A heterogeneous wireless sensor network attacked by jamming is analyzed as a two-player non-cooperative game chance constrained problem, the utility function is based on the signal interference plus ...noise ratio at the receiver. In view of the problem’s stochasticity, second order cone programming is used to solve the game problem. Our preliminary numerical results show that the communication distance between network elements must be taken into account at the time of establishing the design requirements of any reliable application against jamming attacks. Furthermore, it is established that the receiver’s sensitivity level is a central parameter for changing the frequency used for the power transmission initially selected by the nodes.
The Internet of Things (IoT) is a key technology to interconnect the real and digital worlds, enabling the development of smart cities and services. The timely collection of data is essential for IoT ...services. In scenarios such as agriculture, industry, transportation, public safety, and health, wireless sensor networks (WSNs) play a fundamental role in fulfilling this task. However, WSNs are commonly deployed in sensitive and remote environments, thus facing the challenge of jamming attacks. Therefore, these networks need to have the ability to detect such attacks and adopt countermeasures to guarantee connectivity and operation. In this work, we propose a novel clustering-based self-healing strategy to overcome jamming attacks, in which we denominate fairness cooperation with power allocation (FCPA). The proposed strategy, aware of the presence of the jammer, clusters the network and designates a cluster head that acts as a sink node to collect information from its cluster. Then, the most convenient routes to overcome the jamming are identified and the transmit power is adjusted to the minimum value required to guarantee the reliability of each link. Finally, through the weighted use of the relays, the lifetime of each subnetwork is extended. To show the impact of each capability of FCPA, we compare it with multiple benchmarks that only partially possess these capabilities. In the proposal evaluation, we consider a WSN composed of 64 static nodes distributed in a square area. Meanwhile, to assess the impact of the jamming attack, we consider seven different locations of the attacker. All experiments started with each node's battery full and stopped after one of these batteries was depleted. In these scenarios, FCPA outperforms all other strategies by more than 50% of the information transmitted, due to the efficient use of relay power, through the weighted balance of cooperative routes. On average, FCPA permits 967,961 kb of information transmitted and 63% of residual energy, as energy efficiency, from all the analyzed scenarios. Additionally, the proposed clustering-based self-healing strategy adapts to the change of jammer location, outperforming the rest of the strategies in terms of information transmitted and energy efficiency in all evaluated scenarios.
Jamming attacks in wireless sensor networks (WSNs) scenarios are detrimental to the performance of these networks and affect the security and stability of the service perceived by users. Therefore, ...the evaluation of the effectiveness of smart environment platforms based on WSNs has to consider the system performance when data collection is executed under jamming attacks. In this work, we propose an experimental testbed to analyze the performance of a WSN using the IEEE 802.15.4 CSMA/CA unslotted mode under jamming attacks in terms of goodput, packet receive rate (PRR), and energy consumption to assess the risk for users and the network in the smart scenario. The experimental results show that constant and reactive jamming strategies severely impact the evaluated performance metrics and the variance’ of the received signal strength (RSS) for some signal-to-interference-plus-noise ratio (SINR) ranges. The measurements obtained using the experimental testbed were correlated with analytical models. The results show that in the presence of one interferer, for SINR values higher than 4.5 dB, the PRR is almost 0.99, and the goodput 3.05 Kbps, but the system performance is significantly degraded when the amount of interferers increases. Additionally, the energy efficiency associated with reactive strategies is superior to the constant attack strategy. Finally, based on the evaluated metrics and with the proposed experimental testbed, our findings offer a better understanding of jamming attacks on the sensor devices in real smart scenarios.
This paper presents experimental evaluation on various Machine Learning (ML) models used for Simple Power Attacks (SPA) on a device which uses an Elliptic Curve Cryptography (ECC). The device used in ...this investigation is an Atmega 328 U which has an 8-bit architecture. The paper provides a comparison between the detection of the secret key using ML algorithms. Based on the results obtained in the research, certain recommendations are made.
A wireless communication aided with Cooperative Jamming in order to enhance Physical Layer security is modeled with Game Theory, using Secrecy Capacity as payment function. To completely take in ...account the inherent randomness of the wireless channel, a Second Order Cone Programming deterministic equivalent is derived from the game resulting probabilistic optimization problem. Results show how upper and lower bounds of the secrecy capacity, associated to the game values, can be used to characterize the system. Suggested mixed strategies are implemented and compared with pure strategies, and it’s shown that performance of mixed strategies, in terms of outage probability, lays exactly between the performances of pure strategies.
Physical layer security has been widely studied by the scientific community from a theoretical point of view, but the lack of practical metrics that can deliver a quick and easy-to-read response for ...the communications engineer makes it difficult to implement this type of security in current technologies. That is why this article proposes two practical metrics derived from the Bite error rate (BER) vs Signal to noise ratio (SNR) that quantify the security against the eavesdropper and the readability of the message in the legitimate receiver, finding a feasible power distribution for transmission.
Side Channel Attack Countermeasure for Low Power Devices with AES Encryption Ruminot-Ahumada, Nicolas; Valencia-Cordero, Claudio; Abarzua-Ortiz, Rodrigo
2021 IEEE International Conference on Automation/XXIV Congress of the Chilean Association of Automatic Control (ICA-ACCA),
2021-March-22
Conference Proceeding
The advancement of Internet of Things produces a massive increase in the use of low-power devices, which can contain sensitive information. Most of these devices do not have the necessary security to ...protect their information. Therefore, the work aims is analyze and compare countermeasures for SCA in low-power devices with 128-AES encryption. In this scenario, we analyze existing countermeasures and conclude that algorithm-based countermeasures are more suitable for low-power devices. Subsequently, we run a set of tests to understand the scope of CPA attacks and thus establish a countermeasure that is tailored to these devices. Finally, we propose a countermeasure based on byte logic, comparing it with traditional countermeasures of the same type.
The interference attack or better known as jamming attacks are very easy to implement affecting the service of any wireless communication system given the vulnerability of data sent to the user. This ...attack by denying the normal operation of the service detracts from the purpose of these systems. In general, a jamming attack is difficult to detect given the little experimental data provided by the literature. Therefore, the purpose of this work is to present the experimental results obtained from an indoor Wireless Sensor Network in the presence of a constant jamming. The results are based on performance metrics such as Bit Error Rate, Packet Error Rate and Throughput, in order to analyze the behavior of these metrics in the presence of an attack and thus generate ideas to detect and/or combat them.