A Survey of Energy Efficient Network Protocols for Wireless Networks
Wireless Networks
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
The nesC language: A holistic approach to networked embedded systems
PLDI '03 Proceedings of the ACM SIGPLAN 2003 conference on Programming language design and implementation
MobiCom poster: top five myths about the energy consumption of wireless communication
ACM SIGMOBILE Mobile Computing and Communications Review
Poster abstract: wiseMAC, an ultra low power MAC protocol for the wiseNET wireless sensor network
Proceedings of the 1st international conference on Embedded networked sensor systems
Experimental evaluation of wireless simulation assumptions
MSWiM '04 Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
Communication Models for Algorithm Design in Networked Sensor Systems
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 8 - Volume 09
Protocols and Architectures for Wireless Sensor Networks
Protocols and Architectures for Wireless Sensor Networks
IEEE Communications Magazine
Hi-index | 0.00 |
Wireless Sensor Networks (WSNs) operate with varying duty cycles to meet their application-specific criteria such as the availability, reliability, and the life expectancy of the system. This variation in duty cycle consequently affects the system characteristics including the interference and collision of signals. However, the sensitivity to physical jamming attacks with respect to duty cycle of the network is not widely explored area of research. This paper presents a detailed analysis of the effect of the duty cycle to the interference and collision of signals in the WSNs. In particular, our simulation model depicts a log normal shadowing model to represent a realistic wireless channel and observe the effects of duty cycle variation when a physical jamming attack is launched on the network using a compromised node. Our results show that setting the duty cycle at predetermined value would help minimize the packet drop ratio of the network.