Evaluating Packet Hiding Methods In Wireless Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 9
Abstract
This paper, explains the problem of selective jamming attacks in wireless networks. The adversary is active only for a short period of time in this particular attacks, it selectively targets the messages of high priority with huge information. We described and given many examples regarding the advantages of selective jamming and network performance degradation. We have presented two case studies; a selective attack on TCP and one on routing. We demonstrate that selective jamming attacks can be implemented by performing real-time packet classification at the physical layer. To find and resolve the attacks, we introduce three schemes which prevent real-time packet classification. We show that selective jamming attacks can be launched by performing real-time packet classification at the physical layer we have analyzed the security of this method and compared with the existing methods.
Authors and Affiliations
Sagarika. Saka , D. Srinivas
Big Data Analytics in the Education Sector: Needs, Opportunities and Challenges
Academic institutions are now drawing attention in finding methods for making effective learning process, for identifying learner’s achievements and weakness, for tracing academic progress and also for predicting fut...
Multiple Spoofing Identification For Network Level Security
It’s easy to spoof the wireless networks using the mac identity and the ipconfig. The techniques which have been used based on the Matching rules of signal prints for spoofing detection, RSS readings using a Gaussian...
A Public Auditing Framework for Cloud Storage Security
Commoditization of computing resources has become a reality with cloud computing which is a new computing model. Users are no longer required to invest on procuring computing resources. Instead they use resources pro...
Multiuser access control for online social networks: by using of multiparty access control
Now a day Online social networks (OSNs) have got an exponential growth and become a fame to millions of Internet users. These OSNs offer attractive ways and methods for social interactions and information sharing, Al...
Autograph Protocol for Wireless Sensor Networks
A wealth of innovative opportunities exists for a mobile communications solution that can reliably communicate data without the need for fixed network infrastructure. A key element of any communications system is the...