A Survey on an Effective Defense Mechanism against Reactive Jamming Attacks in WSN
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 7, Issue 3
Abstract
A Wireless Sensor Network (WSN) is a self-configure network of sensor nodes communicate among themselves using radio signals and deployed in quantity to sense, monitor and to understand the physical world. A jammer is an entity which interferes with the physical transmission and reception of wireless communications. Reactive jamming attack is a major security problem in the wireless sensor network. The reactive jammer stays quiet when the channel is idle. The jammer starts transmitting a radio signal as soon as it senses activity on the channel. The reactive jammer nodes will be deactivated by identifying all the trigger nodes, at the same time a jammer node is localized by exploiting the changes in the neighbor nodes. The affected node can be identified, by analyzing the changes in its communication range, compared to its neighbors. The paper proposes a survey on trigger node identification and a detailed survey on techniques to identify trigger nodes and highly concentrated on the reactive jammer.
Authors and Affiliations
Manojkumar. M. K , Sathya. D
Analysis of Job Scheduling Algorithms in Cloud Computing
Cloud computing is flourishing day by day and it will continue in developing phase until computers and internet era is in existence. While dealing with cloud computing, a number of issues are confronted like heavy load o...
Software Platforms for Mobile Distributed Systems
As a result of the computing technology that becomes ever smaller and cheaper it is now possible to integrate it into everyday material objects. This advanced integration of technology allows the underlying computer to d...
Control Algorithm for Adaptive Front Light Systems
During the night driving, the reaction time of a human driver go into a compromise due to inadequate peripheral vision or lack of color and depth perception. The conventional headlamps of any automotive vehicle are insuf...
An Effective Diffie-Hellman Key Based Intrusion Detection to Secure for Multicast Routing in MANET
Energy Based Optimal Relaying in Heterogeneous Radio Access Networks
Due to recent trends in mobile communication system, much attention has be given to heterogeneous networks in which a mobile equipment is able to access multiple networks that are present in a locality. Here each random...