2017
DOI: 10.3390/s17071573
|View full text |Cite
|
Sign up to set email alerts
|

MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks

Abstract: In this work, we present the design of a mitigation scheme for jamming attacks integrated to the routing protocols MPH, AODV, and DSR. The resulting protocols are named MPH-M (Multi-Parent Hierarchical - Modified), AODV-M (Ad hoc On Demand Distance Vector - Modified), and DSR-M (Dynamic Source Routing - Modified). For the mitigation algorithm, if the detection algorithm running locally in each node produces a positive result then the node is isolated; second, the routing protocol adapts their paths avoiding th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 27 publications
0
6
0
Order By: Relevance
“…In this work, two new collaborative mechanisms for jamming detection, based on cooperation by receiving feedback from other network nodes, are proposed. The two proposed techniques are improved versions of the method published in [15] with a free training characteristic, i.e., both techniques do not require a previous learning step. These techniques are named (i) Connected Mechanism and (ii) Extended Mechanism.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In this work, two new collaborative mechanisms for jamming detection, based on cooperation by receiving feedback from other network nodes, are proposed. The two proposed techniques are improved versions of the method published in [15] with a free training characteristic, i.e., both techniques do not require a previous learning step. These techniques are named (i) Connected Mechanism and (ii) Extended Mechanism.…”
Section: Introductionmentioning
confidence: 99%
“…The first one is based on the comparison of performance parameters with respect to directly connected neighbors by interchanging packets with performance metric information, whereas the latter relays The second one is based on the comparison of the parameters known by a collector node, that establishes differences between them and detect a possible affected zone. A notorious advantage of the these two detection techniques proposed in this work concerning the training technique from [15] is that the implementation is faster because there is no previous learning stage. Another advantage is that if the attacker is active during the learning stage, the reference values of this step will be erroneous parameters and the system will not be able to identify the presence of the jammer.…”
Section: Introductionmentioning
confidence: 99%
“…It functions by dynamically assigning nodes to different channels in the jammed area to defeat the attacker. The resilience of WSN routing protocols, such as AODV, DSR and the recent MPH to reactive jamming attack has been studied in [ 22 ]. The authors, thereafter proposed a modified version of the protocols, AODV-M, DSR-M and MPH-M that ensure that whenever the nodes running the detection algorithm detect an attack, the node is isolated and the routing protocols adapt their paths to avoid the isolated nodes.…”
Section: Related Workmentioning
confidence: 99%
“…In this way, the packages can be far from the source node and this increases the security of the source node. The performance of some routing algorithms in defending against jamming attack can be found in [18]. Recently, Mahmoud et al [4] proposed a cloud-based source-location-privacy protection scheme.…”
Section: Related Studiesmentioning
confidence: 99%