Denial of Service in Sensor Networks
Computer
JAM: A Jammed-Area Mapping Service for Sensor Networks
RTSS '03 Proceedings of the 24th IEEE International Real-Time Systems Symposium
Low-power DoS attacks in data wireless LANs and countermeasures
ACM SIGMOBILE Mobile Computing and Communications Review
Versatile low power media access for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
TinySec: a link layer security architecture for wireless sensor networks
SenSys '04 Proceedings of the 2nd international conference on Embedded networked sensor systems
Analysis of Wired Short Cuts in Wireless Sensor Networks
ICPS '04 Proceedings of the The IEEE/ACS International Conference on Pervasive Services
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Hybrid sensor networks: a small world
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
VigilNet: An integrated sensor network system for energy-efficient surveillance
ACM Transactions on Sensor Networks (TOSN)
Design of a wireless sensor network platform for detecting rare, random, and ephemeral events
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Wormhole-Based Antijamming Techniques in Sensor Networks
IEEE Transactions on Mobile Computing
Probability and Statistics for Computer Scientists
Probability and Statistics for Computer Scientists
Data forwarding in extremely low duty-cycle sensor networks with unreliable communication links
Proceedings of the 5th international conference on Embedded networked sensor systems
Emergent properties: detection of the node-capture attack in mobile wireless sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Jamming detection mechanisms for wireless sensor networks
Proceedings of the 3rd international conference on Scalable information systems
Dwarf: delay-aware robust forwarding for energy-constrained wireless sensor networks
DCOSS'07 Proceedings of the 3rd IEEE international conference on Distributed computing in sensor systems
Trivium: a stream cipher construction inspired by block cipher design principles
ISC'06 Proceedings of the 9th international conference on Information Security
The capacity of wireless networks
IEEE Transactions on Information Theory
Short paper: reactive jamming in wireless networks: how realistic is the threat?
Proceedings of the fourth ACM conference on Wireless network security
Investigation of signal and message manipulations on the wireless channel
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Jamming aware routing for MHWN with dynamic measurement
Computers and Electrical Engineering
In VANETs we trust?: characterizing RF jamming in vehicular networks
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, systems, and applications
Evaluating resistance to jamming and casual interception in mobile wireless networks
Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
Detection of reactive jamming in DSSS-based wireless networks
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
Joint reactive jammer detection and localization in an enterprise WiFi network
Computer Networks: The International Journal of Computer and Telecommunications Networking
Ad Hoc Networks
M-cluster and X-ray: Two methods for multi-jammer localization in wireless sensor networks
Integrated Computer-Aided Engineering
Hi-index | 0.00 |
An integral part of most security- and safety-critical applications is a dependable and timely alarm notification. However, owing to the resource constraints of wireless sensor nodes (i.e., their limited power and spectral diversity), ensuring a timely and jamming-resistant delivery of alarm messages in applications that rely on wireless sensor networks is a challenging task. With current alarm forwarding schemes, blocking of an alarm by jamming is straightforward and jamming is very likely to remain unnoticed. In this work, we propose a novel jamming detection scheme as a solution to this problem. Our scheme is able to identify the cause of bit errors for individual packets by looking at the received signal strength during the reception of these bits and is well-suited for the protection of reactive alarm systems with very low network traffic. We present three different techniques for the identification of bit errors based on: predetermined knowledge, error correcting codes, and limited node wiring. We perform a detailed evaluation of the proposed solution and validate our findings experimentally with Chipcon CC1000 radios. The results show that our solution effectively detects sophisticated jamming attacks that cannot be detected with existing techniques and enables the formation of robust sensor networks for dependable delivery of alarm notifications. Our scheme also meets the high demands on the energy efficiency of reactive surveillance applications as it can operate without introducing additional wireless network traffic.