Intelligent Encoding of Packets Against Jamming Attacks in Wireless Network
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 1
Abstract
Wireless network never has certain limited boundaries that can’t be extended due to this nature security flaws may get developed. When someone breaks into wireless network system that person takes advantage of lapses in technology procedure and management allowing unauthorized access The open nature of wireless medium leaves some security flaws for intentional attacks may be called as jamming attacks Jamming can be viewed as form as DOS attacks whose challenge is to stop unauthorized access to related data So to retain controls with authorized persons besides giving them to illegal users we need security so we implemented drives to hide data packets while transferring into network illustrated Wireless network is still a challenging field related to security implementation . Due to boundary less nature of wireless network can provide maximum services Due to open nature of wireless network it become fertile area for attackers operate destructive behavior. Jamming are the many exploits used to compromise the wireless network In wireless network it is challenge to stop Denial of service attack Because it can be result of intentional interference active in wireless transmission Adversaries who are part of system can create attack easily with their internal knowledge of protocol details In our practice we are encountering the problem of jamming attacks in wireless network as the time period of adversary is very small they target only important message so to completely degrade the power of the attack we applied three crypto system drives which prevent packet classification.
Authors and Affiliations
pradip ravaji ugale, Ms. Hemlata Sunhare, Mr. Sachin Patel
A Wide Band Pattern and Frequency Reconfigurable Microstrip Patch Antenna using Varactors for WLAN Applications
Wireless communication systems are being used for a number of applications nowadays and for that, a number of antennas or a single antenna with multiple functional capabilities has become inevitable. This paper atte...
Impact of DDOS Attacks on Cloud Environment
Cloud Computing is an emerging area nowadays. Researchers are working on all aspects of cloud viz. cloud network architecture, scheduling policies, virtualization, hypervisor performance scalability, I/O efficiency, d...
Study on Business Process Reengineering(BPR) and its importance in ERP Implementation
In the new era of automation in the industrial growth the ERP plays vital role. Most of the industries struggle to steady their business as much as automatic at the level of functioning environment. The ERP is the one...
Secure Data transfer in Cloud Storage Systems using Dynamic Tokens
Cloud computing is the delivery of computing as a service rather than a product. It provides shared resources, software, and information to computers and other devices over a network. The increasing network bandwidth...
Porting and board bring up of Mini2440 using U-boot and NFS server
U-boot (Universal Boot Loader) has more features and fast updating speed. More over it supports more number of file systems as compared to other boot loaders and customized boot process. This article, through config...