SlideShare a Scribd company logo
1 of 2
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 09, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 547
Defending Reactive Jammers in WSN using A Trigger Identification
Service
Harshad Shelar1 Jilani Momin2 Sainath Patil3 Kiran Jaybhaye4
1,2,3,4
Department of Computer Engineering
1,2,3,4
D.C.O.E.R Pune, India
Abstract— In the last decade, the greatest threat to the
wireless sensor network has been Reactive Jamming Attack
because it is difficult to be disclosed and defend as well as
due to its mass destruction to legitimate sensor
communications. As discussed above about the Reactive
Jammers Nodes, a new scheme to deactivate them
efficiently is by identifying all trigger nodes, where
transmissions invoke the jammer nodes, which has been
proposed and developed. Due to this identification
mechanism, many existing reactive jamming defending
schemes can be benefited. This Trigger Identification can
also work as an application layer .In this paper, on one side
we provide the several optimization problems to provide
complete trigger identification service framework for
unreliable wireless sensor networks and on the other side we
also provide an improved algorithm with regard to two
sophisticated jamming models, in order to enhance its
robustness for various network scenarios.
Key words: Trigger Identification,, Error Tolerant Non-
adaptive Group Testing, Reactive Jamming, NP Hardness,
Jamming Detection
I. INTRODUCTION
Due to its wide applications in various monitoring systems
and invulnerability, the security of wireless sensor networks
has attracted numerous attentions. The most critical threat to
the WSNs are the jamming attack where the jammer disrupts
the delivery of nearest nodes with interface signal. Due to
the researches on this issue, it can be explained and solved
more efficiently.
In recent years, the most effective measures and
technique against the Reactive Jamming are the Jamming
Detection and Jamming Mitigation. At the same time
various network diversities are investigated to provide
immediate solutions.
Here in this paper, for reactive jammers in wireless
sensor network, we present an application-layer real time
trigger identification, which gives the list of trigger nodes
having lightweight algorithms. The above technique
provides great potential to develop as jamming defending.
This technique of trigger identification is very
exciting due to its hardness and ability to identify the trigger
nodes from the set of the victim nodes that are affected due
to the jamming signals from the reactive jammers.
II. RELATED WORK
In our project our main aim is to find first the affected nodes
by corresponding links PDR and RSS, where these affected
nodes are grouped into multiple testing teams. Then the
group testing schedule is done to identify whether the nodes
are triggered or non-triggered at the base station. Then the
result may be routed or may be sent to the sent to the base
station for jamming.
III. THREE KERNEL TECHNIQUES
In this we have the kernel techniques that we have to resort
to in the protocol. Most damage is done by the reactive
jammers that can do larger damage due to its hardness to
detect and efficient attack. For this we brought up with the
group testing process, i.e. the randomized error tolerant
group testing by means of disjunct matrix and designed
random, which avoids unnecessarily large isolated areas. In
existing solutions, they can handle only the single jammer
case due to the lack of knowledge of the range of the
jammer and inevitable overlapping of the jammed areas
bring up the analytical difficulties. So keeping this in mind
we resort the two another techniques as a minimum disk
cover problem in within simple polygon problem and a
clique independent set problem.
To speed up the identification of blood samples
from a large sample population the method of group testing
was proposed. This testing has helped various fields such as
medical testing and medical biology in the recent decades.
IV. TRIGGER IDENTIFICATION PROCEDURE
In this procedure, the time complexity as well as the
transmission overhead is low and it is lightweight so that all
calculations occur at base station. No external hardware are
required. Only the status report messages sent by sensor and
the geographic locations of all sensors are maintained at the
base stations.
The main steps in this procedure are as follows:
1) Jammer Property Estimation- In this base station
calculates the jamming range and the estimated
jammed area based on the boundary locations.
2) Trigger Detection-In this the a short testing
schedule where the broadcast nodes will be
receiving the messages from the base stations.
Then the boundary nodes keep broadcasting to the
entire node including the victim nodes which will
be receiving the messages within the estimated
jammed area for a period T. Then the victim nodes
execute the short testing procedure based on the
messages and a global uniform clock identify
themselves as trigger or non-trigger.
3) Anomaly Detection-In this the potential of the
reactive jamming attack is detect by the base
station, where each boundary node tries to report
their identities to the base station.
Defending Reactive Jammers in WSN using A Trigger Identification Service
(IJSRD/Vol. 2/Issue 09/2014/123)
All rights reserved by www.ijsrd.com 548
Fig: System Architecture
V. CONCLUSION
In this paper we have solved the jamming problem more
efficiently. The only point that left of the jammers was the
jammer mobility. The latency of the identifying the node
was not fast hence it would not have been efficient with the
nodes with the higher speed. One of the main leftover of the
system was the application of the service. The routing of the
jammers and the localizations of the jammers are promising
but still it needs to be developed for the real time
requirement.
As studied for identifying the trigger identification
service framework, we studied different techniques,
procedures as well as executed various algorithms which
include the clique identifying problem, randomized error
tolerant group testing and minimum disk cover for simple
polygon. The efficiency of this framework has been
determined in both by theoretically and through various
models which attack on the service under network settings.
With many possible applications these frameworks consist
of huge potential to detect the trigger nodes and also need
the further studies.
REFERENCES
[1] M. Strasser, B. Danev, and S. Capkun. “Detection
of reactive jamming in sensor networks.” ETH
Zurich D-INFK Technical Report, August 2009.
[2] H. Wang, J. Guo, and Z. Wang. “Feasibility
assessment of repeater jamming technique for
dsss.” WCNC2007. IEEE, pages 2322–2327,
March 2007.
[3] H. Liu, W. Xu, Y. Chen, Z. Liu, “Localizing
Jammers in Wireless Networks”, PWN 2009.
[4] Z. Liu, H. Liu, W. Xu, Y. Chen, “Wireless
Jamming Localization by Exploiting Nodes’
Hearing Ranges”, DCOSS 2010.
[5] Y. Xuan, Y. Shen, Nam P. Nguyen and My T.
Thai” Trigger Identification Service for Defending
Reactive Jammers in WSN.” MAY 2012.

More Related Content

What's hot

Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor networkChinmoy Jena
 
Cut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor NetworkCut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor NetworkIJMTST Journal
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Sigma web solutions pvt. ltd.
 
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...IJMTST Journal
 
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKNOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKIJNSA Journal
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkMuhammad Kaife Uddin
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...IJEEE
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKTejas Wasule
 
Fault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor NetworkFault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor NetworkYogesh Vk
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technologyKapil Dev
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Editor IJMTER
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless networkTeced Ce
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsnElham Hormozi
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkKarthik
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...eSAT Publishing House
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor NetworkGanesh Khadsan
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORijcsa
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptsofiakhatoon
 

What's hot (20)

Hetrogenous wireless sensor network
Hetrogenous wireless sensor networkHetrogenous wireless sensor network
Hetrogenous wireless sensor network
 
Cut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor NetworkCut Detection in Wireless Sensor Network
Cut Detection in Wireless Sensor Network
 
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
Fault tolerance in wireless sensor networks by Constrained Delaunay Triangula...
 
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
 
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKNOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
 
Introduction of Wireless Sensor Network
Introduction of Wireless Sensor NetworkIntroduction of Wireless Sensor Network
Introduction of Wireless Sensor Network
 
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
EFFECTIVE AND SECURE DATA COMMUNICATION IN WSNs CONSIDERING TRANSFER MODULE O...
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
Fault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor NetworkFault Node Recovery Algorithm for a Wireless Sensor Network
Fault Node Recovery Algorithm for a Wireless Sensor Network
 
C0511318
C0511318C0511318
C0511318
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
Seminar report on WSN technology
Seminar report on WSN technologySeminar report on WSN technology
Seminar report on WSN technology
 
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
Performance Analysis of Fault Detection in Round Trip Delay and Path Wireless...
 
Wireless sensor network wireless network
Wireless sensor network wireless networkWireless sensor network wireless network
Wireless sensor network wireless network
 
Fault tolerance in wsn
Fault tolerance in wsnFault tolerance in wsn
Fault tolerance in wsn
 
Basic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor NetworkBasic Architecture of Wireless Sensor Network
Basic Architecture of Wireless Sensor Network
 
Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...Secure data dissemination protocol in wireless sensor networks using xor netw...
Secure data dissemination protocol in wireless sensor networks using xor netw...
 
Wireless Sensor Network
Wireless Sensor NetworkWireless Sensor Network
Wireless Sensor Network
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
 
Wireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol pptWireless sensor Network using Zero Knowledge Protocol ppt
Wireless sensor Network using Zero Knowledge Protocol ppt
 

Similar to Defending Reactive Jammers in WSN using a Trigger Identification Service.

Dd4301605614
Dd4301605614Dd4301605614
Dd4301605614IJERA Editor
 
IRJET- A Survey on Swarm Optimization Technique in Wireless Sensor Network
IRJET- A Survey on Swarm Optimization Technique in Wireless Sensor NetworkIRJET- A Survey on Swarm Optimization Technique in Wireless Sensor Network
IRJET- A Survey on Swarm Optimization Technique in Wireless Sensor NetworkIRJET Journal
 
Research Challenges and Characteristic Features in Wireless Sensor Networks
Research Challenges and Characteristic Features in Wireless Sensor NetworksResearch Challenges and Characteristic Features in Wireless Sensor Networks
Research Challenges and Characteristic Features in Wireless Sensor NetworksEswar Publications
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocolijtsrd
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkIJMTST Journal
 
Deep Learning Fault Detection Algorithms in WSNs
Deep Learning Fault Detection Algorithms in WSNsDeep Learning Fault Detection Algorithms in WSNs
Deep Learning Fault Detection Algorithms in WSNsIRJET Journal
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET Journal
 
A self-managing fault management mechanism for wireless sensor networks
A self-managing fault management mechanism for wireless sensor networks A self-managing fault management mechanism for wireless sensor networks
A self-managing fault management mechanism for wireless sensor networks ijwmn
 
Sensors Scheduling in Wireless Sensor Networks: An Assessment
Sensors Scheduling in Wireless Sensor Networks: An AssessmentSensors Scheduling in Wireless Sensor Networks: An Assessment
Sensors Scheduling in Wireless Sensor Networks: An Assessmentijtsrd
 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Dharmendrasingh417
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Achieving Real-Time Target Tracking Using Wireless Sensor Networks1
Achieving Real-Time Target Tracking Using Wireless Sensor Networks1Achieving Real-Time Target Tracking Using Wireless Sensor Networks1
Achieving Real-Time Target Tracking Using Wireless Sensor Networks1James Heller
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Easy n Inspire L
 

Similar to Defending Reactive Jammers in WSN using a Trigger Identification Service. (20)

Dd4301605614
Dd4301605614Dd4301605614
Dd4301605614
 
IRJET- A Survey on Swarm Optimization Technique in Wireless Sensor Network
IRJET- A Survey on Swarm Optimization Technique in Wireless Sensor NetworkIRJET- A Survey on Swarm Optimization Technique in Wireless Sensor Network
IRJET- A Survey on Swarm Optimization Technique in Wireless Sensor Network
 
Research Challenges and Characteristic Features in Wireless Sensor Networks
Research Challenges and Characteristic Features in Wireless Sensor NetworksResearch Challenges and Characteristic Features in Wireless Sensor Networks
Research Challenges and Characteristic Features in Wireless Sensor Networks
 
Grid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing ProtocolGrid-Based Multipath with Congestion Avoidance Routing Protocol
Grid-Based Multipath with Congestion Avoidance Routing Protocol
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor Network
 
Deep Learning Fault Detection Algorithms in WSNs
Deep Learning Fault Detection Algorithms in WSNsDeep Learning Fault Detection Algorithms in WSNs
Deep Learning Fault Detection Algorithms in WSNs
 
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...IRJET-  	  Low Priced and Energy Economical Detection of Replicas for Wireles...
IRJET- Low Priced and Energy Economical Detection of Replicas for Wireles...
 
A self-managing fault management mechanism for wireless sensor networks
A self-managing fault management mechanism for wireless sensor networks A self-managing fault management mechanism for wireless sensor networks
A self-managing fault management mechanism for wireless sensor networks
 
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
[IJET-V1I3P2] Authors :Monali Madne, Prof.Manjusha Yeola
 
Sensors Scheduling in Wireless Sensor Networks: An Assessment
Sensors Scheduling in Wireless Sensor Networks: An AssessmentSensors Scheduling in Wireless Sensor Networks: An Assessment
Sensors Scheduling in Wireless Sensor Networks: An Assessment
 
Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network Security Method in Data Acquisition Wireless Sensor Network
Security Method in Data Acquisition Wireless Sensor Network
 
G0261041046
G0261041046G0261041046
G0261041046
 
G0261041046
G0261041046G0261041046
G0261041046
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
F33022028
F33022028F33022028
F33022028
 
F33022028
F33022028F33022028
F33022028
 
Achieving Real-Time Target Tracking Using Wireless Sensor Networks1
Achieving Real-Time Target Tracking Using Wireless Sensor Networks1Achieving Real-Time Target Tracking Using Wireless Sensor Networks1
Achieving Real-Time Target Tracking Using Wireless Sensor Networks1
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1Wireless Sensor Networks UNIT-1
Wireless Sensor Networks UNIT-1
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATIONDESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATIONijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATIONDESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
DESIGN OF FIXTURE OF CONNECTING ROD FOR BORING OPERATION
 

Recently uploaded

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)Dr. Mazin Mohamed alkathiri
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 

Recently uploaded (20)

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 

Defending Reactive Jammers in WSN using a Trigger Identification Service.

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 09, 2014 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 547 Defending Reactive Jammers in WSN using A Trigger Identification Service Harshad Shelar1 Jilani Momin2 Sainath Patil3 Kiran Jaybhaye4 1,2,3,4 Department of Computer Engineering 1,2,3,4 D.C.O.E.R Pune, India Abstract— In the last decade, the greatest threat to the wireless sensor network has been Reactive Jamming Attack because it is difficult to be disclosed and defend as well as due to its mass destruction to legitimate sensor communications. As discussed above about the Reactive Jammers Nodes, a new scheme to deactivate them efficiently is by identifying all trigger nodes, where transmissions invoke the jammer nodes, which has been proposed and developed. Due to this identification mechanism, many existing reactive jamming defending schemes can be benefited. This Trigger Identification can also work as an application layer .In this paper, on one side we provide the several optimization problems to provide complete trigger identification service framework for unreliable wireless sensor networks and on the other side we also provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios. Key words: Trigger Identification,, Error Tolerant Non- adaptive Group Testing, Reactive Jamming, NP Hardness, Jamming Detection I. INTRODUCTION Due to its wide applications in various monitoring systems and invulnerability, the security of wireless sensor networks has attracted numerous attentions. The most critical threat to the WSNs are the jamming attack where the jammer disrupts the delivery of nearest nodes with interface signal. Due to the researches on this issue, it can be explained and solved more efficiently. In recent years, the most effective measures and technique against the Reactive Jamming are the Jamming Detection and Jamming Mitigation. At the same time various network diversities are investigated to provide immediate solutions. Here in this paper, for reactive jammers in wireless sensor network, we present an application-layer real time trigger identification, which gives the list of trigger nodes having lightweight algorithms. The above technique provides great potential to develop as jamming defending. This technique of trigger identification is very exciting due to its hardness and ability to identify the trigger nodes from the set of the victim nodes that are affected due to the jamming signals from the reactive jammers. II. RELATED WORK In our project our main aim is to find first the affected nodes by corresponding links PDR and RSS, where these affected nodes are grouped into multiple testing teams. Then the group testing schedule is done to identify whether the nodes are triggered or non-triggered at the base station. Then the result may be routed or may be sent to the sent to the base station for jamming. III. THREE KERNEL TECHNIQUES In this we have the kernel techniques that we have to resort to in the protocol. Most damage is done by the reactive jammers that can do larger damage due to its hardness to detect and efficient attack. For this we brought up with the group testing process, i.e. the randomized error tolerant group testing by means of disjunct matrix and designed random, which avoids unnecessarily large isolated areas. In existing solutions, they can handle only the single jammer case due to the lack of knowledge of the range of the jammer and inevitable overlapping of the jammed areas bring up the analytical difficulties. So keeping this in mind we resort the two another techniques as a minimum disk cover problem in within simple polygon problem and a clique independent set problem. To speed up the identification of blood samples from a large sample population the method of group testing was proposed. This testing has helped various fields such as medical testing and medical biology in the recent decades. IV. TRIGGER IDENTIFICATION PROCEDURE In this procedure, the time complexity as well as the transmission overhead is low and it is lightweight so that all calculations occur at base station. No external hardware are required. Only the status report messages sent by sensor and the geographic locations of all sensors are maintained at the base stations. The main steps in this procedure are as follows: 1) Jammer Property Estimation- In this base station calculates the jamming range and the estimated jammed area based on the boundary locations. 2) Trigger Detection-In this the a short testing schedule where the broadcast nodes will be receiving the messages from the base stations. Then the boundary nodes keep broadcasting to the entire node including the victim nodes which will be receiving the messages within the estimated jammed area for a period T. Then the victim nodes execute the short testing procedure based on the messages and a global uniform clock identify themselves as trigger or non-trigger. 3) Anomaly Detection-In this the potential of the reactive jamming attack is detect by the base station, where each boundary node tries to report their identities to the base station.
  • 2. Defending Reactive Jammers in WSN using A Trigger Identification Service (IJSRD/Vol. 2/Issue 09/2014/123) All rights reserved by www.ijsrd.com 548 Fig: System Architecture V. CONCLUSION In this paper we have solved the jamming problem more efficiently. The only point that left of the jammers was the jammer mobility. The latency of the identifying the node was not fast hence it would not have been efficient with the nodes with the higher speed. One of the main leftover of the system was the application of the service. The routing of the jammers and the localizations of the jammers are promising but still it needs to be developed for the real time requirement. As studied for identifying the trigger identification service framework, we studied different techniques, procedures as well as executed various algorithms which include the clique identifying problem, randomized error tolerant group testing and minimum disk cover for simple polygon. The efficiency of this framework has been determined in both by theoretically and through various models which attack on the service under network settings. With many possible applications these frameworks consist of huge potential to detect the trigger nodes and also need the further studies. REFERENCES [1] M. Strasser, B. Danev, and S. Capkun. “Detection of reactive jamming in sensor networks.” ETH Zurich D-INFK Technical Report, August 2009. [2] H. Wang, J. Guo, and Z. Wang. “Feasibility assessment of repeater jamming technique for dsss.” WCNC2007. IEEE, pages 2322–2327, March 2007. [3] H. Liu, W. Xu, Y. Chen, Z. Liu, “Localizing Jammers in Wireless Networks”, PWN 2009. [4] Z. Liu, H. Liu, W. Xu, Y. Chen, “Wireless Jamming Localization by Exploiting Nodes’ Hearing Ranges”, DCOSS 2010. [5] Y. Xuan, Y. Shen, Nam P. Nguyen and My T. Thai” Trigger Identification Service for Defending Reactive Jammers in WSN.” MAY 2012.