ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.9, No. 6)

Publication Date:

Authors : ;

Page : 48-54

Keywords : WSN; Jamming attack; AODV Routing Protocols; NS-2.35.;

Source : Downloadexternal Find it from : Google Scholarexternal


Wireless networks are gaining popularity to its peak nowadays, because the users need wireless connectivity regardless of their geographic position. there's an increasing threat of attacks on the Wireless sensor Network (WSN). Node jamming attack is one in all the security threat within which the traffic is redirected to such a node that really doesn't exist within the network. It's an analogy to the Jamming within the universe within which things disappear. The node presents itself in such some way to the node that it will attack different nodes and networks knowing that it's the shortest path. WSNs should have a secure approach for transmission and communication that is kind of difficult and very important issue. so as to produce secure communication and transmission, research worker worked specifically on the security problems in WSNs, and lots of secure routing protocols and security measures inside the networks were proposed. The scope of this work is to review the effects of Jamming attack in WSN exploitation (and prevention this attack exploitation security primarily based modified. Comparative analysis of Jamming attack for each protocols is taken under consideration. The impact of Node Jamming attack on the performance of WSN is evaluated searching for that protocol is additional vulnerable to the attack and the way abundant is that the impact of the attack on each protocols. The measurements were taken within the light of packet delivery ratio, throughput, end-to-end delay and residual energy. Simulation is completed in Network simulator tool two (NS-2).

Last modified: 2020-08-30 01:11:58