Estimating delay in a data forwarding scheme for defending jamming attack in wireless sensor network

Amrita Ghosal, Subir Halder, Sreerupa Chatterjee, Jaydeep Sen, Sipra DasBit

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Wireless sensor networks (WSNs) have emerged as an important application area resulting from the advancement of efficient short-range radio communication and miniaturization of computing devices. Nodes in such a network generally remain in an unattended environment and thereby they are prone to attack by adversaries. Therefore, the need of defending such attacks is of utmost importance. This paper presents a data forwarding scheme to defend jamming attack in WSN. The attack is defended at the cost of an affordable delay. The scheme considers a multi-level tier architecture based on clustering of nodes in each tier. Further the work identifies the parameters causing delay in presence of attack and analyses the impact of the parameter values in estimating delay. We claim that delay is affordable as it is independent of number of attacked-nodes rather it depends on number of tiers where attacked-node(s) belong. The claim is justified with proof.

Original languageEnglish
Title of host publicationNGMAST 2009 - 3rd International Conference on Next Generation Mobile Applications, Services and Technologies
Pages351-356
Number of pages6
DOIs
Publication statusPublished - 2009
Externally publishedYes
EventNGMAST 2009 - 3rd International Conference on Next Generation Mobile Applications, Services and Technologies - Cardiff, United Kingdom
Duration: 16 Sep 200918 Sep 2009

Publication series

NameNGMAST 2009 - 3rd International Conference on Next Generation Mobile Applications, Services and Technologies

Conference

ConferenceNGMAST 2009 - 3rd International Conference on Next Generation Mobile Applications, Services and Technologies
Country/TerritoryUnited Kingdom
CityCardiff
Period16/09/0918/09/09

Keywords

  • Adversaries
  • Channel surfing
  • Delay
  • Jamming attack
  • Wireless sensor network

Fingerprint

Dive into the research topics of 'Estimating delay in a data forwarding scheme for defending jamming attack in wireless sensor network'. Together they form a unique fingerprint.

Cite this