{"title":"无线传感器网络的安全漏洞及抗干扰研究综述","authors":"Sunakshi Jaitly, H. Malhotra, B. Bhushan","doi":"10.1109/COMPTELIX.2017.8004033","DOIUrl":null,"url":null,"abstract":"Wireless sensor network is a collection of several nodes in a network capable of sharing information in wireless medium. Due to the presence of wireless medium it is highly vulnerable to network attacks. WSN has many applications ranging from monitoring of environment to highly restricted military and surveillance where security is a major requirement. The most common and dangerous attack which can be proved harmful for WSN is jamming attack. In jamming an adversary can limit the capabilities of WSN communication by interfering with RF signals using certain jamming devices. Securing a WSN is one of the major concerns of network safety. In this paper, we have discussed various jamming techniques and types of jammers. We have also listed some countermeasures of jamming which, if used, depending on the application can significantly reduce the chances and effects of jamming. Some limitations and challenges of WSN are also explained. Starting from the introduction about the WSN, our work will cover all the pros and cons of the jammers and countermeasures which can help an interested researcher to gain some knowledge about the topic.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"13 1","pages":"559-564"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"54","resultStr":"{\"title\":\"Security vulnerabilities and countermeasures against jamming attacks in Wireless Sensor Networks: A survey\",\"authors\":\"Sunakshi Jaitly, H. Malhotra, B. Bhushan\",\"doi\":\"10.1109/COMPTELIX.2017.8004033\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Wireless sensor network is a collection of several nodes in a network capable of sharing information in wireless medium. Due to the presence of wireless medium it is highly vulnerable to network attacks. WSN has many applications ranging from monitoring of environment to highly restricted military and surveillance where security is a major requirement. The most common and dangerous attack which can be proved harmful for WSN is jamming attack. In jamming an adversary can limit the capabilities of WSN communication by interfering with RF signals using certain jamming devices. Securing a WSN is one of the major concerns of network safety. In this paper, we have discussed various jamming techniques and types of jammers. We have also listed some countermeasures of jamming which, if used, depending on the application can significantly reduce the chances and effects of jamming. Some limitations and challenges of WSN are also explained. Starting from the introduction about the WSN, our work will cover all the pros and cons of the jammers and countermeasures which can help an interested researcher to gain some knowledge about the topic.\",\"PeriodicalId\":6917,\"journal\":{\"name\":\"2017 International Conference on Computer, Communications and Electronics (Comptelix)\",\"volume\":\"13 1\",\"pages\":\"559-564\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"54\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Computer, Communications and Electronics (Comptelix)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMPTELIX.2017.8004033\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPTELIX.2017.8004033","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security vulnerabilities and countermeasures against jamming attacks in Wireless Sensor Networks: A survey
Wireless sensor network is a collection of several nodes in a network capable of sharing information in wireless medium. Due to the presence of wireless medium it is highly vulnerable to network attacks. WSN has many applications ranging from monitoring of environment to highly restricted military and surveillance where security is a major requirement. The most common and dangerous attack which can be proved harmful for WSN is jamming attack. In jamming an adversary can limit the capabilities of WSN communication by interfering with RF signals using certain jamming devices. Securing a WSN is one of the major concerns of network safety. In this paper, we have discussed various jamming techniques and types of jammers. We have also listed some countermeasures of jamming which, if used, depending on the application can significantly reduce the chances and effects of jamming. Some limitations and challenges of WSN are also explained. Starting from the introduction about the WSN, our work will cover all the pros and cons of the jammers and countermeasures which can help an interested researcher to gain some knowledge about the topic.