ABSTRACT

Avoidance on WSNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390 18.7 Comparison of Antijamming Approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391

18.8 Open Research Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392 18.9 Conclusion.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395

The objective of this chapter is to provide a general overview of the critical issue of jamming in wireless sensor networks (WSNs) and cover all the relevant work, providing the interested researcher pointers for open research issues in this field. Jamming represents the most serious security threat in the field of WSNs, as can easily put out of order even WSNs that utilize strong high-layer security mechanisms, simply because it is often ignored in the initial WSN design. Law et al. [12] conclude that with typical WSN systems in use today no effective measures against link-layer jamming are possible. This chapter begins with a brief overview of the communication protocols typically used in WSN deployments. The next section highlights the characteristics of contemporary WSNs that make them susceptible to jamming attacks along with the various types of jamming which can be exercised against WSNs. Typical countermeasures against jamming are also detailed. Furthermore, the key ideas of existing security mechanisms against jamming attacks in WSNs are reviewed, focusing on their respective advantages/disadvantages. This chapter concludes by highlighting open research issues with respect to the defence against jamming attacks in sensor networks.