2017
DOI: 10.1371/journal.pone.0177326
|View full text |Cite
|
Sign up to set email alerts
|

Robust multiple frequency multiple power localization schemes in the presence of multiple jamming attacks

Abstract: Localization of the wireless sensor network is a vital area acquiring an impressive research concern and called upon to expand more with the rising of its applications. As localization is gaining prominence in wireless sensor network, it is vulnerable to jamming attacks. Jamming attacks disrupt communication opportunity among the sender and receiver and deeply impact the localization process, leading to a huge error of the estimated sensor node position. Therefore, detection and elimination of jamming influenc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 48 publications
(30 reference statements)
0
2
0
Order By: Relevance
“…There is still some weakness in the existing approaches such as security resilience, connection probability and scalability. [131], MAPE [126], Linear SVM [128], IoT Malware Detection [127], ELSA [130], Hybrid Spyware Detection [129], BLOWFISH, PRESENT, HEIGHT, AES, 3DES, RSA, ECC, DSA, DH [233], [40], K-Anonymity Technique [135], BUDDIES [136], LSR [146], Lightweight RSS-Based Scheme [148], Privacy-Preserving Scheme [147], Game Theory [152], [153], [234], CHA-IDS [140], TCGA [145], INTI [143], Sensor Scheduling Technique [120], Mobile Agent-Based IDS [150], Determeministic Detection [156], Jammer Localization, Detection and Mitigation [157]- [159], [182], [189], [190] and Tamper Detection [160].…”
Section: A Discussion On Existing Security Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…There is still some weakness in the existing approaches such as security resilience, connection probability and scalability. [131], MAPE [126], Linear SVM [128], IoT Malware Detection [127], ELSA [130], Hybrid Spyware Detection [129], BLOWFISH, PRESENT, HEIGHT, AES, 3DES, RSA, ECC, DSA, DH [233], [40], K-Anonymity Technique [135], BUDDIES [136], LSR [146], Lightweight RSS-Based Scheme [148], Privacy-Preserving Scheme [147], Game Theory [152], [153], [234], CHA-IDS [140], TCGA [145], INTI [143], Sensor Scheduling Technique [120], Mobile Agent-Based IDS [150], Determeministic Detection [156], Jammer Localization, Detection and Mitigation [157]- [159], [182], [189], [190] and Tamper Detection [160].…”
Section: A Discussion On Existing Security Approachesmentioning
confidence: 99%
“…In [189], [190], cancellation and the usage of different parts of the spectrum are introduced for neutralizing the jammer signals, whereas some attempt to estimate the position of the jammer for further action. Some of them have utilized autonomic computing [157]- [159] to detect jammer's location. Node Injection is another vital attack in the physical layer.…”
Section: B Autonomic Approachesmentioning
confidence: 99%