Evaluating Packet Hiding Methods In Wireless Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 9
Abstract
This paper, explains the problem of selective jamming attacks in wireless networks. The adversary is active only for a short period of time in this particular attacks, it selectively targets the messages of high priority with huge information. We described and given many examples regarding the advantages of selective jamming and network performance degradation. We have presented two case studies; a selective attack on TCP and one on routing. We demonstrate that selective jamming attacks can be implemented by performing real-time packet classification at the physical layer. To find and resolve the attacks, we introduce three schemes which prevent real-time packet classification. We show that selective jamming attacks can be launched by performing real-time packet classification at the physical layer we have analyzed the security of this method and compared with the existing methods.
Authors and Affiliations
Sagarika. Saka , D. Srinivas
Peak-to-Average Power Ratio Reduction in OFDM system using Block Coding technique
One of the challenging issues for Orthogonal Frequency Division Multiplexing (OFDM) system is its high Peak-to-Average Power Ratio (PAPR). In this paper, we review and analysis different OFDM PAPR reduction technique...
Two Techniques for Analyze Network Traffic to Identify Dos Attack
Highlights of the geometric relationships between the network traffic is not a perfect system functionality by taking out the correlation Multivariate analysis (MCA) is to show that the framework of a DoS attack. In...
Person Authentication by voice and image using ANFIS and Shifted MFCC
In security systems, the interest in using biometric technologies for person authentication has grown rapidly. Voice is one of the most promising and mature biometric modalities for secured access control. Here prese...
A Unified System to Ensure Data Security In Cloud Computing
Cloud computing is the concept implemented to crack the daily computing problems, likes of hardware, software and resource availability unhurried by computer users. Although cloud computing promises lower costs, rapi...
Protected And Valuable Cutting For Packet Classification
Hardware implementations of Internet procedure (IP) organization algorithms have been proposed by the research community over the years to realize high speed routers and Internet backbone. Firewalls use packet filter...