On denial-of-service (DoS) attacks for wireless sensor networks (WSNs), we investigated the security aspects of the physical layer. We conducted the simulative performance analysis of jamming attacks for signal-to-noise ratio (SNR), bit error rate (BER), network throughput and packet delivery ratio (PDR) using IEEE 802.15.4 based OPNET simulative model for WSN under constant and varying intensity of jamming attacks. Under constant jamming attack, simulations revealed that average sink node PDR degrades from 79.01% in a normal scenario, to 59.22% in jammed scenario. Also, normal scenario shows maximum PDR of 89.68% and minimum PDR of 70.02% while jammed scenario shows a maximum PDR of 64.93% and minimum PDR of 49.90%. Under varying intensity of jamming attack, simulations revealed that average sink node PDR decreases, from 79.01% in a normal scenario, by 5.54%, 4.53%, 6.36% and 3.35% with the introduction of one, two, three and four jammers respectively. Further, the average SNR decreases, from 73.59%, in a normal scenario, by 5.43%, 5.63%, 10.44% and 20.39% with the introduction of one, two, three and four jammers respectively.
KeywordsWireless Sensor Network (WSN), ZigBee, Security, Denial of Service (DoS), Jamming Attack.
1.INTRODUCTIONThe devices, called sensor nodes, find their wide-spread applications in local processing and wireless communications because they are economical, low-power consuming, small in size and easily deployable. Sensor network refers to a heterogeneous system combining tiny sensors and actuators with general-purpose computing elements [1,2]. These networks constitute a large number of self-organizing, massively deployed, low-power, low-cost wireless nodes with applications in the ocean and wildlife monitoring, machinery performance monitoring, building safety monitoring, earthquake monitoring, and many more battlefields applications. Future applications may include highway-traffic monitoring, pollution monitoring, emergency response systems, disaster relief networks, forest-fire detection, land sliding monitoring, volcano-eruption monitoring systems, fault monitoring on railway tracks and environmental monitoring [3,4]. Ensuring security in WSNs is a challenging task because of various constraints. First, sensor nodes usually have limited resources like -battery power, memory, and computational capabilities. Second, sensor nodes are usually deployed unattended hostile environment and are built without any intrusion detection and prevention in mind. An adversary can easily target a few sensor nodes without being easily noticed and hence, can launch a variety of attacks. Thus, any security mechanism for sensor networks has to be resilient to compromised sensor nodes. Third, most of the sensor applications are based on local computation and communication, while attackers have better computational and energy capabilities. Often, one has to use resource constrained sensor nodes to deal with very powerful attackers. So, traditional security techniques used in wired networks cannot be...