Abstract—Time Division Multiple Access (TDMA) is often used in Wireless Sensor Networks (WSNs), especially for critical applications, as it provides high energy efficiency, guaranteed bandwidth, bounded and predictable latency, and absence of collisions. However, TDMA is vulnerable to selective jamming attacks. In TDMA transmission, slots are typically pre-allocated to sensor nodes, and each slot is used by the same node for a number of consecutive superframes. Hence, an adversary could thwart a victim node’s communication by simply jamming its slot(s). Such attack turns out to be effective, energy efficient, and extremely difficult to detect. In this paper, we present JAMMY, a distributed and dynamic solution to selective jamming in TDMA-b...
[[abstract]]Denial-of-Service (DoS) attacks are serious threats due to the resources constrained pro...
Abstract—We consider a scenario where a sophisticated jammer jams an area in which a single-channel ...
The security attacks wireless sensor network (WSN) are increasing. These security attacks degrade th...
Abstract—Time Division Multiple Access (TDMA) is often used in Wireless Sensor Networks (WSNs), espe...
Time Division Multiple Access (TDMA) is often used in Wireless Sensor Networks (WSNs), especially fo...
Time Division Multiple Access (TDMA) is often used in Wireless Sensor Networks (WSNs), especially fo...
Time division multiple access (TDMA) is often used in wireless sensor networks (WSNs), especially fo...
Wireless Sensor Networks (WSNs) are currently used in many application scenarios, including industri...
Wireless Sensor Networks (WSNs) are used in many fields such as military, medical, industrial applic...
xviii, 117 p. : ill. ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P COMP 2011 LiuGThe jamming att...
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of t...
Abstract—Jamming represents the most serious security threat in the field of Wireless Sensor Network...
Abstract — Normally wireless average greeneries leaves it vulnerable to deliberate intrusion attacks...
Jamming attacks, which are the main cause of data corruption and network blockages in wireless senso...
In this paper, we model and investigate the random access (RA) performance of sensor nodes (SN) in a...
[[abstract]]Denial-of-Service (DoS) attacks are serious threats due to the resources constrained pro...
Abstract—We consider a scenario where a sophisticated jammer jams an area in which a single-channel ...
The security attacks wireless sensor network (WSN) are increasing. These security attacks degrade th...
Abstract—Time Division Multiple Access (TDMA) is often used in Wireless Sensor Networks (WSNs), espe...
Time Division Multiple Access (TDMA) is often used in Wireless Sensor Networks (WSNs), especially fo...
Time Division Multiple Access (TDMA) is often used in Wireless Sensor Networks (WSNs), especially fo...
Time division multiple access (TDMA) is often used in wireless sensor networks (WSNs), especially fo...
Wireless Sensor Networks (WSNs) are currently used in many application scenarios, including industri...
Wireless Sensor Networks (WSNs) are used in many fields such as military, medical, industrial applic...
xviii, 117 p. : ill. ; 30 cm.PolyU Library Call No.: [THS] LG51 .H577P COMP 2011 LiuGThe jamming att...
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of t...
Abstract—Jamming represents the most serious security threat in the field of Wireless Sensor Network...
Abstract — Normally wireless average greeneries leaves it vulnerable to deliberate intrusion attacks...
Jamming attacks, which are the main cause of data corruption and network blockages in wireless senso...
In this paper, we model and investigate the random access (RA) performance of sensor nodes (SN) in a...
[[abstract]]Denial-of-Service (DoS) attacks are serious threats due to the resources constrained pro...
Abstract—We consider a scenario where a sophisticated jammer jams an area in which a single-channel ...
The security attacks wireless sensor network (WSN) are increasing. These security attacks degrade th...