Avoiding selective jam attack by packet hiding method in wireless sensor network
Journal Title: International Journal of Science and Research (IJSR) - Year 2013, Vol 2, Issue 6
Abstract
the open nature of the wireless medium leaves it vulnerable to drive or wedge packets forcibly into a tight position referred as squeeze. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks typically; squeeze has been addressed under an external threat model. However, person with depth knowledge of internet protocol specifications and network secrets can launch low-effort squeeze attacks that are difficult to detect and counter. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. We illustrate the advantages of selective squeeze in terms of network performance degradation and adversary effort by presenting two case studies; a selective attack on TCP and one on routing. In this work, we address the problem of selective squeeze attacks in wireless networks. We show that selective squeeze attacks can be launched by performing real-time packet classification at the physical layer. To reduce these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication overhead
Magnetic Shielding: A Demonstration and Experimental Realization
Action of electric and magnetic fields and their interaction effects are the basis of operation of every electrical and electronic instrument. But such action fields could also cause serious problems to the functioning o...
Comparative Study on the Seasonal Variations in the Soil Edaphic and Chemical Factors of Agricultural and Grass Land Habitats of Central Travancore Kerala
Comparison between agriculture land and grass land habitats in Alapuzha district on the basis of soil edaphic factors like temperature, pH, Organic carbon content (OC), moisture content, Exchangeable Acid (EA), Exchange...
Structural and Dielectric Investigations on x[Ba0.7Ca0.3TiO3]-(1-x)[BaZr0.2Ti0.8O3] Lead-Free Mixed Ceramic Compositions
Lead-free nanopowders of Ba0.7Ca0.3TiO3(BCT) and BaZr0.2Ti0.8O3 (BZT) were prepared using a solid-state reaction technique. The nanoparticles are used to form composites xBCT-(1-x)BZT for x = 0.40, 0.45 and 0.50 with 2w...
Study the Quality Assurance of Conventional X-Ray Machine using Non-Invasive KV Meter
This study was carried out to obtain optimum operation conditions for X-ray machines. We investigated some factors affecting on quality assurance of conventional Siemen X-ray machine, in one of Mansoura Hospitals such a...
Survey on Document Image Binarization for Degraded Document Images
The Technology is connecting the whole world together by the medium of internet. Each segment of our data is present in the form of digital document. We can able to store, duplicate, and backup our data in digital form....