2014 International Conference on Communication and Signal Processing 2014
DOI: 10.1109/iccsp.2014.6950086
|View full text |Cite
|
Sign up to set email alerts
|

Detection of jammer in Wireless Sensor Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…Hence, our approach increases the jamming detection rate or credible of jamming detection. Figures 10,11,and 12 show the comparison of TDR with various configurations of 5, 25, and 50 members of proposed system with the existing systems. The comparison result represents that the proposed approach has improved the TDR and negligible FDR than the existing approaches.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Hence, our approach increases the jamming detection rate or credible of jamming detection. Figures 10,11,and 12 show the comparison of TDR with various configurations of 5, 25, and 50 members of proposed system with the existing systems. The comparison result represents that the proposed approach has improved the TDR and negligible FDR than the existing approaches.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…9 The various possible metrics 10 explored for jamming detection. These metrics are, PDR, 11 PLR, carrier sensing time (CST), packet sent ratio (PSR), bit error rate (BER), received signal strength indicator (RSSI), and bad packet ratio (BPR). The author used packets dropped per terminal (PDPT) and SNR metrics for detection of jamming in sensor network.…”
Section: Related Workmentioning
confidence: 99%
“…Some of papers show attacks classified on pasive and active (Shahzad et al, 2017). Radio interference attack is described in Hamieh et al (2009), Nancy et al (2014) and Hamza et al (2016).…”
Section: Related Workmentioning
confidence: 99%
“…Such as putting node into sleep mode during the duration of jam signal, in order to preserve power efficiency, also periodically waking up nodes in order to check if the jamming signal is still active (Ghildiyal et al, 2014). In the paper (Nancy et al, 2014), the new approach for detection and protection from jamming attacks, is described. This approach uses two modules which determine the level of interference in WSN.…”
Section: Gavrić and Simićmentioning
confidence: 99%
“…Due to this Jammers attack, the efficiency of the wireless communication drastically decreases. Thus different methods are need to be found to detect the presence of the jammers or the jamming device, to avoid them in the transmission process [1][2].…”
Section: Introductionmentioning
confidence: 99%