Intelligent Encoding of Packets Against Jamming Attacks in Wireless Network
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 1
Abstract
Wireless network never has certain limited boundaries that can’t be extended due to this nature security flaws may get developed. When someone breaks into wireless network system that person takes advantage of lapses in technology procedure and management allowing unauthorized access The open nature of wireless medium leaves some security flaws for intentional attacks may be called as jamming attacks Jamming can be viewed as form as DOS attacks whose challenge is to stop unauthorized access to related data So to retain controls with authorized persons besides giving them to illegal users we need security so we implemented drives to hide data packets while transferring into network illustrated Wireless network is still a challenging field related to security implementation . Due to boundary less nature of wireless network can provide maximum services Due to open nature of wireless network it become fertile area for attackers operate destructive behavior. Jamming are the many exploits used to compromise the wireless network In wireless network it is challenge to stop Denial of service attack Because it can be result of intentional interference active in wireless transmission Adversaries who are part of system can create attack easily with their internal knowledge of protocol details In our practice we are encountering the problem of jamming attacks in wireless network as the time period of adversary is very small they target only important message so to completely degrade the power of the attack we applied three crypto system drives which prevent packet classification.
Authors and Affiliations
pradip ravaji ugale, Ms. Hemlata Sunhare, Mr. Sachin Patel
Security Monitoring System Design Based on ARM9 and Embedded Face Recognition System
In this paper, proposed system is designed to recognize the person based on preloaded database images in controller. Our Embedded system using Friendly ARM9 based BSP S3C2440 has feature of image/video processing with...
Cooperative and Riskless Data Publishing in Cloud Computing
This paper explains. Proposing a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasurecoded data. The proposed design allows users to audit the cloud storag...
Blind Watermarking Scheme for Un-Compressed Video Using RBF Neural Network
Robust watermarking is one of the major multimedia processing applications which is specifically important for compressed and uncompressed video for copyright protection, content authentication and broadcasting. In t...
Review Paper on Diagnosis of increased risk of heart failure by using a dynamic risk scores
we are living in the world of technology and there is large number of disorders these days. Heart failure is amongst one of them. Heart failure (HF), often called congestive heart failure (CHF) or congestive cardiac...
Implementation of VLSI Based Router for Custom Network On Chip Applications
A fast full-chip synthesis method to construct network-on-chips (Custom Noc) for network on chip based systems.It can be used for irregular network topology for specific designs with already known communication deman...