Graduate Research in Engineering and Technology (GRET)


In recent days, reactive jamming attack has emerged as a great security threat to wireless sensor network [WSN]. Several strategies are developed to identify the trigger nodes, whose legitimate transmission activates any reactive jammer. After identifying the trigger node, the node will be shut down to deactivate the jammer and its routing information is deleted from the routing table, then the node can’t be used again in the network. Since the node can’t be used again in the network it is one of the major drawbacks. Hence to overcome the problem, In this paper we propose a novel approach, where the identified trigger nodes are put in to the scanning mode, so that we can reuse the trigger nodes, after deactivating the jammer node in the network.





To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.