Header menu link for other important links
X
Tracing Jammed Area in Wireless Ad-hoc Network using Boundary Node Detection
Saurabh S., Rustogi R.
Published in IEEE Computer Society
2018
Volume: 2018-December
   
Abstract
Ad-hoc Networks, which are based on wireless medium, are susceptible to various kinds of security threats. One such threat is the jamming attack where the attacker jams the wireless medium using high energy signals. This leads to the disruption in communication. This attack falls under the category of Denial of Service (DoS) attack. For military and disaster management services, where continuous and reliable communication is of utmost importance, this attack poses a serious threat. A potential solution to this problem is to use the automated jammed area mapping schemes, which can identify the jammed region and report it to the concerned authorities for taking required action. There exists a few jammed area mapping protocols, however they suffer from hurdles like extensive flooding, wasted bandwidth and low accuracy-rate. These schemes are based on receiving replies from the nodes located in the jammed region where the probability of sending and receiving messages is quite low. In this paper, we propose an algorithm which can locate the the jammed region without needing to rely on receiving messages from any jammed node. Our algorithm traces the boundary nodes with high accuracy in less amount of time. We performed the simulation of our algorithms using NS3 and observed an accuracy of around 95\%, false-positive rate of 4.6\% and zero false-negative in identifying the boundary nodes. © 2018 IEEE.
About the journal
Published in IEEE Computer Society
Open Access
no
Impact factor
N/A