DocumentCode
2904424
Title
Locating jamming attackers in malicious wireless sensor networks
Author
Kaiqi Xiong ; Thuente, David
Author_Institution
Coll. of Comput. & Inf. Sci., Rochester Inst. of Technol., Rochester, NY, USA
fYear
2012
fDate
1-3 Dec. 2012
Firstpage
400
Lastpage
407
Abstract
Recent years have witnessed a rapid growth of wireless sensor network applications in civil and military environments. Radio interference tends to be a serious threat in such applications. Jamming attacks are a direct consequence of radio interference that an adversary may intentionally launch. While it is necessary to defend against jamming attacks in order for sensor communication channels to be available and reliable, it is also difficult. In this paper, we develop a systematic approach to tackling jamming attacks. We propose robust fault-tolerant algorithms for the location discovery of jamming attackers that permit us to remove jamming attackers from wireless sensor networks. Then, we investigate the proposed approach through theoretical analysis and experiments. Our analytical and numerical results demonstrate the efficiency and effectiveness of the proposed approach.
Keywords
fault tolerance; jamming; wireless sensor networks; direct consequence; jamming attack tackle; jamming attacker location; location discovery; malicious wireless sensor networks; radio interference; robust fault-tolerant algorithms; sensor communication channels; serious threat; Equations; Jamming; Linear regression; Prediction algorithms; Robustness; Synchronization; Wireless sensor networks; Discovery of location; Jamming; Malicious sensor networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Performance Computing and Communications Conference (IPCCC), 2012 IEEE 31st International
Conference_Location
Austin, TX
ISSN
1097-2641
Print_ISBN
978-1-4673-4881-2
Type
conf
DOI
10.1109/PCCC.2012.6407783
Filename
6407783
Link To Document