IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications 2007
DOI: 10.1109/infcom.2007.155
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Jamming Attacks and Network Defense Policies in Wireless Sensor Networks

Abstract: Abstract-We consider a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor network. The jammer controls the probability of jamming and transmission range to cause maximal damage to the network in terms of corrupted communication links. The jammer action ceases when it is detected by a monitoring node in the network, and a notification message is transferred out of the jamming region. The jammer is detected at a monitor node by employing an optimal detection test based on the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
142
0

Year Published

2007
2007
2020
2020

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 225 publications
(142 citation statements)
references
References 14 publications
0
142
0
Order By: Relevance
“…Due to the topic's importance, wireless network jamming has been extensively studied in the applied research fields [1, 5, 6, 22, 26-28, 30, 31, 39, 41-43], both from the attacker's perspective [6,26,27,43] as well as from the defender's perspective [1,5,6,27,28,30,41,43]-also in multi-hop settings (e.g. [21,32,[45][46][47]).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the topic's importance, wireless network jamming has been extensively studied in the applied research fields [1, 5, 6, 22, 26-28, 30, 31, 39, 41-43], both from the attacker's perspective [6,26,27,43] as well as from the defender's perspective [1,5,6,27,28,30,41,43]-also in multi-hop settings (e.g. [21,32,[45][46][47]).…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, a jammer that simultaneously blocks a small number of frequencies renders spread spectrum techniques useless in this case. As jamming strategies can come in many different flavors, detecting jamming activities by simple methods based on signal strength, carrier sensing, or packet delivery ratios has turned out to be quite difficult [27].…”
Section: Related Workmentioning
confidence: 99%
“…RELATED WORK Jamming-resistant communication has long been an active research area [10], [11], [13], [19]. To provide jammingresistant broadcast, several group-based schemes were studied [3]- [5].…”
Section: Performance Analysismentioning
confidence: 99%
“…For example, jammers can be classified in terms of capabilities (broadband or narrowband) or behaviors (constant, deceptive, random, reactive) [8]. Jammers discussed and used in prior works [6][7][8][9][10][11] can be also categorized based on their working layers in the network stack. Physical layer jammers directly emit energy on communication channels to interfere the reception of legitimate transmissions.…”
Section: Related Workmentioning
confidence: 99%