Geomorphic zonalisation of wireless sensor networks based on prevalent jamming effects

Geomorphic zonalisation of wireless sensor networks based on prevalent jamming effects

For access to this article, please select a purchase option:

Buy article PDF
(plus tax if applicable)
Buy Knowledge Pack
10 articles for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IET Communications — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

This study provides a mechanism to divide the complete geographical extent of wireless sensor networks (WSNs) under attack of a jammer into different zones as per the severity of jamming experienced by various nodes of the network. There are some existing methods such as, ‘Localised Edge Detection in Sensor Field’, ‘Robust Edge Detection in Wireless Sensor Networks’ and ‘JAM: A Jammed Area Mapping Service for Sensor Networks’, that solve similar problems; but all of them are able to map the geographical extent into only two zones – ‘jammed’ and ‘not jammed’, and they all are vulnerable to information warfare as they all require to communicate even while under a jamming attack. The proposed method for zonalisation of the geographical extent of WSNs based on the effects of jamming on various nodes follows the centralised approach, where the mapping is done by the base station through hull tracing of jammed nodes as per their pre-calculated jamming indices thus enforcing the economy of scale, and making it one of the most energy-efficient and fastest-known mapping systems. The method is procedure-centric, as against almost all of the known systems that are protocol-centric, wherein the proposed method dispenses with the need of inter-nodal communications during moments of jamming. The system has no inherent inaccuracies.


    1. 1)
    2. 2)
      • Xu, W., Trappe, W., Zhang, Y., Wood, T.: `The feasibility of launching and detecting jamming attacks in wireless networks', Proc. Sixth ACM Int. Symp. on Mobile Ad Hoc Networking and Computing, 2005, p. 46–57.
    3. 3)
      • Law, Y.W., Hartel, P., Hartog, J.D., Havinga, P.: `Link-layer jamming attacks on S-MAC', IEEE Second European Workshop on Wireless Sensor Networks, 2005, p. 217–225.
    4. 4)
    5. 5)
    6. 6)
      • Wood, A., Stankovic, J.A., Zhou, G.: `DEEJAM: Defeating energy-efficient jamming in IEEE 802.15.4-based wireless networks', SECON, June 2007, San Diego, California, USA.
    7. 7)
      • R. Muraleedharan , L.A. Osadciw . Jamming attack detection and countermeasures in wireless sensor network using ant system.
    8. 8)
      • M. Cakiroglu , A.T. Ozcerit . (2008) Jamming detection mechanisms for wireless sensor networks.
    9. 9)
      • K.W. Reese , A. Salem , G. Dimitoglou . Using standard deviation in signal strength detection to determine jamming in wireless networks.
    10. 10)
      • Strasser, M., Danev, B., Capkun, S.: `Detection of reactive jamming in sensor networks', ETH Zurich D-INFK Technical report 634, August 2009.
    11. 11)
    12. 12)
    13. 13)
    14. 14)
      • M. De Berg , O. Cheong , M. Van Kreveld , M. Overmars . (2008) Computational geometry: algorithms and applications.
    15. 15)
      • B. Karp , H.T. Kung . (2000) GPSR: Greedy perimeter stateless routing for wireless networks.
    16. 16)
      • Couto, D.D., Morris, R.: `Location proxies and intermediate node forwarding for practical geographic forwarding', Technical report MIT-LCS-TR824, MIT Laboratory for Computer Science, June 2001.
    17. 17)
      • R. Anderson . (2001) Security engineering: a guide to building dependable distributed system.
    18. 18)
      • Roman, G.C., Huang, Q., Hazemi, A.: `Consistent group membership in ad hoc networks', Proc. 23rd ICSE, 2001, p. 381–388.
    19. 19)
      • Hellerstein, J.M., Hong, W., Madden, S., Stanek, K.: `Beyond average: towards sophisticated sensing with queries', Proc. IPSN, April 2003, Palo Alto, California, USA.
    20. 20)
      • R. Nowak , U. Mitra . (2003) Boundary estimation in sensor networks: theory and methods.
    21. 21)
    22. 22)
    23. 23)
      • Abdelzaher, T., Blum, B., Evans, D.: `EnviroTrack: an environmental programming model for tracking applications in distributed sensor networks', 24thInt. Conf. on distributed Computing Systems, 2004, p. 582–89.
    24. 24)
      • Chintalapudi, K.K., Govindan, R.: `Localized edge detection in a sensor field', Proc. IEEE SNPA, 2003, p. 59–70.
    25. 25)
      • Xu, W.: `On adjusting power to defend wireless networks from jamming', Proc. Fourth Annual Int. Conf. on Mobile and Ubiquitous Systems: Networking and Services (Mobiquitous), August 2007.
    26. 26)
      • Mallery, C.J., Medidi, M.: `Robust edge detection in wireless sensor networks', Proc. IEEE GLOBECOM, 2008, p. 1–5.
    27. 27)
      • Wood, A.D., Stankovic, J.A., Son, S.: `JAM: A jammed area mapping service for sensor networks', 24thIEEE Real-Time Syst. Symp., 2003, p. 286–297.

Related content

This is a required field
Please enter a valid email address