A jamming‐attack‐defending data forwarding scheme based on channel surfing in wireless sensor networks. Issue 11 (3rd April 2013)
- Record Type:
- Journal Article
- Title:
- A jamming‐attack‐defending data forwarding scheme based on channel surfing in wireless sensor networks. Issue 11 (3rd April 2013)
- Main Title:
- A jamming‐attack‐defending data forwarding scheme based on channel surfing in wireless sensor networks
- Authors:
- Ghosal, Amrita
Bit, Sipra Das - Abstract:
- ABSTRACT: Wireless sensor networks (WSNs) are susceptible to various attacks, and these attacks pose a major threat to the normal functioning of WSNs. Jamming is one such attack, which affects network operations by blocking frequencies. Hence, the need of defending such attack is of utmost importance. This paper proposes three variants of a data forwarding scheme using multi‐level multi‐tier architecture, which employs judicious surfing of a pair of channels to defend jamming attack in WSNs. Variant I defends the attack at the cost of an affordable delay. Improvement of the scheme in minimizing data transmission time is made in variant II. Further improvement in transmission time is made in variant III and is made more realistic by introducing sensing capability at all tiers, thereby increasing network coverage. Simulation is performed to establish each of the successor's variant's improvement over its predecessor. The performance of the scheme in terms of area coverage, packet delivery ratio, and control message overhead is compared with an existing jamming‐defending scheme for infrastructure‐based wireless network. Finally, comparison results establish that although the proposed scheme is equivalent to its infrastructure‐based counterpart in terms of coverage, it provides a more lightweight solution and maintains improved performance in terms of packet delivery ratio. Copyright © 2013 John Wiley & Sons, Ltd. Abstract : This paper proposes a data forwarding scheme withABSTRACT: Wireless sensor networks (WSNs) are susceptible to various attacks, and these attacks pose a major threat to the normal functioning of WSNs. Jamming is one such attack, which affects network operations by blocking frequencies. Hence, the need of defending such attack is of utmost importance. This paper proposes three variants of a data forwarding scheme using multi‐level multi‐tier architecture, which employs judicious surfing of a pair of channels to defend jamming attack in WSNs. Variant I defends the attack at the cost of an affordable delay. Improvement of the scheme in minimizing data transmission time is made in variant II. Further improvement in transmission time is made in variant III and is made more realistic by introducing sensing capability at all tiers, thereby increasing network coverage. Simulation is performed to establish each of the successor's variant's improvement over its predecessor. The performance of the scheme in terms of area coverage, packet delivery ratio, and control message overhead is compared with an existing jamming‐defending scheme for infrastructure‐based wireless network. Finally, comparison results establish that although the proposed scheme is equivalent to its infrastructure‐based counterpart in terms of coverage, it provides a more lightweight solution and maintains improved performance in terms of packet delivery ratio. Copyright © 2013 John Wiley & Sons, Ltd. Abstract : This paper proposes a data forwarding scheme with three variants for WSN having multi‐level tier architecture which employs judicious surfing of a pair of channels to defend jamming attack. The performance of the scheme in terms of area coverage, packet delivery ratio and control message overhead is compared with an existing jamming defending scheme for infrastructure‐based wireless network. The comparison results establish that while the proposed scheme is equivalent to its infrastructure‐based counterpart in terms of coverage, it provides more light‐weight solution fulfilling the requirement of infrastructure‐less network like WSN and maintains improved performance in terms of packet delivery ratio. Please use figure 1 for abstract diagram or illustration. … (more)
- Is Part Of:
- Security and communication networks. Volume 6:Issue 11(2013:Nov.)
- Journal:
- Security and communication networks
- Issue:
- Volume 6:Issue 11(2013:Nov.)
- Issue Display:
- Volume 6, Issue 11 (2013)
- Year:
- 2013
- Volume:
- 6
- Issue:
- 11
- Issue Sort Value:
- 2013-0006-0011-0000
- Page Start:
- 1367
- Page End:
- 1388
- Publication Date:
- 2013-04-03
- Subjects:
- adversaries -- channel surfing -- coverage -- hop distance -- jamming attack
Computer networks -- Security measures -- Periodicals
Computer security -- Periodicals
Cryptography -- Periodicals
005.805 - Journal URLs:
- http://onlinelibrary.wiley.com/journal/10.1002/(ISSN)1939-0122 ↗
https://www.hindawi.com/journals/scn/ ↗
http://onlinelibrary.wiley.com/ ↗ - DOI:
- 10.1002/sec.719 ↗
- Languages:
- English
- ISSNs:
- 1939-0114
- Deposit Type:
- Legaldeposit
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD Digital store
- Ingest File:
- 1848.xml