dc.contributor.author |
Mpitziopoulos, A |
en |
dc.contributor.author |
Gavalas, D |
en |
dc.contributor.author |
Pantziou, G |
en |
dc.contributor.author |
Konstantopoulos, C |
en |
dc.date.accessioned |
2014-03-01T02:51:04Z |
|
dc.date.available |
2014-03-01T02:51:04Z |
|
dc.date.issued |
2007 |
en |
dc.identifier.uri |
https://dspace.lib.ntua.gr/xmlui/handle/123456789/35336 |
|
dc.subject.other |
Communication channels (information theory) |
en |
dc.subject.other |
Congestion control (communication) |
en |
dc.subject.other |
Jamming |
en |
dc.subject.other |
Network security |
en |
dc.subject.other |
Spread spectrum communication |
en |
dc.subject.other |
Telecommunication links |
en |
dc.subject.other |
Direct sequence spread spectrum (DSSS) |
en |
dc.subject.other |
Frequency hopping spread spectrum (FHSS) |
en |
dc.subject.other |
Wireless sensor networks |
en |
dc.title |
Defending wireless sensor networks from jamming attacks |
en |
heal.type |
conferenceItem |
en |
heal.identifier.primary |
10.1109/PIMRC.2007.4394775 |
en |
heal.identifier.secondary |
4394775 |
en |
heal.identifier.secondary |
http://dx.doi.org/10.1109/PIMRC.2007.4394775 |
en |
heal.publicationDate |
2007 |
en |
heal.abstract |
Wireless sensor networks (WSNs) are used in many applications which often include the monitoring and recording of sensitive information. Hence, their critical importance raises many security concerns. In the context of WSNs, jamming is the type of attack which interferes with the radio frequencies used by network nodes. In the event that an attacker uses a rather powerful jamming source, disruptions of WSNs proper function are likely to occur. As a result, the use of countermeasures against jamming in WSN environments is of immense importance. The main contribution of this article is the discussion of various defence methods against jamming that would allow a WSN to survive and work, properly in a hostile jamming environment. Our focus is on frequency hopping spread spectrum (FHSS) and direct sequence spread spectrum (DSSS), two of the most effective countermeasures against jamming. We suggest the use of a specific FHSS technique in 5 GHz band with 55 frequency channels wherein the channel sequence is generated using a secret word, known only to the sink and the sensor nodes, as a seed. Each channel uses DSSS modulation with 16 bit Pseudo Noise (PN) code, which derives from the same secret word used for FHSS channel generation. © 2007 IEEE. |
en |
heal.journalName |
IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC |
en |
dc.identifier.doi |
10.1109/PIMRC.2007.4394775 |
en |