Algorithm 457: finding all cliques of an undirected graph
Communications of the ACM
Broadcast Anti-Jamming Systems
ICON '99 Proceedings of the 7th IEEE International Conference on Networks
JAM: A Jammed-Area Mapping Service for Sensor Networks
RTSS '03 Proceedings of the 24th IEEE International Real-Time Systems Symposium
Channel surfing and spatial retreats: defenses against wireless denial of service
Proceedings of the 3rd ACM workshop on Wireless security
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Channel surfing: defending wireless sensor networks from interference
Proceedings of the 6th international conference on Information processing in sensor networks
On Construction of Virtual Backbone in Wireless Ad Hoc Networks with Unidirectional Links
IEEE Transactions on Mobile Computing
Hi-index | 0.00 |
There exist many studies against reactive jamming attacks, however, these methods, i.e. frequency hopping or channel surfing, require excessive computational capabilities on wireless devices which are serious side effects in wireless sensor networks. To avoid the problems in existing methods, we propose a novel approach against reactive jamming attacks by identifying the trigger nodes, whose transmissions activate any reactive jammers. The identification of these trigger nodes can help us (i) carefully design a better routing protocol by switching these nodes into only receivers to avoid activating jammers and (ii) locate the jammers based on the trigger nodes, thus providing an alternative mechanism against reactive jamming attacks. In this paper, we provide an efficient method to identify the trigger nodes by utilizing the group testing techniques and minimum collection of disjoint disk covers to reduce the message and computational overhead. The theoretical analysis and experimental results show that our solution performs extremely well in terms of time and message complexities, which in turn provides a good approach to defend reactive jamming attacks.