Jamming Attack in Wireless Sensor Network: From Time to Space

2012 ◽  
Vol E95.B (6) ◽  
pp. 2113-2116
Author(s):  
Yanqiang SUN ◽  
Xiaodong WANG ◽  
Xingming ZHOU

In recent years, wireless sensor network (WSN) is the measure concern over network communication. A number of attacks are occurred at the time of network communication as result it hampers the smooth functionality, data flow and data transmission. In this article, we have proposed a trust-based intrusion detection system for physical layers attacks using DRI and Cross Check method. The HTBIDS is effective method to identify the abnormal nodes in wireless sensor network. The abnormal nodes are attacked by periodic jamming attack. We have considered the periodic jamming attack at physical layer for performance evaluation. Results show that HTBIDS performs better using detection accuracy (DA) and false alarm rate (FAR).


Author(s):  
SUPREETHA PATEL T P ◽  
K.N. SHREENATH

In recent days, reactive jamming attack has emerged as a great security threat to wireless sensor network [WSN]. Several strategies are developed to identify the trigger nodes, whose legitimate transmission activates any reactive jammer. After identifying the trigger node, the node will be shut down to deactivate the jammer and its routing information is deleted from the routing table, then the node can’t be used again in the network. Since the node can’t be used again in the network it is one of the major drawbacks. Hence to overcome the problem, In this paper we propose a novel approach, where the identified trigger nodes are put in to the scanning mode, so that we can reuse the trigger nodes, after deactivating the jammer node in the network.


2017 ◽  
Vol 13 (09) ◽  
pp. 38
Author(s):  
Zhang Yu ◽  
Peng Xiaodong ◽  
Liu Feng

Jamming attack is an effective way to disrupt the communication of adversaries. This paper tries to design methods for blocking all receiving links (BARL) of a wireless sensor network (WSN). Firstly the condition for blocking a receiving link is derived and AJRL (area for jamming a receiving link) is defined. Then BARL jamming method for a network with an unlimited JSR parameter is discussed. Finally, under a limited JSR parameter, BARL jamming attack problem on several networks types, i.e. JN (N,≥N), JN(2,1), JN(3,1)and JN(N,≥2, are discussed; and BARL jamming methods are presented respectively. The methods are proved mathematically


Sign in / Sign up

Export Citation Format

Share Document