Avoiding selective jam attack by packet hiding method in wireless sensor network
Journal Title: UNKNOWN - Year 2013, Vol 2, Issue 6
Abstract
the open nature of the wireless medium leaves it vulnerable to drive or wedge packets forcibly into a tight position referred as squeeze. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks typically; squeeze has been addressed under an external threat model. However, person with depth knowledge of internet protocol specifications and network secrets can launch low-effort squeeze attacks that are difficult to detect and counter. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. We illustrate the advantages of selective squeeze in terms of network performance degradation and adversary effort by presenting two case studies; a selective attack on TCP and one on routing. In this work, we address the problem of selective squeeze attacks in wireless networks. We show that selective squeeze attacks can be launched by performing real-time packet classification at the physical layer. To reduce these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication overhead
Block Printing with Dye Concentrate of Butea Monosperma Flowers with Gum Extracted from Waste Mango Kernel and Cassia Tora Seeds on Cotton Fabric
Natural dyes and natural thickening agents appear to be ideal choice. This is because natural dyes and thickening agents have better biodegradability and higher compatibility with environment. The block printing of cotto...
Security Based Variable Holographic Data Encryption using Spatial Light Modulator
Holographic data storage(HDS) has been considered as a promising data storage technology.The level of security can be increased, if it is possible to record variable data, such as 1D and 2D barcode, in the same hologram....
The Strategy of Business Process Integration and Competitive Advantage in a Supply Chain Collaboration with the Outcome Corn Farmers? Welfare in West Nusa Tenggara Province ? Indonesia
The Strategy of Business Process Integration and Competitive Advantage in a Supply Chain Collaboration with the Outcome Corn Farmers? Welfare in West Nusa Tenggara Province ? Indonesia
Solving Hybrid Fuzzy Fractional Differential Equations by Runge Kutta 4th Order Method
In this paper we study numerical methods for hybrid fuzzy fractional differential equation, Degree of Sub element hood and the iteration method is used to solve the hybrid fuzzy fractional differential equations with a f...
Determination of Age of Oreochromis niloticus Fry After Hatching for Efficiency of 17-α Methyltestosterone on Sex Reversal
The aim of this research was to determine age of Oreochromis niloticus fry after hatching for efficiency of 17-α methyltestosterone on sex reversal. The study was carried out in Zoology Laboratory, University of Eldoret....