Security Vulnerabilities and Countermeasures against Jamming Attacks in Wireless Sensor Networks: A Survey

被引:0
|
作者
Jaitly, Sunakshi [1 ]
Malhotra, Harshit [1 ]
Bhushan, Bharat [2 ]
机构
[1] HMRITM, Dept Comp Sci & Engn, New Delhi, India
[2] Birla Inst Technol, Dept Comp Sci & Engn, Ranchi, Jharkhand, India
关键词
wireless sensor networks; security challenges; security goals; jamming attack; routing protocols; FHSS; DSSS; antenna; directional transmission;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Wireless sensor network is a collection of several nodes in a network capable of sharing information in wireless medium. Due to the presence of wireless medium it is highly vulnerable to network attacks. WSN has many applications ranging from monitoring of environment to highly restricted military and surveillance where security is a major requirement. The most common and dangerous attack which can be proved harmful for WSN is jamming attack. In jamming an adversary can limit the capabilities of WSN communication by interfering with RF signals using certain jamming devices. Securing a WSN is one of the major concerns of network safety. In this paper, we have discussed various jamming techniques and types of jammers. We have also listed some countermeasures of jamming which, if used, depending on the application can significantly reduce the chances and effects of jamming. Some limitations and challenges of WSN are also explained. Starting from the introduction about the WSN, our work will cover all the pros and cons of the jammers and countermeasures which can help an interested researcher to gain some knowledge about the topic.
引用
收藏
页码:559 / 564
页数:6
相关论文
共 50 条
  • [41] Countermeasures Against Jamming Attack in Sensor Networks with Timing and Power Constraints
    Verma, Rishabh
    Darak, Sumit J.
    Tikkiwal, Vinay
    Joshi, Himani
    Kumar, Rohit
    [J]. 2019 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2019, : 520 - 523
  • [42] A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization
    Chao, Daichong
    Xu, Dawei
    Gao, Feng
    Zhang, Chuan
    Zhang, Weiting
    Zhu, Liehuang
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2024, 26 (03): : 1775 - 1829
  • [43] Unified Modeling Language based Analysis of Security Attacks in Wireless Sensor Networks: A Survey
    Hong, Sunghyuck
    Lim, Sunho
    Song, Jaeki
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (04): : 805 - 821
  • [44] On the Routing Protocol Influence on the Resilience of Wireless Sensor Networks to Jamming Attacks
    Del-Valle-Soto, Carolina
    Mex-Perera, Carlos
    Monroy, Raul
    Arturo Nolazco-Flores, Juan
    [J]. SENSORS, 2015, 15 (04) : 7619 - 7649
  • [45] Review on Security Issues and Attacks in Wireless Sensor Networks
    Kaur, Lovepreet
    Malhotra, Jyoteesh
    [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2015, 8 (04): : 81 - 88
  • [46] A SEIS Model for Propagation of Random Jamming Attacks in Wireless Sensor Networks
    Lopez, Miguel
    Peinado, Alberto
    Ortiz, Andres
    [J]. INTERNATIONAL JOINT CONFERENCE SOCO'16- CISIS'16-ICEUTE'16, 2017, 527 : 668 - 677
  • [47] Optimal jamming attacks and network Defense policies in wireless sensor networks
    Li, Mingyan
    Koutsopoulos, Iordanis
    Poovendran, Radha
    [J]. INFOCOM 2007, VOLS 1-5, 2007, : 1307 - +
  • [48] Security to wireless sensor networks against malicious attacks using Hamming residue method
    Majid Alotaibi
    [J]. EURASIP Journal on Wireless Communications and Networking, 2019
  • [49] Security to wireless sensor networks against malicious attacks using Hamming residue method
    Alotaibi, Majid
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (1)
  • [50] A Cluster-Based Mitigation Strategy Against Security Attacks in Wireless Sensor Networks
    Khan, Jahangir
    Shah, Ansar Munir
    Nawaz, Babar
    Mahmood, Khalid
    Saeed, Muhammad Kashif
    ul Hassan, Mehmood
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (09) : 409 - 414