2010
DOI: 10.1145/1824766.1824772
|View full text |Cite
|
Sign up to set email alerts
|

Detection of reactive jamming in sensor networks

Abstract: Abstract-An integral part of most security-and safety-critical applications is a dependable and timely alarm notification. However, owing to the resource constraints of wireless sensor nodes (i.e., their limited power and spectral diversity), ensuring a timely and jamming-resistant delivery of alarm messages in applications that rely on wireless sensor networks is a challenging task. With current alarm forwarding schemes, blocking of an alarm by jamming is straightforward and jamming is very likely to remain u… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
105
0
3

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 131 publications
(108 citation statements)
references
References 22 publications
0
105
0
3
Order By: Relevance
“…The investigation of the research question above examines realistic attacker capabilities that are assumed in a number of works on wireless communication without exploration, e. g. in [11,16,24,25]. We therefore see our work as an important building block for constructing realistic threat models and appropriate countermeasures.…”
Section: Problem Statementmentioning
confidence: 99%
See 3 more Smart Citations
“…The investigation of the research question above examines realistic attacker capabilities that are assumed in a number of works on wireless communication without exploration, e. g. in [11,16,24,25]. We therefore see our work as an important building block for constructing realistic threat models and appropriate countermeasures.…”
Section: Problem Statementmentioning
confidence: 99%
“…In the context of wireless systems, message-based attacker models have been adopted in a number of works, e. g., in [11,15,16,22,24,25]. In these works, the attacker is usually assumed to be able to eavesdrop, insert, modify, replay, delay, or delete any signal being transmitted on the wireless channel.…”
Section: Classifying Wireless Attacksmentioning
confidence: 99%
See 2 more Smart Citations
“…Achieving above value and the full benefits of IoT connectivity [2] means building connected products on top of a comprehensive IoT platform which spans the full spectrum of technologies required for the IoT [4].…”
Section: Introductionmentioning
confidence: 99%