Abstract

In this paper, we model and investigate the random access (RA) performance of sensor nodes (SN) in a wireless sensor network (WSN). In the WSN, a central head sensor (HS) collects the information from distributed SNs, and jammers disturb the information transmission primarily by generating interference. In this paper, two jamming attacks are considered: power and code jamming. Power jammers (if they are friendly jammers) generate noises and, as a result, degrade the quality of the signal from SNs. Power jamming is equally harmful to all the SNs that are accessing HS and simply induces denial of service (DoS) without any need to hack HS or SNs. On the other hand, code jammers mimic legitimate SNs by sending fake signals and thus need to know certain system parameters that are used by the legitimate SNs. As a result of code jamming, HS falsely allocates radio resources to SNs. The code jamming hence increases the failure probability in sending the information messages, as well as misleads the usage of radio resources. In this paper, we present the probabilities of successful preamble transmission with power ramping according to the jammer types and provide the resulting throughput and delay of information transmission by SNs, respectively. The effect of two jamming attacks on the RA performances is compared with numerical investigation. The results show that, compared to RA without jammers, power and code jamming degrade the throughput by up to 30.3% and 40.5%, respectively, while the delay performance by up to 40.1% and 65.6%, respectively.

Highlights

  • With the development of a wide range of intelligent and tiny wireless sensing devices, wireless sensor networks (WSNs) are being used for many applications in the fields of medical, industry, defense, smart homes, etc

  • If preamble transmission (PT) is successful and AI is correctly received by sensor nodes (SN), MSG transmission (MT) will start using the same signature code used for PT and the same power level used in the latest PT

  • Since the code jammer works like a legitimate SN, it can hear AI from head sensor (HS) if PT is successful, and it sends a fake MSG using the same code, which further distorts the utilization of radio resources in the WSN

Read more

Summary

Introduction

With the development of a wide range of intelligent and tiny wireless sensing devices, wireless sensor networks (WSNs) are being used for many applications in the fields of medical, industry, defense, smart homes, etc. Attackers (if they are friendly jammers) generate noises and, as a result, degrade the quality of the signal from SNs. Power jamming is harmful to all the SNs that are accessing HS. We present the probability of successful preamble transmission with power ramping according to the jamming types and the resulting throughput and delay of information transmission of SNs, respectively. The effect of the two jamming attacks on RA performance of SNs is compared in terms of throughput, as well as delay.

System Description and RA Procedure
RA Procedure
Jamming Types
Traffic and RF Channel Model
Power Capture Model for Preamble Transmission
Power Capture Model for Message Transmission
Power Ramping for Preamble Transmission and Message Transmission
Success Probability of r-th Preamble Retransmission
Derivation of m
Throughput of Random Access Request
Access Delay of Random Access Request
Numerical Results
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.