Papers by Deepti Chandrasekharan
Lecture notes in networks and systems, Oct 12, 2022
International Journal in Foundations of Computer Science & Technology, 2013
Wireless sensor networks have been widely applied to various domains such as environmental monito... more Wireless sensor networks have been widely applied to various domains such as environmental monitoring and surveillance. Since wireless sensor networks utilize open transmission media, they are prone to radio jamming attacks. These attacks are easy to launch but difficult to defend. These attacks may lead to low network throughput because of jamming signals. Failure of data transmission in sensor networks is due to corruption of packets by reactive jammers. A number of defence techniques have been proposed in recent years to deal with these jammer attacks. However, each defence technique is suitable for only a limited network range and specific jamming conditions. This paper proposes an adaptive approach to detect and isolate the reactive jammers by using status messages and trigger identification service.
International Journal of Security, Privacy and Trust Management, 2013
Providing an efficient security for wireless sensor network is a crucial challenge which is made ... more Providing an efficient security for wireless sensor network is a crucial challenge which is made more difficult due to its broadcast nature and restrictions on resources such as energy, power memory usage, computation and communication capabilities. The Reactive Jammer Attack is a major security threat to wireless sensor networks because reactive jammer attack is a light weight attack which is easy to launch but difficult to detect .This work suggest a new scheme to neutralize malicious reactive jammer nodes by changing the characteristic of trigger nodes to act as only receiver. Here the current approach attempts to identify the trigger nodes using the group testing technique, which enhances the identification speed and reduces the message complexity of the status report sent periodically between the sensor nodes and the base station.
International Journal of Security, Privacy and Trust Management, 2013
Providing an efficient security for wireless sensor network is a crucial challenge which is made... more Providing an efficient security for wireless sensor network is a crucial challenge which is made more difficult due to its broadcast nature and restrictions on resources such as energy, power memory usage, computation and communication capabilities. The Reactive Jammer Attack is a major security threat to wireless sensor networks because reactive jammer attack is a light weight attack which is easy to launch but difficult to detect .This work suggest a new scheme to neutralize malicious reactive jammer nodes by changing the characteristic of trigger nodes to act as only receiver. Here the current approach attempts to identify the trigger nodes using the group testing technique, which enhances the identification speed and reduces the message complexity of the status report sent periodically between the sensor nodes and the base station.
Wireless sensor networks have been widely applied to various domains such as environmental monito... more Wireless sensor networks have been widely applied to various domains such as environmental monitoring and surveillance. Since wireless sensor networks utilize open transmission media, they are prone to radio jamming attacks. These attacks are easy to launch but difficult to defend. These attacks may lead to low network throughput because of jamming signals. Failure of data transmission in sensor networks is due to
corruption of packets by reactive jammers. A number of defence techniques have been proposed in recent years to deal with these jammer attacks. However, each defence technique is suitable for only a limited network range and specific jamming conditions. This paper proposes an adaptive approach to detect and isolate the reactive jammers by using status messages and trigger identification service.
The false data injection attack is a major security threat in Wireless Sensor Network (WSN) since... more The false data injection attack is a major security threat in Wireless Sensor Network (WSN) since is degrades the network capability. The bandwidth efficient cooperative authentication (BECAN) scheme is used for filtering the false data injection attack. It is used to save energy of sensor nodes in WSN by early detection and filtering of maximum possible injected false data. Source authentication is a critical security requirement in wireless sensor networks to identify attacker nodes that injects false data. Solutions based on Elliptic Curve Cryptography (ECC) have been used for source authentication, but they suffer from severe energy depletion. This results in high computational and communication overheads. Bloom filter based Symmetric-key source authentication scheme exhibits low authentication overhead .This avoids the inherent problems associated with public key cryptography based schemes. The current work demonstrates the efficiency of bloom filter based source authentication using BECAN scheme by comparing ECC and
Bloom filter based methods in terms of energy consumption.
Uploads
Papers by Deepti Chandrasekharan
corruption of packets by reactive jammers. A number of defence techniques have been proposed in recent years to deal with these jammer attacks. However, each defence technique is suitable for only a limited network range and specific jamming conditions. This paper proposes an adaptive approach to detect and isolate the reactive jammers by using status messages and trigger identification service.
Bloom filter based methods in terms of energy consumption.
corruption of packets by reactive jammers. A number of defence techniques have been proposed in recent years to deal with these jammer attacks. However, each defence technique is suitable for only a limited network range and specific jamming conditions. This paper proposes an adaptive approach to detect and isolate the reactive jammers by using status messages and trigger identification service.
Bloom filter based methods in terms of energy consumption.