A Survey on an Effective Defense Mechanism against Reactive Jamming Attacks in WSN

نویسندگان

  • Manojkumar M. K.
  • Sathya D.
چکیده

A Wireless Sensor Network (WSN) is a self-configure network of sensor nodes communicate among themselves using radio signals and deployed in quantity to sense, monitor and to understand the physical world. A jammer is an entity which interferes with the physical transmission and reception of wireless communications. Reactive jamming attack is a major security problem in the wireless sensor network. The reactive jammer stays quiet when the channel is idle. The jammer starts transmitting a radio signal as soon as it senses activity on the channel. The reactive jammer nodes will be deactivated by identifying all the trigger nodes, at the same time a jammer node is localized by exploiting the changes in the neighbor nodes. The affected node can be identified, by analyzing the changes in its communication range, compared to its neighbors. The paper proposes a survey on trigger node identification and a detailed survey on techniques to identify trigger nodes and highly concentrated on the reactive jammer.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Activity Modelling and Countermeasures on Jamming Attack

In last few decades, there has been a wide demand of wireless sensor networks (WSNs) in extensive mission critical applications such as monitoring, industrial control, military, health and many more. The larger demand of WSN in mission critical applications makes it more prone towards malicious users who are trying to invade. These security assaults worsen the performance of WSN in large extent...

متن کامل

An Effective Approach for Mitigating Reactive Jamming Attacks in Wireless Sensor Networks

Wireless Sensor Network (WSN) is an emerging technology for various applications public sector, private sector and military. It formed by a large number of networked sensing nodes. It contains of many sensor devices to cooperatively monitor selected target locations and communicate with base stations. Due to the different requirements of large-scale and realtime data processing in WSNs, provide...

متن کامل

Deceptive Routing in Relay Networks

Physical-layer and MAC-layer defense mechanisms against jamming attacks are often inherently reactive to experienced delay and loss of throughput after being attacked. In this paper, we study a proactive defense mechanism against jamming in multi-hop relay networks, in which one or more network sources introduce a deceptive network flow along a disjoint routing path. The deceptive mechanism lev...

متن کامل

Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks

Multi-radio (multi-interface, multi-channel) 802.11 and sensor networks have been proposed to increase network capacity and to reduce energy consumption, to name only a few of their applications. They are vulnerable, however, to jamming attacks, in which attackers block communication by radio interference or MAC-protocol violation. Two jamming countermeasures have been proposed, namely software...

متن کامل

Sensitive Ants for Denial Jamming Attack on Wireless Sensor Network

A new defense mechanism for different jamming attack on Wireless Sensor Network (WSN) based on ant system it is introduced. The artificial sensitive ants react on network attacks in particular based on their sensitivity level. The information is re-directed from the attacked node to its appropriate destination node. It is analyzed how are detected and isolated the jamming attacks with mobile ag...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1402.1252  شماره 

صفحات  -

تاریخ انتشار 2014