 3 , the amount of delay increase is not distinguishable with the numbers of power jammers. Moreover, when G = 4 , the delay with and without power jamming becomes equal due to overwhelming interference. However, code jammers further increase the delay compared to power jammers over all G tested.
From the above numerical investigations, we can address two ideas to detect whether the jammers exist or not if HS has certain measurement data, the implementation of which would be left for future study. One is using the concave throughput graphs achieved in Figure 5. We assume that HS have measurement data on received power (RxP) vs. throughput without jammers. Since the offered load cannot be directly measured, RxP is used to estimate the load. The jammer seems to generate additional interference, by which HS may overestimate the offered load since it has accordingly low throughput. For example, with one power jammer, the throughput in Figure 5 is about 0.47 when G = 2.0 , which can be achieved when either G = 1.2 or 3.0 if the jammer does not exist. Let us assume that 0.47 is the current throughput seen at HS. If HS has the measurement data, then HS can judge whether current 0.47 is due to the low load or possibly due to the jammer. Let us denote the RxP measured when the throughput is 0.47 by R 1 and R 2 ( R 1 R 2 ), which represent two different loads G = 1.2 and 3.0 (noting that both provide the same throughput 0.47 ), respectively. Of course, HS does not know G exactly, but understands that throughput 0.47 is achieved by different load conditions: low and high, respectively. If current RxP is approximately equal to R 1 , then the throughput is due to low load. However, if it is much greater than R 1 , HS sends a signaling message that temporarily prevents each SN from sending preambles with certain probability p ( 0 < p < 1 ) . Then, the load should be increased if throughput 0.47 is due to the high load. Otherwise, the load should be decreased, and there probably exits a jammer.
The other idea is using the monotonically increasing delay graphs in Figure 6. If HS is assumed to have measurement data on RxP vs. delay without jammers, then it can guess that the current excessive delay is possibly due to jamming powers. Other methods to avoid or detect jamming such as using directional antennas are intensively summarized in [23].

5. Conclusions

We have investigated RA performances in a WSN where power or code jammers actively disturb the information transmission from distributed SNs to a central HS. Average throughput and average delay for the information message are modeled, respectively. Numerical investigation shows that power jamming is more harmful than code jamming in the stage of PT. However, code jamming finally degrades the modeled performances more severely. Code jamming falsely attracts HS to send AI and thus further deteriorates the resource allocation in the WSN. As a remedy of code jamming, a new secure code, which is different from the access code used in PT and hardly known to code jammers, can be used in sending MSG. This requires a more sophisticated protocol to allocate the secure codes, which is left for future work. The model and results in this paper are certainly useful in building up better and more sophisticated RA methods that tolerate attacks from malicious transmitters.

Acknowledgments

This work was supported by the research fund of Signal Intelligence Research Center supervised by the Defense Acquisition Program Administration and the Agency for Defense Development of Korea.

Author Contributions

D.-K. Jung built the model and did the experiments. J.-W. Wui wrote about the RA procedure and the system model. D. Kim wrote the Introduction and about the investigations.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
AIIndicator of acquisition
AICHAI channel
ANArtificial noise
DoSDenial of service
HSHead sensor
LTELong-Term Evolution
MSGFrame-long message
MTMSG transmission
PRACHPhysical RACH
PTPreamble transmission
RARandom access
RACHRA channel
RFRadio frequency
SINRSignal-to-interference-plus-noise ratio
SNSensor node
SN-AAnonymous SN
TCTransmission cycle
UMTSUniversal Mobile Telecommunication System
WCDMAWideband Code Division Multiple Access
WSNWireless sensor network

Appendix A Derivation of P A ( wco )

Let P i ( m , l ) exp α m ¯ μ , i = 1 , 2 , , w , be statistically independent and identically distributed (i.i.d.) exponential r.v.’s with mean α m ¯ μ . Additionally, P A ( m , l ) exp α m r μ follows the exponential distribution with mean α m r μ . Therefore, the i.i.d finger path is considered as:
Pr P A ( m , l ) > max i = 1 , 2 , , w P i ( m , l ) = 0 1 e t α m ¯ μ w 1 α m r μ e t α m r μ d t = v = 0 w w v 1 v 1 α m r μ 0 e v α m ¯ μ + 1 α m r μ t d t = v = 0 w w v 1 v 1 α m r μ · 1 v α m ¯ μ + 1 α m r μ .
According to order statistics [24],
P A ( wco ) = l = 1 L Pr P A ( m , l ) > max i = 1 , 2 , , w P i ( m , l ) = v = 0 w w v 1 v m ¯ v m r + m ¯ L .

Appendix B Derivation of P A ( wco , c )

Let P J ( m , l ) exp m J μ be also an exponential distribution with mean m J μ . Using the same approach as above,
Pr P A ( m , l ) > max i = 1 , 2 , , w P i ( m , l ) , P J ( m , l ) = 0 1 e t α m ¯ μ w 1 e t m J μ 1 α m r μ e t α m r μ d t = v = 0 w w v 1 v 1 α m r μ 0 e v α m ¯ μ + 1 α m r μ t e v α m ¯ μ + 1 α m r μ + 1 m J μ t d t = v = 0 w w v 1 v 1 α m r μ 1 v α m ¯ μ + 1 α m r μ 1 v α m ¯ μ + 1 α m r μ + 1 m J μ .
According to order statistics [24],
P A ( wco , c ) = l = 1 L Pr P A ( m , l ) > max i = 1 , 2 , , w P i ( m , l ) , P J ( m , l ) = v = 0 w w v 1 v m ¯ v m r + m ¯ m ¯ v m r + m ¯ + α m r m ¯ m J L .

Appendix C Notations

Table A1. Notations.
Table A1. Notations.
NotationDescription
NThe number of legitimate SNs contending for the same access slot
GArrival rate of composite PT is modeled by a Poisson process
sThe number of available access codes
KThe number of SNs selecting the same code in the same time slot
LThe number of fingers in a RAKEreceiver
μ Average received power from each path
P ( l ) Received power at each finger
n p The number of SNs in simultaneous PT
n J The number of jammers
n m The number of SNs transmitting MSG
P i ( p ) Received power from SN-i transmitting a preamble
P j ( m ) Received power from SN-j transmitting MSG
P J Received power from a hostile jammer
β p Minimum SINR required for successfully decoding a preamble
η Interference plus noise power
qProbability of successful reception of AI
WThe number of SNs that successfully receive AI
zSlot length for MSG transmission
tTime index of the access slots used by delivering MSG
n p , t The number of SNs transmitting a preamble at access slot t
n m , t The number of SNs transmitting MSG at access slot t
wThe number of SNs that receive the same AI with SN-A
P A ( w c o ) Probability of safe reception of MSG without collision-outage
P i ( m , l ) Received MSG power at l-th finger from SN-i
P i , t ( p ) Received power from SN-i transmitting a preamble at the t-th access slot
P j , t ( m ) Received power from SN-j transmitting MSG at the t-th access slot
γ A ( m ) SINR of MSG signals
β m SINR requirement of MSG signals
μ Average path power
rThe number of retransmissions
m ¯ Average number of preamble retransmissions
m J Average jamming power
P J Maximum power level of jamming signals
α Power increment ratio for MSG transmission
u ( r | n p , k , n m , n J ) Conditional success probability at the r-th preamble transmission
PState variable for indicating power jamming
SState variable for indicating code jamming
G 0 Arrival rate of initial PT
G r Arrival rate of the r-th preamble retransmissions
S P Throughput of PT
r m a x The maximum number of allowable preamble retransmissions
q A Probability that SN-A receives AI successfully
q J Probability that a jammer receives AI successfully
T ( r ) Success probability of MT after the successful r-th preamble retransmission
S T Throughput of PT and MSG transmission
CThe number of restarts of TC
T ¯ ( r ) Probability that MT is failed
D P Average delay occurred in PT and receiving AI
D S Average delay occurred in TC when TC terminates successfully
D F Average delay occurred in TC when TC terminates with a failure
D T Total access delay
= ( def ) Definition declaration
· Floor function

References

  1. Akyildiz, I.F.; Su, W.; Sankarasubramaniam, Y.; Cayirci, E. Wireless Sensor Networks: A Survey. Comput. Netw. 2002, 38, 393–422. [Google Scholar] [CrossRef]
  2. Xu, W.; Ma, K.; Trappe, W.; Zhang, Y. Jamming Sensor Networks: Attack and Defense Strategies. IEEE Netw. 2006, 20, 41–47. [Google Scholar]
  3. Shi, E.; Perrig, A. Designing Secure Sensor Networks. Wirel. Commun. Mag. 2004, 11, 38–43. [Google Scholar]
  4. Wood, A.D.; Stankovic, J.A. Denial of Service in Sensor Networks. Computer 2002, 35, 54–62. [Google Scholar] [CrossRef]
  5. Xu, W.; Trappe, W.; Zhang, Y.; Wood, T. The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. In Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Urbana-Champaign, IL, USA, 25–27 May 2005; pp. 46–57. [Google Scholar]
  6. Li, M.; Koutsopoulos, I.; Poovendran, R. Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Netwroks. IEEE Trans. Mob. Comput. 2010, 9, 1119–1133. [Google Scholar]
  7. Aziz, F.M.; Shamma, J.S.; Stüber, G.L. Resilience of LTE Networks Against Smart Jamming Attacks. In Proceedings of the Global Communications Conference (GLOBECOM), Austin, TX, USA, 8–12 December 2014; pp. 734–737. [Google Scholar]
  8. Lichtman, M.; Jover, R.P.; Labib, M.; Rao, R.; Marojevic, V.; Reed, J.H. LTE/LTE-A Jamming, Spoofing, and Sniffing: Threat Assessment and Mitigation. IEEE Commun. Mag. 2016, 54, 54–57. [Google Scholar] [CrossRef]
  9. Del-Valle-Soto, C.; Mex-perera, C.; Monroy, R.; Nulazo-flores, J.A. On Routing Protocol Influence on the Resilience of Wireless Sensor Networks to jamming attacks. Sensors 2015, 15, 7619–7649. [Google Scholar] [CrossRef] [PubMed]
  10. Li, X.; Dai, H.-N.; Wang, H.; Xiao, H. On Performance Snalysis of Protective Jamming Schemes in Wireless Sensor Networks. Sensors 2016, 16, 1987. [Google Scholar] [CrossRef] [PubMed]
  11. Han, Z.; Marina, N.; Debbah, M.; Hjørungnes, A. Physical Layer Security Game: Interaction Between Source, Eavesdropper, and Friendly Jammer. EURASIP J. Wirel. Commun. Netw. 2009, 2009. [Google Scholar] [CrossRef]
  12. Vilela, J.P.; Bloch, M.; Barros, J.; McLaughlin, S.W. Wireless Secrecy Regions with Friendly Jamming. IEEE Trans. Inf. Forensics Secur. 2011, 6, 256–266. [Google Scholar] [CrossRef]
  13. Yang, M.; Zhang, B.; Huang, Y.; Yang, N.; Guo, D.; Gao, B. Secure Multiuser Communications in Wireless Sensor Networks with TAS and Cooperative Jamming. Sensors 2016, 16, 1908. [Google Scholar] [CrossRef] [PubMed]
  14. Li, Z.; Jing, T.; Ma, L.; Huo, Y.; Qian, J. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks. Sensors 2016, 16, 339. [Google Scholar] [CrossRef] [PubMed]
  15. ZigBee Alliance. Available online: http://www.zigbee.org (accessed on 13 November 2017).
  16. Gutierrez, J.A.; Callaway, E.H.; Barrett, R. IEEE 802.15.4 Low-Rate Wireless Personal Area Networks; Institute of Electrical and Electronics Engineers (IEEE): Piscataway, NJ, USA, 2003; ISBN 0-7381-3677-5 SS95127. [Google Scholar]
  17. 3GPP TS 25.211 (V6.10.0). Physical Channels and Mapping of Transport Channels onto Physical Channels (FDD). Technical Specification (Release 6), Technical Specification Group Radio Access Network. 3GPP, 2003. Available online: http://www.qtc.jp/3GPP/Specs/25211-6a0.pdf (accessed on 13 November 2017).
  18. Labib, M.; Marojevic, V.; Reed, J. Analyzing and Enhancing the Resilience of LTE/LTE-A Systems to RF Spoofing. In Proceedings of the IEEE Conference Standards for Communications and Networking, Tokyo, Japan, 28–30 October 2015; pp. 315–320. [Google Scholar]
  19. 3GPP TS 25.214 (V6.5.0). Physical Layer Procedures (FDD). Technical Specification (Release 6), Technical Specification Group Radio Access Network. 3GPP, 2003. Available online: http://www.etsi.org/deliver/etsi_ts/125200_125299/125214/06.05.00_60/ts_125214v060500p.pdf (accessed on 13 November 2017).
  20. Moberg, J.; Löfgren, M.; Karlsson, R.S. Throughput of The WCDMA Random Access Channel. In Proceedings of the IST Mobile Communication Summit, Galway, Ireland, 1–4 October 2000; Available online: https://pdfs.semanticscholar.org/fc05/2fb6eb24b1902b2e7bd7300be11b4c4a33d5.pdf (accessed on 13 November 2017).
  21. Davis, D.H.; Gronemeyer, S.A. Performance of Slotted ALOHA Random Access with Delay Capture and Randomized Time of Arrival. IEEE Trans. Commun. 1980, COMM-28, 703–710. [Google Scholar] [CrossRef]
  22. Yang, Y.; Yum, T.-S.P. Analysis of Power Ramping Schemes for UTRA-FDD Random Access Channel. IEEE Trans. Wirel. Commun. 2005, 4, 2688–2693. [Google Scholar] [CrossRef]
  23. Curiac, D.-I. Wireless Sensor Network Security Enhancement Using Directional Antennas: State of the Art and Research Challenges. Sensors 2016, 16, 488. [Google Scholar] [CrossRef] [PubMed]
  24. David, H.A. Order Statistics, 2nd ed.; Wiley: Hoboken, NJ, USA, 1981. [Google Scholar]
Figure 1. Mechanism of the RACH procedure.
Figure 1. Mechanism of the RACH procedure.
Sensors 17 02667 g001
Figure 2. Success probability of the preamble transmission when G = 1.
Figure 2. Success probability of the preamble transmission when G = 1.
Sensors 17 02667 g002
Figure 3. Success probability of the preamble transmission when G = 3.
Figure 3. Success probability of the preamble transmission when G = 3.
Sensors 17 02667 g003
Figure 4. Success probability of the preamble transmission when G = 5.
Figure 4. Success probability of the preamble transmission when G = 5.
Sensors 17 02667 g004
Figure 5. Throughput of the message transmission.
Figure 5. Throughput of the message transmission.
Sensors 17 02667 g005
Figure 6. Average delay in the message transmission.
Figure 6. Average delay in the message transmission.
Sensors 17 02667 g006
Table 1. Parameter values used in numerical evaluation.
Table 1. Parameter values used in numerical evaluation.
ParameterValue
The number of resolvable paths L = 3
Average received power from one path μ = 1
Interference plus noise power η = 2
Minimum SINR for correct preamble reception β p = 5 dB
Power increment ratio for message transmission α = 1 . 2
Minimum SINR for correct message reception β m = 5 dB
Maximum number of preamble retransmission r m a x = 5
The number of available access codes s = 16
Probability of successfully receiving AI by an SN or a jammer q = q A = q J = 0 . 8
Average delay in reception of AI after successful PT D P = 3
Slot length in message transmission z = 15

Share and Cite

MDPI and ACS Style

Jeong, D.-K.; Wui, J.-H.; Kim, D. Random Access Performance of Distributed Sensors Attacked by Unknown Jammers. Sensors 2017, 17, 2667. https://doi.org/10.3390/s17112667

AMA Style

Jeong D-K, Wui J-H, Kim D. Random Access Performance of Distributed Sensors Attacked by Unknown Jammers. Sensors. 2017; 17(11):2667. https://doi.org/10.3390/s17112667

Chicago/Turabian Style

Jeong, Dae-Kyo, Jung-Hwa Wui, and Dongwoo Kim. 2017. "Random Access Performance of Distributed Sensors Attacked by Unknown Jammers" Sensors 17, no. 11: 2667. https://doi.org/10.3390/s17112667

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop