Open Access   Article Go Back

Safeguarding Against Reactive Jammers In Wireless Sensor Network

Qureshi Hafsa Mohammadi1 , Raafiya Gulmeher2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-7 , Page no. 1200-1204, Jul-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i7.12001204

Online published on Jul 31, 2018

Copyright © Qureshi Hafsa Mohammadi, Raafiya Gulmeher . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Qureshi Hafsa Mohammadi, Raafiya Gulmeher, “Safeguarding Against Reactive Jammers In Wireless Sensor Network,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.7, pp.1200-1204, 2018.

MLA Style Citation: Qureshi Hafsa Mohammadi, Raafiya Gulmeher "Safeguarding Against Reactive Jammers In Wireless Sensor Network." International Journal of Computer Sciences and Engineering 6.7 (2018): 1200-1204.

APA Style Citation: Qureshi Hafsa Mohammadi, Raafiya Gulmeher, (2018). Safeguarding Against Reactive Jammers In Wireless Sensor Network. International Journal of Computer Sciences and Engineering, 6(7), 1200-1204.

BibTex Style Citation:
@article{Mohammadi_2018,
author = {Qureshi Hafsa Mohammadi, Raafiya Gulmeher},
title = {Safeguarding Against Reactive Jammers In Wireless Sensor Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {7 2018},
volume = {6},
Issue = {7},
month = {7},
year = {2018},
issn = {2347-2693},
pages = {1200-1204},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2582},
doi = {https://doi.org/10.26438/ijcse/v6i7.12001204}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i7.12001204}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2582
TI - Safeguarding Against Reactive Jammers In Wireless Sensor Network
T2 - International Journal of Computer Sciences and Engineering
AU - Qureshi Hafsa Mohammadi, Raafiya Gulmeher
PY - 2018
DA - 2018/07/31
PB - IJCSE, Indore, INDIA
SP - 1200-1204
IS - 7
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
338 298 downloads 204 downloads
  
  
           

Abstract

Amid the most recent decade, Reactive Jamming Attack has developed as an extraordinary security danger to remote sensor systems, because of its mass devastation to authentic sensor correspondences and trouble to be unveiled and safeguarded. Thinking about the particular qualities of receptive jammer hubs, another plan to deactivate them by proficiently recognizing every single trigger hub, whose transmissions summon the jammer hubs, has been proposed and created. Such a trigger-recognizable proof technique can fill in as an application-layer administration and advantage numerous current receptive sticking protecting plans. In this paper, from one viewpoint, we use a few advancement issues to give an entire trigger-distinguishing proof administration structure for problematic remote sensor systems. Then again, we give an enhanced calculation respect to two refined sticking models, with a specific end goal to upgrade its heartiness for different system situations. Hypothetical investigation and reenactment comes about are incorporated to approve the execution of this structure.

Key-Words / Index Term

Jamming, Transmissions, network optimization, WSN’s

References

[1] Du. D.Z and F. Hwang. F, “Pooling Designs: Group Testing in Molecular Biology”.World Scientific, 2006.
[2] Goodrich .M Atallah .M, and Tamassia .R, “Indexing Information for Data Forensics,” Proc. Third Applied Cryptography and Network Security Conf. (ACNS), 2005.
[3] Gupta .R, Walrand .J, and Goldschmidt .O, “Maximal Cliques in Unit Disk Graphs: Polynomial Approximation,” Proc. Int’l Network Optimization Conf. (INOC), 2005.
[4] Guruswami .V and Rangan .C, “Algorithmic Aspects of Clique- Transversal and Clique-Independent Sets,” Discrete Applied Math., vol. 100, pp. 183-202, 2000.
[5] Hang .W, Zanji .W, and Jingbo .G, “Performance of DSSS Against Repeater Jamming,” Proc. IEEE 13th Int’l Conf. Electronics, Circuits and Systems (ICECS), 2006
[6] Shin .I, Shen .Y, Xuan .Y,Thai .M.T, and Znati .T, “Reactive Jamming Attacks in Multi-Radio Wireless Sensor Networks: An Efficient Mitigating Measure by Identifying Trigger Nodes,” Proc. Second ACM Int’l Workshop Foundations of Wireless Ad Hoc and Sensor Networking and Computing (FOWANC), in conjunction with MobiHoc, 2009.
[7] Sidek .O and Yahya .A, “Reed Solomon Coding for Frequency Hopping Spread Spectrum in Jamming Environment,” Am. J. Applied Sciences, vol. 5, no. 10, pp. 1281-1284, 2008.
[8] Strasser .M, Danev .B, and Capkun .S, “Detection of Reactive Jamming in Sensor Networks,” ACM Trans. Sensor Networks, vol. 7, pp. 1-29, 2010.
[9] Tague .P, Nabar .S, Ritcey .J.A, and Poovendran .R, “Jamming- Aware Traffic Allocation for Multiple-Path Routing Using Portfolio Selection,” IEEE/ACM Trans. Networking, vol. 19, no. 1, pp. 184-194, Feb. 2011.
[10]Wang .H, Guo .J, and Wang .Z, “Feasibility Assessment of Repeater Jamming Technique for DSSS,” Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), 2007. [10] Wood .A.D, Stankovic .J, and Son .S, “A Jammed-Area Mapping Service for Sensor Networks,” Proc. IEEE 24th Real-Time Systems Symp. (RTSS), 2003.