Mobility Investigate

Defense Against Dos Attack Using Monitoring Node

Download now Free registration required

Executive Summary

Consider a scenario where a sophisticated jammer jams an area in which a single-channel random access based wireless sensor network operates. The jammer controls the probability of jamming and the transmission range in order to cause maximal damage to the network in terms of corrupted communication links. The jammer action ceases when it is detected by the network and a notification message is transferred out of the jammed region. In this paper introduce a network defense policy node for monitoring the jammer in order to overcome from attack to network. The monitoring node misleads the jammer that the server is down but actually the server is not down.

  • Format: PDF
  • Size: 258.34 KB