2018
DOI: 10.3390/s18061691
|View full text |Cite
|
Sign up to set email alerts
|

A Statistical Approach to Detect Jamming Attacks in Wireless Sensor Networks

Abstract: Wireless Sensor Networks (WSNs), in recent times, have become one of the most promising network solutions with a wide variety of applications in the areas of agriculture, environment, healthcare and the military. Notwithstanding these promising applications, sensor nodes in WSNs are vulnerable to different security attacks due to their deployment in hostile and unattended areas and their resource constraints. One of such attacks is the DoS jamming attack that interferes and disrupts the normal functions of sen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
67
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 114 publications
(67 citation statements)
references
References 33 publications
0
67
0
Order By: Relevance
“…They deploy an exponentially-weighted moving average (EWMA) to detect anomalous changes in the intensity of a jamming attack event by using the packet inter-arrival feature of the received packets from the sensor nodes. Results obtained from a trace-driven simulation show that the proposed solution can efficiently and accurately detect jamming attacks in WSNs with little or no overhead [5]. Sousa et al extend the model of the event detection scenario to distinguish between events and faults by using a flow chart and confidence interval.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…They deploy an exponentially-weighted moving average (EWMA) to detect anomalous changes in the intensity of a jamming attack event by using the packet inter-arrival feature of the received packets from the sensor nodes. Results obtained from a trace-driven simulation show that the proposed solution can efficiently and accurately detect jamming attacks in WSNs with little or no overhead [5]. Sousa et al extend the model of the event detection scenario to distinguish between events and faults by using a flow chart and confidence interval.…”
Section: Related Workmentioning
confidence: 99%
“…Ghorbel et al proposed an improved KPCA method based on the Mahalanobis kernel as a preprocessing step to extract relevant features for classification and to prevent abnormal events [17]. The literature [5,[8][9][10][11][12][13][14][15][16][17] does not consider the fault-tolerant mechanism of event detection. Different fault-tolerant algorithms are used in [6,7], but the influence of faulty nodes on event detection is not considered; this approach proves to be ineffective in high-fault-rate sensor networks.…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, in such hostile environments, sensor nodes are prone to suffer damage which also reduces data gathering efficiency [4][5][6]. Furthermore, when interference levels are high or in case of a jamming attack [7], nodes cannot communicate to a sink node that may be found outside the monitored area. If emergency personnel is relying on retrieving information from nodes in the system, this becomes a major issue since some nodes may be disconnected from the sink node and cannot assist the police, military personnel, or firefighters in their specific operation.…”
Section: Introductionmentioning
confidence: 99%
“…Additionally, [6] does not consider graph theory to infer the performance of the system in terms of average buffer size nor packet delay. Finally, in [7], links are unreliable due to direct jamming cyberattacks. The authors propose a statistical approach to detect such attacks that may lead to disconnected segments in the system.…”
Section: Introductionmentioning
confidence: 99%
“…Although it is not within the scope of this article, it is worth mentioning that the sensors in WSNs due to their wireless communication capabilities are also vulnerable to disruptions of the radio channel. For instance, a DoS jamming attack can be easily executed by an adversary with a low-cost hardware, and ad hoc solutions, such as those presented in [11,12] or [13], are needed for its detection.…”
Section: Introductionmentioning
confidence: 99%