A MODIFIED ALGORITHM AND PROTOCOL FOR JAMMING ATTACK PREVENTION FOR WIRELESS SENSOR NETWORK.

{"title":"A MODIFIED ALGORITHM AND PROTOCOL FOR JAMMING ATTACK PREVENTION FOR WIRELESS SENSOR NETWORK.","authors":"","doi":"10.29121/ijesrt.v9.i6.2020.9","DOIUrl":null,"url":null,"abstract":"Wireless networks are gaining popularity to its peak nowadays, because the users need wireless connectivity regardless of their geographic position. there's an increasing threat of attacks on the Wireless sensor Network (WSN). Node jamming attack is one in all the security threat within which the traffic is redirected to such a node that really doesn't exist within the network. It’s an analogy to the Jamming within the universe within which things disappear. The node presents itself in such some way to the node that it will attack different nodes and networks knowing that it's the shortest path. WSNs should have a secure approach for transmission and communication that is kind of difficult and very important issue. so as to produce secure communication and transmission, research worker worked specifically on the security problems in WSNs, and lots of secure routing protocols and security measures inside the networks were proposed. The scope of this work is to review the effects of Jamming attack in WSN exploitation (and prevention this attack exploitation security primarily based modified. Comparative analysis of Jamming attack for each protocols is taken under consideration. The impact of Node Jamming attack on the performance of WSN is evaluated searching for that protocol is additional vulnerable to the attack and the way abundant is that the impact of the attack on each protocols. The measurements were taken within the light of packet delivery ratio, throughput, end-to-end delay and residual energy. Simulation is completed in Network simulator tool two (NS-2).","PeriodicalId":426715,"journal":{"name":"June-2020","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"June-2020","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.29121/ijesrt.v9.i6.2020.9","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Wireless networks are gaining popularity to its peak nowadays, because the users need wireless connectivity regardless of their geographic position. there's an increasing threat of attacks on the Wireless sensor Network (WSN). Node jamming attack is one in all the security threat within which the traffic is redirected to such a node that really doesn't exist within the network. It’s an analogy to the Jamming within the universe within which things disappear. The node presents itself in such some way to the node that it will attack different nodes and networks knowing that it's the shortest path. WSNs should have a secure approach for transmission and communication that is kind of difficult and very important issue. so as to produce secure communication and transmission, research worker worked specifically on the security problems in WSNs, and lots of secure routing protocols and security measures inside the networks were proposed. The scope of this work is to review the effects of Jamming attack in WSN exploitation (and prevention this attack exploitation security primarily based modified. Comparative analysis of Jamming attack for each protocols is taken under consideration. The impact of Node Jamming attack on the performance of WSN is evaluated searching for that protocol is additional vulnerable to the attack and the way abundant is that the impact of the attack on each protocols. The measurements were taken within the light of packet delivery ratio, throughput, end-to-end delay and residual energy. Simulation is completed in Network simulator tool two (NS-2).
一种改进的无线传感器网络抗干扰算法和协议。
如今,无线网络的普及达到了顶峰,因为用户需要无线连接,无论他们的地理位置如何。无线传感器网络(WSN)受到的攻击威胁越来越大。节点干扰攻击是一种将流量重定向到网络中不存在的节点的安全威胁。这类似于宇宙中的干扰,在其中事物消失了。这个节点以某种方式呈现给另一个节点,它会攻击其他节点和网络,因为它知道这是最短的路径。无线传感器网络的安全传输和通信是一个非常重要的问题。为了实现安全的通信和传输,研究人员专门研究了无线传感器网络的安全问题,提出了许多安全路由协议和网络内部的安全措施。本文的工作范围是综述干扰攻击对无线传感器网络开发的影响,并在此基础上对这种攻击的防范进行改进。对各协议的干扰攻击进行了对比分析。分析了节点干扰攻击对无线传感器网络性能的影响,寻找易受攻击的协议,并比较了攻击对各协议的影响。这些测量是根据分组传送率、吞吐量、端到端延迟和剩余能量进行的。仿真在网络模拟器工具二(NS-2)中完成。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信