Professional Documents
Culture Documents
org
Published in IET Communications
Received on 5th September 2011
Revised on 1st January 2012
doi: 10.1049/iet-com.2011.0641
ISSN 1751-8628
Abstract: Underwater sensor networks (UWSNs) can be deployed for sensing the environment in oceanographic columns and
other water bodies in which they are deployed. The peculiar characteristic of the underwater medium, coupled with the queer
nature of the sound waves in water, poses an enigmatic problem for UWSN researchers. In this study, the authors focus on
the problem of UWSN jamming, which is a popular type of denial-of-service attack. The existing jamming detection
solutions for sensor networks are primarily targeted towards the terrestrial ones. In this work, the authors study the unique
characteristics of jamming in UWSN, and propose a protocol, known as underwater jamming detection protocol (UWJDP), to
detect and mitigate jamming in underwater environments. The results show that if the packet delivery ratio (PDR) is less
than or equal to 0.8, the authors have the maximum probability of detecting jamming. The jamming detection ratio is around
2 11% more for the said PDR.
convex hull of a set of points in 3D are the beneath and chosen over constant jammer and reactive jammer,
beyond algorithm [42] and the quick hull algorithm [41]. because of their energy efciency. In some cases, we used
Since our architecture is 3D, we should ideally use 3D the transmission duration of a random jammer similar to
convex hull algorithm. However, because of the large time that of a deceptive jammer, though it could pause in
complexity it becomes unsuitable for UWSNs. Thus, we between. We follow two types of pattern for sending data
use the convex hull algorithm designed for 2D, such as the from each type of jammer: exponential (Exp) and constant
Graham Scan algorithm [35], in 3D environment with some bit rate (CBR). ECA, PSR and PDR were chosen to be the
adaptations which are explained below. metrics to detect jamming, as according to the authors, they
The 2D convex hull algorithm is applied to run at each could suitably combine to detect underwater jamming.
level (nodes having xed z-coordinate). So, the neighbour
nodes of a particular level map the jammed area of that 6.1 Experimental results
level. We have different mappings at different levels and
there is a node at each level which does the mapping. Since The energy consumed by the network was calculated by
any data have to pass through the nodes neighbouring the varying the jammer parameters, such as packet length and
jammed region before it enters into the jammed region and transmission power of the jammers, as well as the network
these neighbouring nodes already have mapped the jammed parameter, such as number of nodes in the network. The
area, so data transmission through the jammed area can be plots of results derived from the above simulations are
reduced. This algorithm runs on all nodes which are explained in the following experiments. The outputs were
immediate neighbours of the jammed region. on expected lines, though, few interesting results were also
observed.
6 Simulation results and performance
evaluation Experiment 1: Energy consumed by the network was
measured by varying the packet length of the jammer
Aqua-Sim [43, 44], an UWSN simulator, was used to perform whereas the transmission power of the network was kept
the simulation tasks. The results were recorded in both tabular constant. The received result is shown in Fig. 6. From the
and graphical forms. The details of the input parameters used received results we can conclude that the energy consumed
in our simulation and their respective values for both by the network because of random jammer was less than
legitimate nodes and underwater jammer are listed in Table 2. the deceptive jammer. This proves the idea on the other
The nodes were distributed randomly in a 3D space. Two way that random jammer is more energy-efcient.
types of jammers were used for the simulation study: Secondly, the increase in packet length of the jammer
random jammer and deceptive jammer. They were increases the overall energy consumed by the network for
both types of jammer.
Fig. 6 Graphic representation of the variation of energy Experiment 3: In this experiment, the difference in energy
consumption with respect to jammers packet length consumption between jammed and normal conditions of a
Table 3 Output values regarding the energy consumption by each node in the network under normal and jamming condition