Abstract

Jamming attack is a serious security threat in wireless sensor networks. Therefore, it is important to frame a mechanism to protect wireless sensor networks from various jamming attacks. Jammer intrusion detection and jamming detection are two separate issues. In this paper, a novel jammer detection framework to detect the intrusion of jammer and the presence of jamming in a cluster-based wireless sensor network is proposed. The proposed framework is novel in three aspects: whenever the cluster head receives a packet, it first verifies whether the source node is a legitimate, new node, or a jammer node. Second, when the source node is declared as a new one in the first step, then the framework validates whether the new node is legitimate node in the previous cluster or a jammer node by using cluster head code. Third, the framework observes the behavior of the newly joined node and the existing nodes to identify whether the nodes in the cluster is jammed or not. Additionally, it also classifies the types of jamming, if the presence of jamming is detected. Simulation result shows that the proposed framework performs extremely well and achieves jamming detection rate as high as 99.88 %.

Highlights

  • Wireless sensor network encompasses small sensor nodes

  • This paper addresses this research gap by introducing a threestep novel jammer detection framework

  • 6 Conclusions A novel jammer detection framework is proposed to detect the presence of jammer and jamming in the clusterbased wireless sensor networks

Read more

Summary

Introduction

Wireless sensor network encompasses small sensor nodes. The sensor node includes sensing unit, computing unit, communicating components, and memory [1]. These nodes are deployed in a region called sensor field to sense the environment. Sensor nodes are restricted by memory space, energy, and computational power. The sensor nodes work in an infrastructureless and dynamically changing environment [2] and route the collected data to the destination node for further interpretation

Results
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call