Next Article in Journal
A Miniature System for Separating Aerosol Particles and Measuring Mass Concentrations
Next Article in Special Issue
Authentication and Key Establishment in Dynamic Wireless Sensor Networks
Previous Article in Journal
Relaxation Time Estimation from Complex Magnetic Resonance Images
Previous Article in Special Issue
Information Warfare-Worthy Jamming Attack Detection Mechanism for Wireless Sensor Networks Using a Fuzzy Inference System
Article

DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System

by 1,* and 2
1
Department of Computer Science, North Carolina State University, 890 Oval Dr., Raleigh, NC 27614, USA
2
Department of Computer Science and Engineering, Ewha Womans University, 11-1 Daehyun-dong, Seodaemun-gu, Seoul, 120-750, Korea
*
Author to whom correspondence should be addressed.
Sensors 2010, 10(4), 3626-3640; https://doi.org/10.3390/s100403626
Received: 9 February 2010 / Revised: 11 March 2010 / Accepted: 18 March 2010 / Published: 12 April 2010
To successfully realize the ubiquitous network environment including home automation or industrial control systems, it is important to be able to resist a jamming attack. This has recently been considered as an extremely threatening attack because it can collapse the entire network, despite the existence of basic security protocols such as encryption and authentication. In this paper, we present a method of jamming attack tolerant routing using multiple paths based on zones. The proposed scheme divides the network into zones, and manages the candidate forward nodes of neighbor zones. After detecting an attack, detour nodes decide zones for rerouting, and detour packets destined for victim nodes through forward nodes in the decided zones. Simulation results show that our scheme increases the PDR (Packet Delivery Ratio) and decreases the delay significantly in comparison with rerouting by a general routing protocol on sensor networks, AODV (Ad hoc On Demand Distance Vector), and a conventional JAM (Jammed Area Mapping) service with one reroute. View Full-Text
Keywords: jamming attack; attack tolerant routing; multiple paths; ubiquitous networking system jamming attack; attack tolerant routing; multiple paths; ubiquitous networking system
Show Figures

Graphical abstract

MDPI and ACS Style

Kim, M.; Chae, K. DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System. Sensors 2010, 10, 3626-3640. https://doi.org/10.3390/s100403626

AMA Style

Kim M, Chae K. DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System. Sensors. 2010; 10(4):3626-3640. https://doi.org/10.3390/s100403626

Chicago/Turabian Style

Kim, Mihui, and Kijoon Chae. 2010. "DMP: Detouring Using Multiple Paths against Jamming Attack for Ubiquitous Networking System" Sensors 10, no. 4: 3626-3640. https://doi.org/10.3390/s100403626

Find Other Styles

Article Access Map by Country/Region

1
Only visits after 24 November 2015 are recorded.
Back to TopTop