Full Paper View Go Back

A Survey On Defending Against Cooperative Jamming Attacks In Internet of Things

E. Selvi1 , K. Renuka2

Section:Survey Paper, Product Type: Isroset-Journal
Vol.4 , Issue.9 , pp.38-43, Sep-2018


Online published on Sep 30, 2018


Copyright © E. Selvi, K. Renuka . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: E. Selvi, K. Renuka, “A Survey On Defending Against Cooperative Jamming Attacks In Internet of Things,” International Journal of Scientific Research in Multidisciplinary Studies , Vol.4, Issue.9, pp.38-43, 2018.

MLA Style Citation: E. Selvi, K. Renuka "A Survey On Defending Against Cooperative Jamming Attacks In Internet of Things." International Journal of Scientific Research in Multidisciplinary Studies 4.9 (2018): 38-43.

APA Style Citation: E. Selvi, K. Renuka, (2018). A Survey On Defending Against Cooperative Jamming Attacks In Internet of Things. International Journal of Scientific Research in Multidisciplinary Studies , 4(9), 38-43.

BibTex Style Citation:
@article{Selvi_2018,
author = {E. Selvi, K. Renuka},
title = {A Survey On Defending Against Cooperative Jamming Attacks In Internet of Things},
journal = {International Journal of Scientific Research in Multidisciplinary Studies },
issue_date = {9 2018},
volume = {4},
Issue = {9},
month = {9},
year = {2018},
issn = {2347-2693},
pages = {38-43},
url = {https://www.isroset.org/journal/IJSRMS/full_paper_view.php?paper_id=827},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRMS/full_paper_view.php?paper_id=827
TI - A Survey On Defending Against Cooperative Jamming Attacks In Internet of Things
T2 - International Journal of Scientific Research in Multidisciplinary Studies
AU - E. Selvi, K. Renuka
PY - 2018
DA - 2018/09/30
PB - IJCSE, Indore, INDIA
SP - 38-43
IS - 9
VL - 4
SN - 2347-2693
ER -

222 Views    221 Downloads    175 Downloads
  
  

Abstract :
Jamming attacks are a subset of denial of service (DoS) attacks in which malicious nodes block legitimate communication by causing intentional interference in networks. Jamming represents the most serious security threat in the field. Security abides a tremendous key requirement in the context of Internet of Things (IoT). IoT connects multiple objects together through wired and wireless connections in the aim of enabling ubiquitous interaction where any components can communicate with each other without any constraint. One of the most important elements in the IoT concept is IOT. In this survey paper of all the security issues in the field of IoT along with the analysis of the various architecture of IoT. The study defines various security actions, its requirements and the challenges that come along with the implementation of IoT. Finally, a number of techniques and problem future work is presented to enhance IoT security (Privacy, Lightweight crypto, etc.).

Key-Words / Index Term :
Jamming Attack, Internet of Things, denial of service, Wireless Sensor Networks, Security

References :
[1] T.X. Brown, J.E. James and A. Sethi, “Jamming and Sensing of Encrypted Wireless Ad Hoc Networks”, Proc. ACMInt’l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 120-130, 2006.
[2] A. Chan, X. Liu, G. Noubir, and B. Thapa, “Control Channel Jamming: Resilience and Identification of Traitors”, Proc. IEEE Int’l Symp. Information Theory (ISIT), 2007.
[3] W. Xu, W. Trappe and Y. Zhang, “Anti-Jamming Timing Channels for Wireless Networks”, Proc. ACM Conf. Wireless Network Security (WiSec), pp. 203-213, 2008.
[4] P. Tague, M. Li, and R. Poovendran, “Mitigation of Control Channel Jamming under Node Capture Attacks”, IEEE Trans. Mobile Computing, vol. 8, no. 9, pp. 1221-1234, Sept. 2009.
[5] Alnifie G, Simon R, “A multi-channel defense against jamming attacks in wireless sensor networks”, In: Proceedings of the 3rd ACM Workshop on QoS and Security for Wireless and Mobile Networks, pp. 95–104, 2007.
[6] Alnifie G, Simon R, “MULEPRO: a multi- channel response to jamming attacks in wireless sensor networks”, Wireless Communications and Mobile Computing 10(5):704–721, 2010
[7] Bellardo J, Savage S, “802.11 denial-of-service attacks: Real vulnerabilities and practical solutions”, In: Proceedings of the 12th Conference on USENIX Security Symposium, pp. 15–28, 2003
[8] Chiang JT, Hu YC, “Cross-layer jamming detection and mitigation in wireless broadcast networks”, IEEE/ACM Transactions on Networking 19(1):286– 298, 2011.
[9] Gencer C, Aydogan EK, Celik C, “A decision support system for locating VHF/UHF radio jammer systems on the terrain”, Information Systems Frontiers 10(1):111–124, 2008
[10] Gummadi R, Wetherall D, Greenstein B, Seshan S, “Understanding and mitigating the impact of RF interference on 802.11 networks”, In: Proceedings of the 2007 Conference on Applications, technologies, architectures, and protocols for computer communications, pp 385–396. 2007.
[11] Khattab S, Mosse D, Melhem R, “Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks”, In: Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, pp. 25:1–25:10, 2008
[12] Liu H, Liu Z, Chen Y, Xu W, “Determining the position of a jammer using a virtual-force iterative approach”, Wireless Networks 17(2):531–547, 2011.
[13] Misra S, Singh R, Mohan SVR, “Information warfare-worthy jamming attack detection mechanism for wireless sensor networks using a fuzzy inference system”, Sensors 10:3444–3479, 2010.
[14] Muraleedharan R, Osadciw LA, “Jamming attack detection and countermeasures in wireless sensor network using ant system”, In: SPIE the International Society for Optical Engineering, vol 6248, p 62480, 2006.
[15] Mpitziopoulos A, Gavalas D, Pantziou G, Konstantopoulos C, “Defending wireless sensor networks from jamming attacks”, In: IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications, pp 1 –5, 2007.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation