Security Vulnerabilities and Countermeasures against Jamming Attacks in Wireless Sensor Networks: A Survey

被引:0
|
作者
Jaitly, Sunakshi [1 ]
Malhotra, Harshit [1 ]
Bhushan, Bharat [2 ]
机构
[1] HMRITM, Dept Comp Sci & Engn, New Delhi, India
[2] Birla Inst Technol, Dept Comp Sci & Engn, Ranchi, Jharkhand, India
关键词
wireless sensor networks; security challenges; security goals; jamming attack; routing protocols; FHSS; DSSS; antenna; directional transmission;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor network is a collection of several nodes in a network capable of sharing information in wireless medium. Due to the presence of wireless medium it is highly vulnerable to network attacks. WSN has many applications ranging from monitoring of environment to highly restricted military and surveillance where security is a major requirement. The most common and dangerous attack which can be proved harmful for WSN is jamming attack. In jamming an adversary can limit the capabilities of WSN communication by interfering with RF signals using certain jamming devices. Securing a WSN is one of the major concerns of network safety. In this paper, we have discussed various jamming techniques and types of jammers. We have also listed some countermeasures of jamming which, if used, depending on the application can significantly reduce the chances and effects of jamming. Some limitations and challenges of WSN are also explained. Starting from the introduction about the WSN, our work will cover all the pros and cons of the jammers and countermeasures which can help an interested researcher to gain some knowledge about the topic.
引用
收藏
页码:559 / 564
页数:6
相关论文
共 50 条
  • [1] Security in wireless sensor networks: a survey of attacks and countermeasures
    Martins, David
    Guyennet, Herve
    [J]. INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2011, 1 (1-3) : 151 - 162
  • [2] Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A Survey
    Sinha, Preeti
    Jha, V. K.
    Rai, Amit Kumar
    Bhushan, Bharat
    [J]. PROCEEDINGS OF 2017 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION (ICSPC'17), 2017, : 288 - 293
  • [3] Security Issues in Wireless Sensor Networks: Attacks and Countermeasures
    Chelli, Kahina
    [J]. WORLD CONGRESS ON ENGINEERING, WCE 2015, VOL I, 2015, : 519 - 524
  • [4] Security Attacks and Its Countermeasures in Wireless Sensor Networks - A
    Kiruthika, B.
    Abinaya, S.
    Ezhilarasie, R.
    Umamakeswari, A.
    [J]. RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2015, 6 (03): : 1374 - 1387
  • [5] Security Attacks and Countermeasures in Surveillance Wireless Sensor Networks
    Sert, Seyyit Alper
    Onur, Ertan
    Yazici, Adnan
    [J]. 2015 9TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT), 2015, : 201 - 205
  • [6] Security Attacks in Wireless Sensor Networks: A Survey
    Patel, Manish M.
    Aggarwal, Akshai
    [J]. 2013 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND SIGNAL PROCESSING (ISSP), 2013, : 329 - 333
  • [7] A Survey on Security Attacks in Wireless Sensor Networks
    Gaware, Atul
    Dhonde, S. B.
    [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 536 - 539
  • [8] Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks
    Bhushan, Bharat
    Sahoo, Gadadhar
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (02) : 2037 - 2077
  • [9] Recent Advances in Attacks, Technical Challenges, Vulnerabilities and Their Countermeasures in Wireless Sensor Networks
    Bharat Bhushan
    Gadadhar Sahoo
    [J]. Wireless Personal Communications, 2018, 98 : 2037 - 2077
  • [10] Countermeasures against traffic analysis attacks in wireless sensor networks
    Deng, J
    Han, R
    Mishra, S
    [J]. First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, : 113 - 124