Evaluating Packet Hiding Methods In Wireless Networks

Abstract

This paper, explains the problem of selective jamming attacks in wireless networks. The adversary is active only for a short period of time in this particular attacks, it selectively targets the messages of high priority with huge information. We described and given many examples regarding the advantages of selective jamming and network performance degradation. We have presented two case studies; a selective attack on TCP and one on routing. We demonstrate that selective jamming attacks can be implemented by performing real-time packet classification at the physical layer. To find and resolve the attacks, we introduce three schemes which prevent real-time packet classification. We show that selective jamming attacks can be launched by performing real-time packet classification at the physical layer we have analyzed the security of this method and compared with the existing methods.

Authors and Affiliations

Sagarika. Saka , D. Srinivas

Keywords

Related Articles

Effective Integration of Voltage Source Converters (VSCs) in weak grids

A New control topology is presented in this paper to have an effective integration of voltage source converters (VSCs) in weak grids. Even though the controller emulates the dynamic performance of synchronous machine...

A Review of Resource Allocation and Task scheduling for Computational Grids based on Meta-heuristic Function

The current scenario of grid computing faced a problem of job failure and increase of execution time of jobs. The failure of job degraded the performance of grid computing. The failure and increase execution time dep...

An Approach for Providing Privacy of Microdata Publishing

In recent years, the wide accessibility of personal data has made the problem of privacy preserving data mining an important one. A number of methods have recently been proposed for privacy preserving data mining of...

Live Activity Index To Gather Effective Live Traffic Broadcasting To Users

A few online services give live movement information by dissecting gathered information from street sensors, activity cameras, and group sourcing strategies, for example, Google-Map, Navteq, INRIX Traffic Information...

Implementation of VOIP Communication on Embedded Systems

In the development of VOIP technology, applications of real-time voice communication has corner into widespread use over the Internet. However, their over reliance on PC environment restricts the applying fields of m...

Download PDF file
  • EP ID EP27670
  • DOI -
  • Views 264
  • Downloads 4

How To Cite

Sagarika. Saka, D. Srinivas (2013). Evaluating Packet Hiding Methods In Wireless Networks. International Journal of Research in Computer and Communication Technology, 2(9), -. https://europub.co.uk/articles/-A-27670