In this paper, we model and investigate the random access (RA) performance of sensor nodes (SN) in a wireless sensor network (WSN). In the WSN, a central head sensor (HS) collects the information from distributed SNs, and jammers disturb the information transmission primarily by generating interference. In this paper, two jamming attacks are considered: power and code jamming. Power jammers (if they are friendly jammers) generate noises and, as a result, degrade the quality of the signal from SNs. Power jamming is equally harmful to all the SNs that are accessing HS and simply induces denial of service (DoS) without any need to hack HS or SNs. On the other hand, code jammers mimic legitimate SNs by sending fake signals and thus need to know...
Wireless Sensor Networks (WSNs), in recent times, have become one of the most promising network solu...
Abstract—Jamming represents the most serious security threat in the field of Wireless Sensor Network...
Wireless networks are built upon a shared medium that makes it easy for adversaries to conduct radio...
In this paper, we model and investigate the random access (RA) performance of sensor nodes (SN) in a...
The security attacks wireless sensor network (WSN) are increasing. These security attacks degrade th...
Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) syste...
Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) syste...
Security is a key requirement in the context of the internet of things (IoT). The IoT is connecting ...
Assurance of security in wireless sensor networks is a difficult task as the sensor networks suffers...
Abstract—We consider a scenario where a sophisticated jammer jams an area in which a single-channel ...
Wireless Sensor networks are one of the most extensively used technologies in our day to day lives; ...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
We consider a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor...
Jamming attacks, which are the main cause of data corruption and network blockages in wireless senso...
Jamming is defined as the act of intentionally directing electromagnetic energy towards a communicat...
Wireless Sensor Networks (WSNs), in recent times, have become one of the most promising network solu...
Abstract—Jamming represents the most serious security threat in the field of Wireless Sensor Network...
Wireless networks are built upon a shared medium that makes it easy for adversaries to conduct radio...
In this paper, we model and investigate the random access (RA) performance of sensor nodes (SN) in a...
The security attacks wireless sensor network (WSN) are increasing. These security attacks degrade th...
Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) syste...
Wireless sensor networks (WSNs) play an important role in Cyber Physical Social Sensing (CPSS) syste...
Security is a key requirement in the context of the internet of things (IoT). The IoT is connecting ...
Assurance of security in wireless sensor networks is a difficult task as the sensor networks suffers...
Abstract—We consider a scenario where a sophisticated jammer jams an area in which a single-channel ...
Wireless Sensor networks are one of the most extensively used technologies in our day to day lives; ...
Wireless sensor networks are built upon a shared medium that makes it easy for adversaries to conduc...
We consider a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor...
Jamming attacks, which are the main cause of data corruption and network blockages in wireless senso...
Jamming is defined as the act of intentionally directing electromagnetic energy towards a communicat...
Wireless Sensor Networks (WSNs), in recent times, have become one of the most promising network solu...
Abstract—Jamming represents the most serious security threat in the field of Wireless Sensor Network...
Wireless networks are built upon a shared medium that makes it easy for adversaries to conduct radio...