2017
DOI: 10.1016/j.comnet.2017.03.009
|View full text |Cite
|
Sign up to set email alerts
|

Optimal decision rule-based ex-ante frequency hopping for jamming avoidance in wireless sensor networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 22 publications
0
12
0
Order By: Relevance
“…One main problem of rule-based detection mechanisms is that a large number of rules may be required for each variation of the attacks which makes it a limiting constraint, particularly in the era of fast-changing network attack types. In [10], frequency hopping strategies are derived from the optimal decision rules. The model evaluates the individual decision profiles of all the nodes and finally selects a rule that yields the maximum throughput.…”
Section: ) Rule-based Jamming Attack Solutionsmentioning
confidence: 99%
“…One main problem of rule-based detection mechanisms is that a large number of rules may be required for each variation of the attacks which makes it a limiting constraint, particularly in the era of fast-changing network attack types. In [10], frequency hopping strategies are derived from the optimal decision rules. The model evaluates the individual decision profiles of all the nodes and finally selects a rule that yields the maximum throughput.…”
Section: ) Rule-based Jamming Attack Solutionsmentioning
confidence: 99%
“…Jamming can target different layers: It can interfere with radio frequency signals at the physical layer, as it can take advantages of the medium access control protocol causing malicious collisions at the link layer as it can target the network layer by injecting malicious packets. Defense techniques [38][39] [40] against Jamming attack involve spread-spectrum techniques for radio communication such as frequency hopping to switch between many frequency channels, authentication mechanisms to detect malicious and replayed packets, the use of secure medium access control protocols etc.…”
Section: The Most Known Attacksmentioning
confidence: 99%
“…However, due to the silent nature or behavior of reactive jammers, they have more powers to destruct these mitigation methods. In recent times, number of approaches has been presented to a utilize spectrum efficiently and address spectrum requirement for provisioning future application [14]. These model aims to attain optimal use of available resource (spectrum).…”
Section: Introductionmentioning
confidence: 99%
“…These model aims to attain optimal use of available resource (spectrum). Thus, these model are referred as optimal resource allocation schemes [14,15]. In optimal resource allocation schemes, the sensor device, rather than avoiding a jammer by using different instance of spectrum, depends on exploring the existing spectrum in most resourceful way to mitigate jamming.…”
Section: Introductionmentioning
confidence: 99%