Avoiding selective jam attack by packet hiding method in wireless sensor network

Journal Title: UNKNOWN - Year 2013, Vol 2, Issue 6

Abstract

the open nature of the wireless medium leaves it vulnerable to drive or wedge packets forcibly into a tight position referred as squeeze. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks typically; squeeze has been addressed under an external threat model. However, person with depth knowledge of internet protocol specifications and network secrets can launch low-effort squeeze attacks that are difficult to detect and counter. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. We illustrate the advantages of selective squeeze in terms of network performance degradation and adversary effort by presenting two case studies; a selective attack on TCP and one on routing. In this work, we address the problem of selective squeeze attacks in wireless networks. We show that selective squeeze attacks can be launched by performing real-time packet classification at the physical layer. To reduce these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication overhead

Authors and Affiliations

Keywords

Related Articles

Comparative Study on Face Recognition using HGPP, PCA, LDA, ICA and SVM

In this paper performance of five face recognition algorithms i.e. HGPP, PCA, LDA, ICA and SVM is compared. The basis of the comparison is the rate of accuracy of face recognition. These algorithms are employed on the AT...

Secure Sharing of Personal Health Records in Cloud Computing

Secure Sharing of Personal Health Records in Cloud Computing

Cross-Correlation Based Face Recognition Scheme – A Review

The face recognition systems are used to recognize the person by using merely a person’s image. The face detection scheme is the primary method which is used to extract the region of interest (ROI). The ROI is further pr...

Cipher Suites - The Cryptographic Computations in Routing of Mobile Ad hoc Networks (MANET)

Cipher Suites - The Cryptographic Computations in Routing of Mobile Ad hoc Networks (MANET)

Role of Sacred Groves in Phytodiversity Conservation in Rajouri (J&K)

Sacred groves are a group of trees or a patch of vegetation protected by the local people through religious and cultural practices evolved to minimize destruction. Nature worship is an ancient Indian tradition and all fo...

Download PDF file
  • EP ID EP336415
  • DOI -
  • Views 85
  • Downloads 0

How To Cite

(2013). Avoiding selective jam attack by packet hiding method in wireless sensor network. UNKNOWN, 2(6), -. https://europub.co.uk/articles/-A-336415