This paper is published in Volume-4, Issue-3, 2018
Area
Cooperative Communication
Author
Nikita N Bharadwaj, Jaya Dipti Lal, S.V. Charhate
Org/Univ
Shri Govindram Seksaria Institute of Technology and Science, Indore, Madhya Pradesh, India
Keywords
Jamming attacks, Eavesdropping attacks, Intruders
Citations
IEEE
Nikita N Bharadwaj, Jaya Dipti Lal, S.V. Charhate. Optimal power allocation using particle swarm optimization in cooperative wireless sensor networks, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Nikita N Bharadwaj, Jaya Dipti Lal, S.V. Charhate (2018). Optimal power allocation using particle swarm optimization in cooperative wireless sensor networks. International Journal of Advance Research, Ideas and Innovations in Technology, 4(3) www.IJARIIT.com.
MLA
Nikita N Bharadwaj, Jaya Dipti Lal, S.V. Charhate. "Optimal power allocation using particle swarm optimization in cooperative wireless sensor networks." International Journal of Advance Research, Ideas and Innovations in Technology 4.3 (2018). www.IJARIIT.com.
Nikita N Bharadwaj, Jaya Dipti Lal, S.V. Charhate. Optimal power allocation using particle swarm optimization in cooperative wireless sensor networks, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Nikita N Bharadwaj, Jaya Dipti Lal, S.V. Charhate (2018). Optimal power allocation using particle swarm optimization in cooperative wireless sensor networks. International Journal of Advance Research, Ideas and Innovations in Technology, 4(3) www.IJARIIT.com.
MLA
Nikita N Bharadwaj, Jaya Dipti Lal, S.V. Charhate. "Optimal power allocation using particle swarm optimization in cooperative wireless sensor networks." International Journal of Advance Research, Ideas and Innovations in Technology 4.3 (2018). www.IJARIIT.com.
Abstract
This paper presents a brief survey on jamming attacks and measures to be taken for avoiding such attacks. The wireless networks are vulnerable to jamming and eavesdropping attacks. Presently, the lot of attacks are already there which challenge the network security. Jamming attacks can be viewed as unauthorized access of intruders in the transmission network. To defeat jamming attacks, optimal power allocation strategies are discussed in this paper which can be used as an anti-jamming mechanism for strengthening wireless network against various intrusion actions.