2015
DOI: 10.3390/s150407619
|View full text |Cite
|
Sign up to set email alerts
|

On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks

Abstract: In this work, we compare a recently proposed routing protocol, the multi-parent hierarchical (MPH) protocol, with two well-known protocols, the ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR). For this purpose, we have developed a simulator, which faithfully reifies the workings of a given protocol, considering a fixed, reconfigurable ad hoc network given by the number and location of participants, and general network conditions. We consider a scenario that can be found in a large numb… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
27
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 22 publications
(27 citation statements)
references
References 16 publications
0
27
0
Order By: Relevance
“…In reactive jamming, for MAC-layer protocols using Backward Error Correction, such as go-back-n or repetitive select, the attack would be successful if at least one bit of the packet is altered. Reactive jammer is energy efficient, because only transmits when it detects a packet, and therefore it is harder to detect since it could mimic packet collisions that are caused by normal traffic activity in the network [ 9 , 10 ].…”
Section: Reactive Jamming Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…In reactive jamming, for MAC-layer protocols using Backward Error Correction, such as go-back-n or repetitive select, the attack would be successful if at least one bit of the packet is altered. Reactive jammer is energy efficient, because only transmits when it detects a packet, and therefore it is harder to detect since it could mimic packet collisions that are caused by normal traffic activity in the network [ 9 , 10 ].…”
Section: Reactive Jamming Attackmentioning
confidence: 99%
“…The jamming detection model considers energy consumption, an average number of packet re-transmissions and the average number of retrials in the inner loop of the CSMA/CA algorithm. These three metrics have previously shown to be affected by jamming conditions [ 10 , 11 ].…”
Section: Proposed Mitigation Mechanism For Jamming Attacksmentioning
confidence: 99%
“…This process helps: i) To filter out external malicious clients from entering the network; and, ii) To bind a unique IP address with the ad hoc ID of the client. IP address is not only useful to uniquely identify the client in the global communication scenario but also helps to fix accountability to the participating clients [12]. Any registered client found guilty can be fixed and such clients can be eliminated from the network.…”
Section: Requirement and Challenges Of Proposed Protocolmentioning
confidence: 99%
“…For LTE systems, jamming is also regarded as a major attack that causes significant DoS [7,8]. While most works have focused on the physical-layer aspects of jamming attacks, reference [9] evaluates the resilience of WSNs to jamming attacks in the aspect of the routing protocol.…”
Section: Introductionmentioning
confidence: 99%