Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Hacker Detection: Jamming a WSN
Nabila Rahman Matthew WrightJohn DavisEric Manuel
Eric Manuel teaches at Duncanville High School in Duncanville, Texas. Computer Maintenance, Telecommunications and Cabling, Electronics, and Advanced Electronics. In his 5th year of teaching, his classes consist mostly of sophomores through seniors. This is the second year of his participation in the RET program.
Experimentation – WSN performed indoors under a 49 count network. Summer weather conditions made outdoor experimentation difficult due to the standing water and humidity.
Modifications for lesson plan
The data was able to verify that while jamming the nodes, the neighbors were grouped in an amorphous shape. The jamming was effective for at least 2 neighbors away from the jammer.
From this result, the jammer could cover an effective area for a short period of time.
The sensors were sensitive to high levels of humidity and made outdoor experimentation difficult during wet weather.
From the research this summer, I have been able to modify my lesson plan over physical security to include wireless sensors and their ability to detect activity. The physical security was a basic overview of what an IT group needs to safeguard the hardware for their users. The research allows me to include wireless sensors to demonstrate the susceptibility of a secure wireless network.
Department of Computer Science and Engineering
The University of Texas at Arlington