![]() Unlike the constant jammer, a deceptive jammer transmits regular data towards its target. The last type of frequency jamming attack is a deceptive jammer. A jammer keeps sensing the channel until it becomes active, then it starts transmitting its jamming signal. A different kind of time domain is a reactive jammer. This type of attack is a time domain because the jammer sends its jamming signal periodically and then switches to sleep mode. A random jammer transmits the constant random data to its target. In a continuous jammer attack, a jammer emits a continuous signal with random bits which makes the channel too busy for legitimate nodes to transmit their data. Classification of jamming attacks is described as follows : A constant jammer is a frequency jamming attack. This type of jammer is more difficult to detect because when it sleeps, we cannot tell if it exists or not. During time domain attack, the jammer emits its signal periodically, which means it has two states: Sleep state and jammed state. During a frequency domain attack, the jammer transmits its radio signal towards the target by adjusting its frequency to harm the channel, or many channels, based on its jamming strategy. Jammers are classified into two major types: frequency domain and time domain. Furthermore, the jammer may use many techniques by adjusting its frequency. Jamming attacks in WSNs have been intensively studied and defined as a stranger transmitting signal with high power to inject a false signal, override the legitimate node’s message, or isolate nodes from the network. Other reasons for locating the jammer position are capturing, eliminating and isolating jammer from the network, or finding a stranger in a secured place. By detecting the jammer location, the routing protocol is forced to avoid the jamming region which causes repeated messages due to delivery failure. Therefore, routing protocol is designed to find the shortest path between the sender and the sink node before the transmitter starts transmitting its collected data. ![]() Because the WSNs are designed as multi-hop networks, the sensor forwards its information to the next hop node until it is received by the destination. In an indoor environment, applications using the wireless communication are rapidly increased, such as health monitoring, internet of things applications, and monitoring secured place inside the building. ![]() Locating a jammer in WSNs is very important to support the improvement of existing countermeasures. A jamming attack may block the sensors from communicating with their neighbor by emitting its signal with high power to prevent a legitimate node from transmitting its data. Jamming attacks are the most severe attacks on WSNs due to ease of launch. WSNs are designed to share the communication medium, which is vulnerable to several attacks, such as a jamming attack, Danial of Service (DoS), eavesdropping, a man in the middle attack. WSNs are developing as multi-hop networks where each sensor gathers and transfers information to the next hop sensor until it reaches the destination node or the sink. Wireless sensor networks (WSNs) are utilized in different fields including healthcare monitoring, industrials, military, air pollution, water quality monitoring, security monitoring, wearable devices, internet of things, and more. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |