Association for Computing Machinery
There exist many studies against reactive jamming attacks, however, these methods, i.e. frequency hopping or channel surfing, require excessive computational capabilities on wireless devices which are serious side effects in wireless sensor networks. To avoid the problems in existing methods, the authors propose a novel approach against reactive jamming attacks by identifying the trigger nodes, whose transmissions activate any reactive jammers. The identification of these trigger nodes can help them carefully design a better routing protocol by switching these nodes into only receivers to avoid activating jammers and locate the jammers based on the trigger nodes, thus providing an alternative mechanism against reactive jamming attacks.