preview

Wireless Sensor Network Essay

Good Essays

Wireless Sensor Networks (WSN) consists of a collection of nodes which are deployed randomly in a hostile environment. It has a fixed infrastructure and self-organized in to an arbitrary topology. Though there are advancements in technology, security in WSN is a principal concern. As the deployed sensors are in an open environment, the intrusion of attacks is very much higher. Also the WSN has broadcast nature of communication; they are easily affected by the attacks. Commonly prevailing attacks are Denial of Service (DoS) attacks, spoofing attack, selective forwarding attack, sinkhole attack, sybil attack, wormhole attack, black hole attack, grayhole attack, HELLO flood attack, etc. However we observe that Denial of Service attack is a …show more content…

WSNs are frequently susceptible to various types of attacks. Jamming is one of the attacks, which overpowers the transmitted signal by injecting very high level of noise with the assistance of malicious node which significantly lowers the Packet Delivery Ratio (PDR), which will reduce the achievable rate of a transmitted signal. There are few different ways of identifying the malicious node and its various approaches towards jamming detection. Such as game theory approach, calculation of energy used, trust based schemes, auto regression technique, markov chain models and so on. Jamming attack consist of four types namely proactive jammer, deceptive jammer, constant jammer and random jammer. Proactive jammer are the most prevalent jamming form due to their easy implementation that attempts to emit jamming signals irrespective of the traffic pattern in the channel, but they are inefficient in terms of attacking damage, detection probability and energy efficiency due to the lack of channel awareness. The deceptive jammer continuously transmits regular packets of data, instead of emitting random bits of data. When compared to a constant jammer, it is more difficult to detect a deceptive jammer because it transmits legitimate packets instead of random bits. The constant jammer emits a continuous jamming signal at random interval. Random jammer which emits a constant jamming signal continuously and jamming signals at random times. It continuously

Get Access