Evaluating Packet Hiding Methods In Wireless Networks

Abstract

This paper, explains the problem of selective jamming attacks in wireless networks. The adversary is active only for a short period of time in this particular attacks, it selectively targets the messages of high priority with huge information. We described and given many examples regarding the advantages of selective jamming and network performance degradation. We have presented two case studies; a selective attack on TCP and one on routing. We demonstrate that selective jamming attacks can be implemented by performing real-time packet classification at the physical layer. To find and resolve the attacks, we introduce three schemes which prevent real-time packet classification. We show that selective jamming attacks can be launched by performing real-time packet classification at the physical layer we have analyzed the security of this method and compared with the existing methods.

Authors and Affiliations

Sagarika. Saka , D. Srinivas

Keywords

Related Articles

Open Assessment for Collective Information with competent User Revocation in Cloud Computing

Cloud Computing provides an efficient solution for storing and sharing data resources among group members but the security and the identity of cloud users may be in trouble and sharing our secure data among groups is...

Ensuring Data Storage Security in a Cloud Computing Using ‘MONA’

Due to the frequent change of the membership, sharing data in a multi-owner manner is a major problem in cloud computing. Identity privacy and Privacy preserving from an entrusted cloud is still a challenging issue....

Traffic Protection against Link and Node Failures Using Fast Re-Route for MPLS Networks

The increase of data transfer over the Internet is complexity process for providing internet services as badly affected the quality of service and the dataflow. To reduce this problem, in this paper I am introducing a...

ROUTING THROUGH CROSS LAYER APPROACH FOR WIRELESS MAC LAYER NETWORKS

Wireless mesh networks (WMNs) are dynamically self-organized and self-configured, with the nodes in the network automatically establishing an ad hoc network and maintaining the mesh connectivity. WMNs are comprised o...

http://www.ijrcct.org/index.php/ojs/article/download/1385/pdf

A performance efficient asynchronous parallel Self Timed Adder(PASTA) is presented in this paper. This adder achieves better performance even without any speedup circuitry/lookahed schem/carry skip unit. Skew problem...

Download PDF file
  • EP ID EP27670
  • DOI -
  • Views 239
  • Downloads 4

How To Cite

Sagarika. Saka, D. Srinivas (2013). Evaluating Packet Hiding Methods In Wireless Networks. International Journal of Research in Computer and Communication Technology, 2(9), -. https://europub.co.uk/articles/-A-27670