2019
DOI: 10.1016/j.adhoc.2019.101874
|View full text |Cite
|
Sign up to set email alerts
|

Detection of jamming attack using timestamp for WSN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(11 citation statements)
references
References 3 publications
0
11
0
Order By: Relevance
“…The article by Rose et al [24] introduces a technique for WSN with clustering-based topologies. They propose the use of timestamps to detect the presence of malicious nodes, which generate a jamming attack.…”
Section: Related Workmentioning
confidence: 99%
“…The article by Rose et al [24] introduces a technique for WSN with clustering-based topologies. They propose the use of timestamps to detect the presence of malicious nodes, which generate a jamming attack.…”
Section: Related Workmentioning
confidence: 99%
“…Osanaiye, O. et al [ 20 ] have used an exponentially weighted moving average method to detect jamming using the packet inter-arrival time of the packets received from the sensor nodes. The authors in study [ 27 ] propose a technique based on clustering approach and timestamp which made a contribution to the grouping of sensor nodes and the timestamp calculated from one node to another node. A PDR and RSSI metrics are used by Vijayakumar, K. et al [ 28 ] to detect jamming with two methods: fuzzy inference system (FIS) and adaptive neuro-fuzzy inference system (ANFIS).…”
Section: Related Workmentioning
confidence: 99%
“…At this point, every node updates its local clock time by using pairwise or weighted averaging strategies until converging to the average of the initial clock among all nodes. The generic mathematical model of clock update rule for CTS can be written as [19]: where C i (k) is the local time at node i during each iteration 'k' and 'ε' is the constant step size for each iteration. N i is the set of neighboring nodes that can communicate reliably with node i.…”
Section: Consensus Time Synchronization Modelmentioning
confidence: 99%