Novel detection methods for securing wireless sensor network performance under intrusion jamming

Show simple item record

dc.contributor.author Del Valle Soto, Carolina
dc.contributor.author Valdivia Parga, Leonardo Jesús
dc.contributor.author Rosas Caro, Julio César
dc.contributor.other Campus Guadalajara
dc.date.accessioned 2019-07-01T21:16:32Z
dc.date.available 2019-07-01T21:16:32Z
dc.date.issued 2019
dc.identifier.citation Del-Valle-Soto, C., Valdivia, L. J., & Rosas-Caro, J. C. (2019). Novel detection methods for securing wireless sensor network performance under intrusion jamming. Paper presented at the CONIELECOMP 2019 - 2019 International Conference on Electronics, Communications and Computers, 1-8. doi:10.1109/CONIELECOMP.2019.8673079 es_ES, en_US
dc.identifier.other Campus Guadalajara es_ES, en_US
dc.identifier.uri http://scripta.up.edu.mx/xmlui/handle/123456789/4914
dc.identifier.uri http://dx.doi.org/978-172811145-2
dc.description.abstract Nowadays, the Internet of Things concept is composed of a scattered collection of different networks with different purposes that has nodes that capture information to be processed and, subsequently, used for purposes such as Smart Cities. These devices, called sensors, have the ability to send large amounts of information in a fairly efficient, but insecure, wireless environment. Intentional interference, named jamming, has emerged as a source of growing concern in recent years. Since no or little network information is required, this type of attack is extremely easy to implement but has become difficult to detect because of its variations in interference frequency.In this document, we propose two new jamming detection mechanisms that can identify reactive jamming without any free jam operation information, called Connected Mechanism and Extended Mechanism. The first one is based on the information of the performance metrics collected from the directly connected nodes. In the second approach, a collector node knows the performance parameters of all nodes in the network and can make comparisons between them. Through extensive simulations, we demonstrate that the first mechanism has an improved performance of 78% and the second has an improved 86% performance in detecting the area affected by an interference node with a proactive protocol such as MPH (Multi-Parent Hierarchical) compared to well-known reactive protocols: AODV (ad hoc distance distance vector) and DSR (dynamic origin routing).
dc.language Inglés es_ES, en_US
dc.language.iso eng
dc.publisher IEEE es_ES, en_US
dc.relation Versión aceptada es_ES, en_US
dc.relation.ispartof REPOSITORIO SCRIPTA es_ES, en_US
dc.relation.ispartof OPENAIRE es_ES, en_US
dc.rights Acceso Cerrado es_ES, en_US
dc.rights.uri http://creativecommons.org/licenses/by-nd/4.0 es_ES, en_US
dc.source CONIELECOMP 2019 - 2019 International Conference on Electronics, Communications and Computers
dc.subject Intrusion detection es_ES, en_US
dc.subject Jamming es_ES, en_US
dc.subject Wireless sensor networks es_ES, en_US
dc.subject Detection mechanism es_ES, en_US
dc.subject Energy es_ES, en_US
dc.subject Extensive simulations es_ES, en_US
dc.subject Network information es_ES, en_US
dc.subject Performance metrics es_ES, en_US
dc.subject Performance parameters es_ES, en_US
dc.subject Reactive protocols es_ES, en_US
dc.subject Wireless environment es_ES, en_US
dc.subject Sensor nodes es_ES, en_US
dc.subject.classification INGENIERIA Y TECNOLOGIA es_ES, en_US
dc.subject.classification Ingeniería
dc.title Novel detection methods for securing wireless sensor network performance under intrusion jamming es_ES, en_US
dc.type contribución a congreso es_ES, en_US
dcterms.audience Investigadores
dcterms.audience Estudiantes
dcterms.audience Maestros


Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record

Acceso Cerrado Except where otherwise noted, this item's license is described as Acceso Cerrado

Search Scripta


Advanced Search

Browse

My Account