2011
DOI: 10.7763/ijcte.2011.v3.415
|View full text |Cite
|
Sign up to set email alerts
|

A Swarm Based Defense Technique for Jamming Attacks in Wireless Sensor Networks

Abstract: Abstract-Jamming can interrupt wireless transmission and occur by mistake in form of interference, noise or as collision at the receiver or in the circumstance of an attack. In this paper, we propose a swarm based defense technique for jamming attacks in wireless sensor networks. Swarm intelligence algorithm is proficient enough to adapt change in network topology and traffic. The sender and receiver change channels in order to stay away from the jammer, in channel hoping technique. The jammers remain on a sin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…The swarm-based defensive method provided in [16] deals with sleep attacks denial using the anomaly detecting model for the determination of the traffic effect within sensor nodes. Therefore, the frequency oscillation technique was established.…”
Section: Related Workmentioning
confidence: 99%
“…The swarm-based defensive method provided in [16] deals with sleep attacks denial using the anomaly detecting model for the determination of the traffic effect within sensor nodes. Therefore, the frequency oscillation technique was established.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, by selecting the clusters head with the most remaining energy, less overhead and the smallest distance to the sink, the lifetime of the network has been increased. As shown in the Figure 12(a), and 13 ASDA-RSA increases the lifetime by more than 19,22,24,28,31, and 39% those of current approaches, respectively.…”
Section: Simulation Resultsmentioning
confidence: 85%
“…Periyanayagi, et al [11] propose an intellectual swarm based technique aimed at identifying jamming attacks in WSN. The technique enables analyzing data from sensors against jamming attacks, dynamically modifying the exploited communication channel.…”
Section: Related Workmentioning
confidence: 99%
“…• specific types of ERE attacks, such as vampire attacks [1][2][3], denial-of-sleep attacks [4][5][6][7][8], attacks on specific crypto-protocols, causing increased power consumption on their executing devices [9], various jamming attacks [10,11], replay attacks and collision attacks [12], etc. ; • specific applications and systems analyzed for possible ERE attacks, such as attacks on personal portable mobile devices in direct line of sight [13,14], combined attacks on mobile devices, using vulnerabilities of a cellular network server [15], attacks on separately located sensors [16], attacks on mesh networks built on specific network protocols [17], attacks on drones [18], attacks on implantable medical devices, taking into account various ways to replenish their charge [19], etc.…”
Section: Introductionmentioning
confidence: 99%