2010
DOI: 10.1007/978-3-642-14785-2_4
|View full text |Cite
|
Sign up to set email alerts
|

On Alarm Protocol in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 8 publications
0
9
0
Order By: Relevance
“…The source node identifies the malicious nodes and to isolate them from the network, it floods the network with ALARM message and the table which contain the information of malicious nodes. [7] After receiving the ALARM message the intermediate nodes stop the communication with these malicious nodes. Now the source node again floods the network with RREQ message having genuine destination ID and select a reliable path to the destination.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The source node identifies the malicious nodes and to isolate them from the network, it floods the network with ALARM message and the table which contain the information of malicious nodes. [7] After receiving the ALARM message the intermediate nodes stop the communication with these malicious nodes. Now the source node again floods the network with RREQ message having genuine destination ID and select a reliable path to the destination.…”
Section: Methodsmentioning
confidence: 99%
“…It is a network layer attack. [7] The two colluding attacker's tunnel between them is referred as wormhole.…”
Section: A Wormhole Attackmentioning
confidence: 99%
“…Mobile ad hoc networks are vulnerable to security attacks. Attack is the mechanism which disrupts the normal behavior of the network [3]. The security attacks are triggered from the internal as well as external nodes.…”
Section: Introductionmentioning
confidence: 99%
“… Reactive Jammer: A reactive jammer attempts not to misspend resources by only jamming when it recognize that somebody is transmitting. Its object is not the sender but the receiver, taxing to input as much noise as possible in the packet to improve as many bits as possible given that only a small amount of power is required to modify sufficient bits so that when a checksum is execute over that packet at the receiver it will be categorized as not valid and therefore discarded [6]. The motive of jamming attack is to fill up the communication channel with purposeless signals, due to which verified or permissible user cannot use it.…”
Section: Jamming Attackmentioning
confidence: 99%
“… Random Jammer: Substitutes between sleeping and jamming the channel. In the first modus the jammer jams for a casual period of time (it can behaves like a constant jammer or as a deceptive jammer), and in the second modus (the sleeping mode) the jammer spins its transmitters off for a different random period of time [6]. The energy efficiency is regulates as the ratio of the length of the jamming period upon the length of the sleeping period.…”
Section: Jamming Attackmentioning
confidence: 99%