An Effective Approach for Mitigating Reactive Jamming Attacks in Wireless Sensor Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 7
Abstract
Wireless Sensor Network (WSN) is an emerging technology for various applications public sector, private sector and military. It formed by a large number of networked sensing nodes. It contains of many sensor devices to cooperatively monitor selected target locations and communicate with base stations. Due to the different requirements of large-scale and realtime data processing in WSNs, provide high security is very critical in many sensor network regions and applications also against attacks especially jamming attacks. Moreover, to overcome the problems in existing methods against reactive jamming attacks, we propose an effective approach for identifying the trigger nodes and mitigating jamming attacks in WSN, whose transmission activate any active jammers. In this paper, we examine two main parts, identification or localization of trigger nodes and avoid active jammers in transmission. First, of all, to design better routing protocol to identification of triggers nodes, so it is easily identify the active jammers. Secondly, we propose an effective approach to avoid reactive jamming attacks. The theoretical analysis and experimental results show that our solution performs well in terms of time management and different complexities means messages, which in turn provides a good approach to defend reactive jamming attacks.
Authors and Affiliations
D Sivasankar, D Venkatesh, M Vijaya Bhaskar
Dynamic Approach for Secure Data Publishing in Mining
More than a few anonymization techniques, such as simplification and bucketization, have been deliberate for privacy protecting micro data publishing. Current work has shown that generalization loses substantial quant...
Online Clustering Of Multiple Data Streams
This paper presents an online Clustering of Data Stream Algorithm which can be used for on-line summarization of multiple data stream over fixed time length. A data stream is a large and continuously increasing seque...
Understanding of Customer Profiling and Segmentation Using K-Means Clustering Method for Raipur Sahkari Dugdh Sangh Milk Products
The Milk product industry collects huge amounts of data on sales, customer's buying history, goods transportation , consumption and services. Customer profiling is the method for finding out the specific and similar...
A Reliable Image Steganography with Image Clustering and Robust Steganography using IWT
Steganography is the science that includes imparting mystery information in a suitable sight and multimedia bearer, e.g., picture, sound, and video records. In this paper, we propose a changed secure steganography pla...
Optimize Energy Consumption with priority forwarder list in Wireless Sensor Networks
Opportunistic routing always useful to increase the network throughput by forwarding the packets to the nodes which are nearer to the destination node. These nodes are called as forwarder listed nodes during the tran...