DOI QR코드

DOI QR Code

A Cooperative Smart Jamming Attack in Internet of Things Networks

  • Al Sharah, Ashraf (Department of Electrical Engineering, College of Engineering Technology, Al-Balqa Applied University) ;
  • Owida, Hamza Abu (Medical Engineering Department, Al-Ahliyya Amman University) ;
  • Edwan, Talal A. (Department of Computer Engineering, The University of Jordan) ;
  • Alnaimat, Feras (Medical Engineering Department, Al-Ahliyya Amman University)
  • Received : 2022.03.01
  • Accepted : 2022.09.14
  • Published : 2022.12.31

Abstract

The emerging scope of the Internet-of-Things (IoT) has piqued the interest of industry and academia in recent times. Therefore, security becomes the main issue to prevent the possibility of cyberattacks. Jamming attacks are threads that can affect performance and cause significant problems for IoT device. This study explores a smart jamming attack (coalition attack) in which the attackers were previously a part of the legitimate network and are now back to attack it based on the gained knowledge. These attackers regroup into a coalition and begin exchanging information about the legitimate network to launch attacks based on the gained knowledge. Our system enables jammer nodes to select the optimal transmission rates for attacks based on the attack probability table, which contains the most probable link transmission rate between nodes in the legitimate network. The table is updated constantly throughout the life cycle of the coalition. The simulation results show that a coalition of jammers can cause highly successful attacks.

Keywords

Acknowledgement

This work is supported and sponsored by Al-Balqa Applied University and Al-Ahliyya Amman University. Persons or institutes who contributed to the papers but not enough to be coauthors may be introduced. Financial support, including foundations, institutions, pharmaceutical and device manufacturers, private companies, intramural departmental sources, or any other support should be described.

References

  1. M. Abdullahi, Y. Baashar, H. Alhussian, A. Alwadain, N. Aziz, L. F. Capretz, and S. J. Abdulkadir, "Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review," Electronics, vol. 11, no. 2, p. 198, Jan. 2022, DOI: 10.3390/electronics11020198.
  2. P. Chen, D. Zhang, L. Yu, and H. Yan, "Dynamic event-triggered output feedback control for load frequency control in power systems with multiple cyber attacks," IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 52, no. 10, pp. 1-13, Oct. 2022. DOI: 10.1109/TSMC.2022.3143903.
  3. X. Jin, S. Lu, C. Deng, and M. Chadli, "Distributed adaptive security consensus control for a class of multi-agent systems under network decay and intermittent attacks," Information Sciences, vol. 547, pp. 88-102, Feb. 2021. DOI: 10.1016/j.ins.2020.08.013.
  4. R. Ma, P. Shi, and L. Wu, "Dissipativity-based sliding-mode control of cyber-physical systems under denial-of-service attacks," IEEE Transactions on Cybernetics, vol. 51, no. 5, pp. 2306-2318, Mar. 2020. DOI: 10.1109/TCYB.2020.2975089.
  5. Y. Tian, X. Li, B. Dong, Y. Gao, and L. Wu, "Event-based sliding mode control under denial-of-service attacks," Science China Information Sciences, vol. 65, no. 6, Apr. 2022. DOI: 10.1007/s11432-021-3375-5.
  6. X. Huang and X. Wang, "Detection and isolation of false data injection attack in intelligent transportation system via robust state observer," Processes, vol. 10, no. 7, p. 1299, Jun. 2022. DOI: 10.3390/pr10071299.
  7. P. Koloveas, T. Chantzios, S. Alevizopoulou, S. Skiadopoulos, and C. Tryfonopoulos, "inTIME: A machine learning-based framework for gathering and leveraging web data to cyber-threat intelligence," Electronics, vol. 10, no. 7, p. 818, Mar. 2021. DOI: 10.3390/electronics10070818.
  8. G. Chen, Y. Gong, P. Xiao, and J. A. Chambers, "Physical layer network security in the full-duplex relay system," IEEE Transactions on Information Forensics and Security, vol. 10, no. 3, pp. 574-583, Mar. 2015. DOI: 10.1109/TIFS.2015.2390136
  9. G. Chen, J. P. Coon, and M. Di Renzo, "Secrecy outage analysis for downlink transmissions in the presence of randomly located eavesdroppers," IEEE Transactions on Information Forensics and Security, vol. 12, no. 5, pp. 1195-1206, May 2017. DOI: 10.1109/TIFS.2017.2656462.
  10. N. Geethanjali and E. Gayathri, "A survey on energy depletion attacks in wireless sensor networks," International Journal of Science and Research, vol. 3, no. 9, pp. 2070-2074, Sep. 2014.
  11. M. Labib, S. Ha, W. Saad, and J. H. Reed, "A colonel blotto game for anti-jamming in the internet of things," in 2015 IEEE Global Communications Conference (GLOBECOM), San Diego: CA, USA, pp. 1-6, 2015. DOI: 10.1109/GLOCOM.2015.7417437.
  12. M. N. Aman, M. H. Basheer, S. Dash, J. W. Wong, J. Xu, H.W. Lim, and B. Sikdar, "HAtt: Hybrid remote attestation for the internet of things with high availability," IEEE Internet of Things Journal, vol. 7, no. 8, pp. 7220-7233, Aug. 2020. DOI: 10.1109/JIOT.2020. 2983655.
  13. M. U. Farooq, M. Waseem, S. Mazhar, A. Khairi, and T. Kamal, "A review on internet of things (IoT)," International Journal of Computer Applications, vol. 113, no. 1, pp. 1-7, Mar. 2015. DOI: 10.5120/19787-1571.
  14. K. Zhao and L. Ge, "A survey on the internet of things security," in Proceedings of 2013 Ninth International Conference on Computational Intelligence and Security, Emeishan, China, pp. 663-667, 2013. DOI: 10.1109/CIS.2013.145.
  15. L. Basyoni, N. Fetais, A. Erbad, A. Mohamed, and M. Guizani, "Traffic analysis attacks on Tor: A survey," in 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), Doha, Qatar, pp. 183-188, 2020. DOI: 10.1109/ICIoT48696.2020.9089497.
  16. H. Fu, Y. Liu, Z. Dong, and Y. Wu, "A data clustering algorithm for detecting selective forwarding attack in cluster-based wireless sensor networks," Sensors, vol. 20, no. 1, p. 23, 2020. DOI: 10.3390/s20010023.
  17. G. Rajendran, R. R. Nivash, P. P. Parthy, and S. Balamurugan, "Modern security threats in the Internet of Things (IoT): Attacks and countermeasures," in 2019 International Carnahan Conference on Security Technology (ICCST), Chennai, India, pp. 1-6, 2019. DOI: 10.1109/CCST.2019.8888399.
  18. S. Choudhary and N. Kesswani, "Detection and prevention of routing attacks in internet of things," in 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications, New York: NY, USA, pp. 1537-1540. DOI: 10.1109/TrustCom/BigDataSE.2018.00219.
  19. R. Baskar, P. C. K. Raja, C. Joseph, and M. Reji, "Sinkhole attack in wireless sensor networksperformance analysis and detection methods," Indian Journal of Science and Technology, vol. 10, no. 12, pp. 1-8, May 2017. DOI: 10.17485/ijst/2017/v10i12/90904.
  20. T. Jamal, Z. Haider, S. A. Butt, and A. Chohan, Denial of service attack in cooperative networks, 2018, [Online] Available: arXiv:1810.11070, 2018.
  21. A. Rajan, J. Jithish, and S. Sankaran, "Sybil attack in IOT: Modelling and defenses," in Proceedings of 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2323-2327, Udupi, India, 2017. DOI: 10.1109/ICACCI.2017.8126193.
  22. N. Panda and B. K. Pattanayak, "Analysis of blackhole attack in AODV and DSR," International Journal of Electrical and Computer Engineering, vol. 8, no. 5, pp. 3092-3102, Oct. 2018. DOI: 10.11591/ijece.v8i5.pp3092-3102.
  23. M. Jeevamaheswari, R. A. Jothi, and V. Palanisamy, "AODV routing protocol to defence against packet dropping gray hole attack In MANET," International Journal of Scientific Research in Science and Technology, Jun. 2018.
  24. S. Deshmukh-Bhosale and S. S. Sonavane, "A real-time intrusion detection system for wormhole attack in the RPL based internet of things," Procedia Manufacturing, vol. 32, pp. 840-847, 2019. DOI: 10.1016/j.promfg.2019.02.292.
  25. I. Butun, P. Osterberg, and H. Song, "Security of the internet of things: Vulnerabilities, attacks, and countermeasures," IEEE Communications Surveys & Tutorials, vol. 22, no. 1, pp. 616-644, Nov. 2019. DOI: 10.1109/COMST.2019.2953364.
  26. A. Malik, S. Gautam, S. Abidin, and B. Bhushan, "Blockchain technology-future of IoT: Including Structure, limitations and various possible attacks," in Proceedings of 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT), Kannur, India, pp. 1100-1104, 2019. DOI: 10.1109/ICICICT46008.2019.8993144.
  27. N. Namvar, W. Saad, N. Bahadori, and B. Kelley, "Jamming in the internet of things: A game-theoretic perspective," in 2016 IEEE Global Communications Conference (GLOBECOM), Washington: DC, USA, pp. 1-6. DOI: 10.1109/GLOCOM.2016.7841922.