2015
DOI: 10.1007/s40815-015-0009-4
|View full text |Cite
|
Sign up to set email alerts
|

An Intelligent Technique to Detect Jamming Attack in Wireless Sensor Networks (WSNs)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(13 citation statements)
references
References 13 publications
0
13
0
Order By: Relevance
“…Effective design and implementation of bct algorithms can provide suitable outcomes for problems with conflicting objectives, while involving light computational loads. bcts gained popularity in networking due to their ease of implementation and effectiveness to solve multi-objective and often intractable optimization problems, including manet topology control [50], routing [13,20], node collaboration [36] and cybersecurity [25].…”
Section: Bio-inspired Computation For Swarms and Uavsmentioning
confidence: 99%
See 1 more Smart Citation
“…Effective design and implementation of bct algorithms can provide suitable outcomes for problems with conflicting objectives, while involving light computational loads. bcts gained popularity in networking due to their ease of implementation and effectiveness to solve multi-objective and often intractable optimization problems, including manet topology control [50], routing [13,20], node collaboration [36] and cybersecurity [25].…”
Section: Bio-inspired Computation For Swarms and Uavsmentioning
confidence: 99%
“…These desirable characteristics of manets at the same time bring new challenges for providing autonomous flight control of uavs operating as a swarm, including an increased level of topology control and cyber security. 1 Bio-inspired computation techniques are excellent candidates to bring effective solutions for manet topology control [50], routing [20], node collaboration [36] and cybersecurity mechanisms [25]. These techniques can find desired optimum or near optimum solutions to satisfy conflicting objectives in prohibitively large domains.…”
Section: Introductionmentioning
confidence: 99%
“…The authors of [25,26] considered the increase of the Euclidean distance (proportional to hop counts) between a source node and a destination node to detect the jamming attack. Before the detection of jamming attack, a source node has discovered multiple paths to the same destination node and obtained the shortest path for data packet transmission by computing and comparing the distance of these discovered paths.…”
Section: Detection Mechanisms Against Jamming Attackmentioning
confidence: 99%
“…Although it is not within the scope of this article, it is worth mentioning that the sensors in WSNs due to their wireless communication capabilities are also vulnerable to disruptions of the radio channel. For instance, a DoS jamming attack can be easily executed by an adversary with a low-cost hardware, and ad hoc solutions, such as those presented in [11,12] or [13], are needed for its detection.…”
Section: Introductionmentioning
confidence: 99%