2019
DOI: 10.1002/dac.4205
|View full text |Cite
|
Sign up to set email alerts
|

Rapid jamming detection approach based on fuzzy in WSN

Abstract: It is necessary for securing wireless sensor networks from jamming, since these networks are easily attacked by jammers. Jamming may be made by either external jammer node or internal node, which may become as an adversary in future. In this paper, two approaches are proposed in the cluster-based sensor network to detect the maliciousness level of nodes to secure sensor networks from jamming attacks. First approach detects maliciousness level of nodes using two modules, namely, certification module and monitor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 24 publications
(30 reference statements)
0
4
0
Order By: Relevance
“…It can be designed to cover the frequency bands of 2.61, 3.12, 4.32, 6.54, and 7.62 GHz. It can be designed using advanced design system (ADS) and measured using vector network analyzer (VNA). “Rapid Jamming Detection in approach based on fuzzy in WSN”—Authored by K , Pradeep Mohan Kumar; K P , Vijayakumar; M , Saravanan; N , Arivazhagan; P , Vijayakumar: This paper [11] proposes two approaches in the cluster‐based sensor network to detect the maliciousness level of nodes to secure sensor networks from jamming attacks. First approach detects maliciousness level of nodes using two modules, namely, certification module, and monitoring module.…”
Section: Discussionmentioning
confidence: 99%
“…It can be designed to cover the frequency bands of 2.61, 3.12, 4.32, 6.54, and 7.62 GHz. It can be designed using advanced design system (ADS) and measured using vector network analyzer (VNA). “Rapid Jamming Detection in approach based on fuzzy in WSN”—Authored by K , Pradeep Mohan Kumar; K P , Vijayakumar; M , Saravanan; N , Arivazhagan; P , Vijayakumar: This paper [11] proposes two approaches in the cluster‐based sensor network to detect the maliciousness level of nodes to secure sensor networks from jamming attacks. First approach detects maliciousness level of nodes using two modules, namely, certification module, and monitoring module.…”
Section: Discussionmentioning
confidence: 99%
“…Kanagasabapathy et al [2] proposed two approaches in the cluster-based sensor system to identify the maliciousness level of hubs to verify sensor systems from jamming assaults. The first methodology recognizes maliciousness level of hubs utilizing two modules, in particular, affirmation module and checking module.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Another approach for protecting WSNs from jamming attacks is provided in [82], which introduced two schemes to identify the maliciousness level of nodes in clustered WSNs. The first scheme contains two modules named monitoring and certification modules.…”
Section: Ai Based Solutions To Security Challenges In Wsnsmentioning
confidence: 99%