Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Denial of Service in Sensor Networks
Computer
JAM: A Jammed-Area Mapping Service for Sensor Networks
RTSS '03 Proceedings of the 24th IEEE International Real-Time Systems Symposium
Understanding packet delivery performance in dense wireless sensor networks
Proceedings of the 1st international conference on Embedded networked sensor systems
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Detection of reactive jamming in sensor networks
ACM Transactions on Sensor Networks (TOSN)
ACM SIGMOBILE Mobile Computing and Communications Review
Anomaly-Based intrusion detection algorithms for wireless networks
WWIC'10 Proceedings of the 8th international conference on Wired/Wireless Internet Communications
Detection of reactive jamming in DSSS-based wireless networks
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Joint reactive jammer detection and localization in an enterprise WiFi network
Computer Networks: The International Journal of Computer and Telecommunications Networking
M-cluster and X-ray: Two methods for multi-jammer localization in wireless sensor networks
Integrated Computer-Aided Engineering
Hi-index | 0.00 |
The Jamming-style Denial of Service (J-DoS) attacks are significant causes of malfunctioning of Wireless Sensor Networks (WSNs). The nodes of WSNs are prone to external disturbances especially when they are used in hostile environments. The attackers mainly operate in the wireless communication medium by following a couple of diverse scenarios. In this paper, we have developed two detection mechanisms used for J-DoS attacks in order to differentiate the legitimate and adversary scenarios. The detection mechanisms designed utilize some network parameters and additional packets to separate and classify normal conditions and adversary ones. Having detected the type of the attacker, appropriate counter measures can be applied.