PJ6400: Mobile Collector in Defense against Jamming Attack

نویسندگان

  • Lu Cui
  • Natalija Vlajic
  • Andrew Eckford
چکیده

A jamming attack on a wireless network is an attack in which the adversary attempts to cause a denialof-service (DoS) by conducting simple, continuous or intermittent, transmission of high-power interfering signal. Wireless sensor networks (WSNs) are particular vulnerable to jamming attacks due to its natural characters. In our work, we propose to combat jamming attacks on WSNs through the deployment of mobile nodes. Specifically, we consider sending a mobile node inside the jammed area to periodically collect/sense data. Subsequently, the mobile is responsible for bringing the data to the most optimal exit point/node on the boundary of the attacked region. An algorithm named COEP is proposed for calculating the optimal exit point according to varies network conditions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Spectrum Sensing Data Falsification Attack in Cognitive Radio Networks: An Analytical Model for Evaluation and Mitigation of Performance Degradation

Cognitive Radio (CR) networks enable dynamic spectrum access and can significantly improve spectral efficiency. Cooperative Spectrum Sensing (CSS) exploits the spatial diversity between CR users to increase sensing accuracy. However, in a realistic scenario, the trustworthy of CSS is vulnerable to Spectrum Sensing Data Falsification (SSDF) attack. In an SSDF attack, some malicious CR users deli...

متن کامل

Exposure and Avoidance Mechanism of Black Hole and Jamming Attack in Mobile Ad Hoc Network

Mobile ad hoc network (MANETs) is an infrastructure-less/self-configurable system in which every node carries on as host or router and every node can participate in the transmission of packets. Because of its dynamic behaviour such system is more susceptible against various sorts of security threats, for example, Black hole, Wormhole , Jamming , Sybil, Byzantine attack and so on which may block...

متن کامل

Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks

Multi-radio (multi-interface, multi-channel) 802.11 and sensor networks have been proposed to increase network capacity and to reduce energy consumption, to name only a few of their applications. They are vulnerable, however, to jamming attacks, in which attackers block communication by radio interference or MAC-protocol violation. Two jamming countermeasures have been proposed, namely software...

متن کامل

Sensitive Ants for Denial Jamming Attack on Wireless Sensor Network

A new defense mechanism for different jamming attack on Wireless Sensor Network (WSN) based on ant system it is introduced. The artificial sensitive ants react on network attacks in particular based on their sensitivity level. The information is re-directed from the attacked node to its appropriate destination node. It is analyzed how are detected and isolated the jamming attacks with mobile ag...

متن کامل

Radio Jamming Attacks Against Two Popular Mobile Networks

The dependence on Mobile Networks is growing. The success of the Internet was followed by Denial of Service attacks. What if the same happens to Mobile Networks? This paper gives an introduction to the concept of Radio Jamming and explores jamming resistance of two popular mobile networks: GSM and WLAN. Radio interfaces of the two systems are analysed and effective jamming-to-noise ratios are c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009