Loading [a11y]/accessibility-menu.js
Locating jamming attackers in malicious wireless sensor networks | IEEE Conference Publication | IEEE Xplore

Locating jamming attackers in malicious wireless sensor networks


Abstract:

Recent years have witnessed a rapid growth of wireless sensor network applications in civil and military environments. Radio interference tends to be a serious threat in ...Show More

Abstract:

Recent years have witnessed a rapid growth of wireless sensor network applications in civil and military environments. Radio interference tends to be a serious threat in such applications. Jamming attacks are a direct consequence of radio interference that an adversary may intentionally launch. While it is necessary to defend against jamming attacks in order for sensor communication channels to be available and reliable, it is also difficult. In this paper, we develop a systematic approach to tackling jamming attacks. We propose robust fault-tolerant algorithms for the location discovery of jamming attackers that permit us to remove jamming attackers from wireless sensor networks. Then, we investigate the proposed approach through theoretical analysis and experiments. Our analytical and numerical results demonstrate the efficiency and effectiveness of the proposed approach.
Date of Conference: 01-03 December 2012
Date Added to IEEE Xplore: 10 January 2013
ISBN Information:

ISSN Information:

Conference Location: Austin, TX, USA

References

References is not available for this document.