Intelligent Encoding of Packets Against Jamming Attacks in Wireless Network
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 1
Abstract
Wireless network never has certain limited boundaries that can’t be extended due to this nature security flaws may get developed. When someone breaks into wireless network system that person takes advantage of lapses in technology procedure and management allowing unauthorized access The open nature of wireless medium leaves some security flaws for intentional attacks may be called as jamming attacks Jamming can be viewed as form as DOS attacks whose challenge is to stop unauthorized access to related data So to retain controls with authorized persons besides giving them to illegal users we need security so we implemented drives to hide data packets while transferring into network illustrated Wireless network is still a challenging field related to security implementation . Due to boundary less nature of wireless network can provide maximum services Due to open nature of wireless network it become fertile area for attackers operate destructive behavior. Jamming are the many exploits used to compromise the wireless network In wireless network it is challenge to stop Denial of service attack Because it can be result of intentional interference active in wireless transmission Adversaries who are part of system can create attack easily with their internal knowledge of protocol details In our practice we are encountering the problem of jamming attacks in wireless network as the time period of adversary is very small they target only important message so to completely degrade the power of the attack we applied three crypto system drives which prevent packet classification.
Authors and Affiliations
pradip ravaji ugale, Ms. Hemlata Sunhare, Mr. Sachin Patel
Integrity And Confidentiality for Network Security
We compute the liability metric as a function of the steering and the cryptographic protocols used to secure the complex passage. We formulate the minimum cost node capture attack problem as a nonlinear integer progra...
High Performance of Fault Detection And Correction Technique Using Difference Set Codes For Memory Applications
The advanced combination technologies made it possible for accessing any device so fast that within a portion of seconds the job can be performed. Now days fast memories exists everywhere during accessing if any erro...
Big Data Analytics in the Education Sector: Needs, Opportunities and Challenges
Academic institutions are now drawing attention in finding methods for making effective learning process, for identifying learner’s achievements and weakness, for tracing academic progress and also for predicting fut...
Time Series Data Mining Tool
A time series is a sequence of data points, measured typically at successive points in time spaced at uniform time intervals. Time series analysis comprises methods for analyzing time series data in order to extract...
Accurate Alignment of Search Result Records from Web Data Base
Most search engines are returning results page that are come from structured databases. This type of search engines also referred as web databases. Each results page contains search results records and each record con...