Security vulnerabilities and countermeasures against jamming attacks in Wireless Sensor Networks: A survey

Sunakshi Jaitly, H. Malhotra, B. Bhushan
{"title":"Security vulnerabilities and countermeasures against jamming attacks in Wireless Sensor Networks: A survey","authors":"Sunakshi Jaitly, H. Malhotra, B. Bhushan","doi":"10.1109/COMPTELIX.2017.8004033","DOIUrl":null,"url":null,"abstract":"Wireless sensor network is a collection of several nodes in a network capable of sharing information in wireless medium. Due to the presence of wireless medium it is highly vulnerable to network attacks. WSN has many applications ranging from monitoring of environment to highly restricted military and surveillance where security is a major requirement. The most common and dangerous attack which can be proved harmful for WSN is jamming attack. In jamming an adversary can limit the capabilities of WSN communication by interfering with RF signals using certain jamming devices. Securing a WSN is one of the major concerns of network safety. In this paper, we have discussed various jamming techniques and types of jammers. We have also listed some countermeasures of jamming which, if used, depending on the application can significantly reduce the chances and effects of jamming. Some limitations and challenges of WSN are also explained. Starting from the introduction about the WSN, our work will cover all the pros and cons of the jammers and countermeasures which can help an interested researcher to gain some knowledge about the topic.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"13 1","pages":"559-564"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"54","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPTELIX.2017.8004033","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 54

Abstract

Wireless sensor network is a collection of several nodes in a network capable of sharing information in wireless medium. Due to the presence of wireless medium it is highly vulnerable to network attacks. WSN has many applications ranging from monitoring of environment to highly restricted military and surveillance where security is a major requirement. The most common and dangerous attack which can be proved harmful for WSN is jamming attack. In jamming an adversary can limit the capabilities of WSN communication by interfering with RF signals using certain jamming devices. Securing a WSN is one of the major concerns of network safety. In this paper, we have discussed various jamming techniques and types of jammers. We have also listed some countermeasures of jamming which, if used, depending on the application can significantly reduce the chances and effects of jamming. Some limitations and challenges of WSN are also explained. Starting from the introduction about the WSN, our work will cover all the pros and cons of the jammers and countermeasures which can help an interested researcher to gain some knowledge about the topic.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
无线传感器网络的安全漏洞及抗干扰研究综述
无线传感器网络是一个网络中若干节点的集合,这些节点能够在无线媒介中共享信息。由于无线介质的存在,它极易受到网络攻击。无线传感器网络有许多应用,从环境监测到高度限制的军事和监视,其中安全是一个主要的要求。干扰攻击是对无线传感器网络危害最大、最常见的攻击。在干扰中,对手可以通过使用某些干扰设备干扰射频信号来限制无线传感器网络的通信能力。保护无线传感器网络是网络安全的主要问题之一。本文讨论了各种干扰技术和干扰机的类型。我们还列出了一些干扰的对策,如果使用这些对策,根据应用可以显着减少干扰的机会和影响。分析了无线传感器网络的局限性和面临的挑战。从介绍无线传感器网络开始,我们的工作将涵盖所有干扰器和对策的优缺点,这可以帮助感兴趣的研究人员获得一些关于该主题的知识。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Classification of mental tasks using S-transform based fractal features Gauge Theory and spontaneous breaking of symmetry in superconductors Stable type-2 fuzzy logic control of TCSC to improve damping of power systems An analysis on broadband SHG using TIR-QPM in a multi-tapered slab of ZnSe in mid-IR region Analytical study of SINR for OFDMA Uplink in presence of Transceiver Phase Noise
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1