Wireless Sensor Network Jammer Attack: A Detailed Review
نویسندگان
چکیده
منابع مشابه
DDOS Attack Detection on Wireless Sensor Network: A Review
In this sense, DoS, especially DDoS, not only threatens the Internet, but also threatens the civil security, due to its prevalent usage in cyber-crimes. Thus to understand well the characteristics of DDoS problems and investigate corresponding defense mechanisms have significant contributions not only for academia and industry, but also for the social security and emergency management agencies,...
متن کاملWormhole Attack in Wireless Sensor Network
In multi hop wireless systems, such as wireless sensor networks, mobile ad hoc network, security is an important factor. It becomes more critical issue when we transmit important data between nodes. There are a lot of attacks available in wireless sensor network or mobile ad hoc network. In our paper we are going to discuss about a particularly devastating attack, known as the wormhole attack. ...
متن کاملWireless sensor network design through genetic algorithm
In this paper, we study WSN design, as a multi-objective optimization problem using GA technique. We study the effects of GA parameters including population size, selection and crossover method and mutation probability on the design. Choosing suitable parameters is a trade-off between different network criteria and characteristics. Type of deployment, effect of network size, radio communication...
متن کاملRouting Hole Handling Techniques for Wireless Sensor Networks: A Review
A Wireless Sensor Network consists of several tiny devices which have the capability to sense and compute the environmental phenomenon. These sensor nodes are deployed in remote areas without any physical protections. A Wireless Sensor Network can have various types of anomalies due to some random deployment of nodes, obstruction and physical destructions. These anomalies can diminish the sensi...
متن کاملWormhole Attack in Wireless Sensor Network: a Survey
Wireless sensor networks passes a practical and Economically feasible alternative to manual data association in general and military scenarios, providing a means of surveillance of a region of field and providing warning of any threats. In common wormhole attack, the attacker receives packets in the network, forward them through a wired or wireless association with high-bandwidth low-latency bo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal for Research in Applied Science and Engineering Technology
سال: 2020
ISSN: 2321-9653
DOI: 10.22214/ijraset.2020.30844