2017
DOI: 10.23956/ijarcsse/v7i4/0110
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Approach to Detect Jamming Attack by means of Game Theory

Abstract: Abstract---By considering a scenario where a complicated jammer continuously jams the network in a single channel WSN. Generally a jammer can control the possibility of jamming and message transfer range to cause maximum harm to the network termed as despoiled communication links. The jammer action halt when jammer node can be detected by monitoring node in the network, and warning message is transmit out of jamming region. Likewise the network also know the possibility of jammer .We focus the cases of perfect… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…There are many antijamming technique–based mitigation and detection in the literature that explain the problem of jamming but have shown a loss of spectral efficiency, an increase in energy consumption by each CR, and an increase in the complexity of computation of the system. Among these techniques are known as spreading spectrum frequency hopping, modulation coding, and Game theory …”
Section: Simulation Results and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…There are many antijamming technique–based mitigation and detection in the literature that explain the problem of jamming but have shown a loss of spectral efficiency, an increase in energy consumption by each CR, and an increase in the complexity of computation of the system. Among these techniques are known as spreading spectrum frequency hopping, modulation coding, and Game theory …”
Section: Simulation Results and Discussionmentioning
confidence: 99%
“…Among these techniques are known as spreading spectrum 33 frequency hopping, 34-36 modulation 37,38 coding, 39 and Game theory. 40,41 On the other hand, data mining techniques, such as k-means clustering for anomaly detection, 42 Boxplot graphical for anomaly detection, 43 and QQ plot for anomaly detection, 44 are considered as not good in real-time anomaly detection scenarios. Table 5 below presents some antijamming techniques for mitigation and detection existing in the literature:…”
Section: Hypothesis H0 Analog Signal Added To Noise Onlymentioning
confidence: 99%
“…As maximum resources are outsourced to cloud, so it becomes difficult to provide a check as for data maintenance. Cloud DBaaS are difficult to regulate as for security conditions are applied because they are spread across different places and many people access them [7]. Price and flexibility, improved availability is important factors while adopting of cloud databases.…”
Section: Need Of Required Workmentioning
confidence: 99%