2021
DOI: 10.3390/s21041179
|View full text |Cite
|
Sign up to set email alerts
|

A Low-Cost Jamming Detection Approach Using Performance Metrics in Cluster-Based Wireless Sensor Networks

Abstract: Wireless Sensor Networks constitute an important part of the Internet of Things, and in a similar way to other wireless technologies, seek competitiveness concerning savings in energy consumption and information availability. These devices (sensors) are typically battery operated and distributed throughout a scenario of particular interest. However, they are prone to interference attacks which we know as jamming. The detection of anomalous behavior in the network is a subject of study where the routing protoco… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(11 citation statements)
references
References 40 publications
0
9
0
Order By: Relevance
“…This study reveals that networking of sensor systems is growing over time [ 48 , 52 , 81 , 82 , 83 ]. Results here also suggest that wireless sensor networks have a higher rate of evolution likely because of the interaction with specific technologies, such as Internet of Things, data security and monitoring systems.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…This study reveals that networking of sensor systems is growing over time [ 48 , 52 , 81 , 82 , 83 ]. Results here also suggest that wireless sensor networks have a higher rate of evolution likely because of the interaction with specific technologies, such as Internet of Things, data security and monitoring systems.…”
Section: Resultsmentioning
confidence: 99%
“…This study reveals that technological development of sensors is due to evolutionary pathways based on interactions of sensors with other technological systems, such as information and communication technologies, artificial intelligence, Internet of Things, etc. [ 33 , 34 , 36 , 43 , 45 , 46 , 49 , 50 ] (cf., also [ 28 , 47 , 48 , 54 , 116 , 117 , 118 , 119 , 120 , 121 , 122 ]). Results suggest that sensors have, as parasite technologies (i.e., depending on other technologies; [ 17 ]), a wide spectrum of applications in medicine, environmental pollution, aircraft and automotive industries [ 123 , 124 , 125 , 126 , 127 ].…”
Section: Conclusion Limitations and Prospectsmentioning
confidence: 99%
See 1 more Smart Citation
“…In [21] authors have presented a plan to distinguish a DDoS attack at the beginning to enable misfortune prohibition of information and saving in vitality after the avoidance of attacks. In [22] the authors have proposes a lightweight and secure framework for improvement of attacks in WSN through concentration on exchange amongst protection and resources. They utilized a Low Energy Adaptive Clustering Hierarchy (LEACH) and symmetric encryption method with a specific end goal for ensuring security.…”
Section: Related Workmentioning
confidence: 99%
“…They employed a special schedule for the network’s root nodes and their direct neighbors, as well as the option to have multiple root nodes in a single network. Most WSNs rely on small batteries, which is a serious bottleneck in the system [ 5 , 6 ]. Battery capacity is developing at a very slow rate compared to other technologies, such as integrated circuits or software design.…”
Section: Introductionmentioning
confidence: 99%