2014 Fourth International Conference on Communication Systems and Network Technologies 2014
DOI: 10.1109/csnt.2014.26
|View full text |Cite
|
Sign up to set email alerts
|

Identifying Jammers in Wireless Sensor Network with an Approach to Defend Reactive Jammer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…The final EVM is expressed in both the RMS (18) and MAX (19). Because the maximum EVM can sense instantaneous distortions in the received signal, it can also detect more sophisticated jamming attacks that target a short-timed fragment of the legitimate signal.…”
Section: System Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…The final EVM is expressed in both the RMS (18) and MAX (19). Because the maximum EVM can sense instantaneous distortions in the received signal, it can also detect more sophisticated jamming attacks that target a short-timed fragment of the legitimate signal.…”
Section: System Modelmentioning
confidence: 99%
“…Accordingly, the effects of jamming are observed jointly on the RSS-and BER-based metrics, and jamming detection threshold levels are set on these metrics. The jamming detection performance of such methods is demonstrated with simulations in [16][17][18][19][20], and with experimental studies as well as simulations in [21][22][23]. On the other hand, in [24][25][26][27], these metrics are used to train machine learning algorithms such as support vector machines, neural networks, and random forests for jamming detection.…”
Section: Introductionmentioning
confidence: 99%
“…Since there is increase in the security challenges everyday and there are new ways detected for the confidential transmissions, there is an immense need to think over the situation [3]. Since the traditional approaches do not work, new approaches towards this problem are required.…”
Section: Fig1 Types Of Jammersmentioning
confidence: 99%
“…In defiance of, if the beacon is apperceived then they will edify the other nodes in to switch the channels to the other new ones. [3] Direct sequence spread spectrum (DSSS) is a technology used for the transmissions done in the local area wireless network. In the above technology, merging of a data signal with a high data rate bit sequence is done, which results in the division of the user data based on the spreading ratio.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation