Zur Kurzanzeige

dc.creatorLi, M.en
dc.creatorKoutsopoulos, I.en
dc.creatorPoovendran, R.en
dc.date.accessioned2015-11-23T10:37:43Z
dc.date.available2015-11-23T10:37:43Z
dc.date.issued2007
dc.identifier10.1109/INFCOM.2007.155
dc.identifier.isbn1424410479
dc.identifier.issn0743166X
dc.identifier.urihttp://hdl.handle.net/11615/30276
dc.description.abstractWe consider a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor network. The jammer controls the probability of jamming and transmission range to cause maximal damage to the network in terms of corrupted communication links. The jammer action ceases when it is detected by a monitoring node in the network, and a notification message is transferred out of the jamming region. The jammer is detected at a monitor node by employing an optimal detection test based on the percentage of incurred collisions. On the other hand, the network computes channel access probability in an effort to minimize the jamming detection plus notification time. In order for the jammer to optimize its benefit, it needs to know the network channel access probability and number of neighbors of the monitor node. Accordingly, the network needs to know the jamming probability of the jammer. We study the idealized case of perfect knowledge by both the jammer and the network about the strategy of one another, and the case where the jammer or the network lack this knowledge. The latter is captured by formulating and solving optimization problems, the solutions of which constitute best responses of the attacker or the network to the worst-case strategy of each other. We also take into account potential energy constraints of the jammer and the network. We extend the problem to the case of multiple observers and adaptable jamming transmission range and propose a intuitive heuristic jamming strategy for that case. © 2007 IEEE.en
dc.source.urihttp://www.scopus.com/inward/record.url?eid=2-s2.0-34548314598&partnerID=40&md5=af5cbce060ea21fe652e2724156e1686
dc.subjectCommunication channels (information theory)en
dc.subjectHeuristic methodsen
dc.subjectJammingen
dc.subjectOptimizationen
dc.subjectProblem solvingen
dc.subjectTelecommunication linksen
dc.subjectChannel access probabilityen
dc.subjectJamming transmission rangeen
dc.subjectOptimal detectionen
dc.subjectPotential energy constraintsen
dc.subjectWireless sensor networksen
dc.titleOptimal jamming attacks and network defense policies in wireless sensor networksen
dc.typeconferenceItemen


Dateien zu dieser Ressource

DateienGrößeFormatAnzeige

Zu diesem Dokument gibt es keine Dateien.

Das Dokument erscheint in:

Zur Kurzanzeige