Evaluating Packet Hiding Methods In Wireless Networks

Abstract

This paper, explains the problem of selective jamming attacks in wireless networks. The adversary is active only for a short period of time in this particular attacks, it selectively targets the messages of high priority with huge information. We described and given many examples regarding the advantages of selective jamming and network performance degradation. We have presented two case studies; a selective attack on TCP and one on routing. We demonstrate that selective jamming attacks can be implemented by performing real-time packet classification at the physical layer. To find and resolve the attacks, we introduce three schemes which prevent real-time packet classification. We show that selective jamming attacks can be launched by performing real-time packet classification at the physical layer we have analyzed the security of this method and compared with the existing methods.

Authors and Affiliations

Sagarika. Saka , D. Srinivas

Keywords

Related Articles

Peak-to-Average Power Ratio Reduction in OFDM system using Block Coding technique

One of the challenging issues for Orthogonal Frequency Division Multiplexing (OFDM) system is its high Peak-to-Average Power Ratio (PAPR). In this paper, we review and analysis different OFDM PAPR reduction technique...

Two Techniques for Analyze Network Traffic to Identify Dos Attack

Highlights of the geometric relationships between the network traffic is not a perfect system functionality by taking out the correlation Multivariate analysis (MCA) is to show that the framework of a DoS attack. In...

Person Authentication by voice and image using ANFIS and Shifted MFCC

In security systems, the interest in using biometric technologies for person authentication has grown rapidly. Voice is one of the most promising and mature biometric modalities for secured access control. Here prese...

A Unified System to Ensure Data Security In Cloud Computing

Cloud computing is the concept implemented to crack the daily computing problems, likes of hardware, software and resource availability unhurried by computer users. Although cloud computing promises lower costs, rapi...

Protected And Valuable Cutting For Packet Classification

Hardware implementations of Internet procedure (IP) organization algorithms have been proposed by the research community over the years to realize high speed routers and Internet backbone. Firewalls use packet filter...

Download PDF file
  • EP ID EP27670
  • DOI -
  • Views 276
  • Downloads 4

How To Cite

Sagarika. Saka, D. Srinivas (2013). Evaluating Packet Hiding Methods In Wireless Networks. International Journal of Research in Computer and Communication Technology, 2(9), -. https://europub.co.uk/articles/-A-27670