Abstract---By considering a scenario where a complicated jammer continuously jams the network in a single channel WSN. Generally a jammer can control the possibility of jamming and message transfer range to cause maximum harm to the network termed as despoiled communication links. The jammer action halt when jammer node can be detected by monitoring node in the network, and warning message is transmit out of jamming region. Likewise the network also know the possibility of jammer .We focus the cases of perfect awareness by jammer and the network in order to study the strategy of one another . Also consider the cases where jammer network lack this information. We also consider different energy parameters of jammer and network. Two problem can be take into account as static jamming and dynamic jamming.Keywords---Jamming attack, Co-operative game theory, Data security, Key agreement. I. INTRODUCTIONThe elementary attribute of wireless sensor network that render them defenseless to attack is the major nature of shared medium. This broadcast the network to passive and active attack , these are different in nature and objectives. Generally the malicious node or entity does not take any action but attack node continuously observe communication which is ongoing state as eavesdropping so as to mediate with the preservation of privacy of the network that involved in the communication . Secondly an active attacker also involved in the transaction [5] . There are different terminology is used which depends on the attacker objective. The attacker can be called as misbehavior if the attacker abuse a procedure that have goal to get the performance benefits. The attacker is called as jamming , if the attacker or jammer does not operate the procedure parameter but has aim to disturb the network operation continuously and its depends on its reasons and consequences. [4] Misbehavior be generated from tendency of wireless entity in order to improve their individual consequential usefulness to the decline by opposing from justifiable procedure operation at various layer. The usefulness is present in terms of extreme energy or feasible throughput on a communication link. In order to preserve the energy expenditure of its own transmission, the case arises if a node refuses to forward message from other node. The another case arrases when one node prevents other nodes from gaining the access of channel and from rerouting the message to the sink by egotistic management of the access control. [9] The interaction model apprehends improbability of attacks and case of intelligent attacker that extend its detection. Jammer can wireless transmission and can happen accidently in the form of intrusion at the receiver side. Basically the jamming attack is very effective in number of cases (i) there is no special type of hardware is used to launch the attack (ii) the attack can be implemented by simply listen the open shared medium and probability in the frequency of the network. (iii) if attack is launched judiciously it can show the way to cons...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.