Intelligent encoding with added puzzle & TESLA security of packets Against Jamming Attacks in Wireless Network

Abstract

Wireless network never has certain defined boundaries that can’t be extended due to this nature security flaws may get developed. Broadcast nature of wireless network makes it easy for intentional attacks to disturb the network management Due to these attacks wireless networks integrity performance effectiveness gets affected Wireless networks mainly based on sharing this makes jammer to implement specific jamming attacks So because of this jamming attacks intended functions of network resources gets disturbed to neutralize effects of attacks we implemented puzzle security with added TESLA properties so that double coverage will be given to security.

Authors and Affiliations

Ugale Pradip, Hemlata Sunhare, Sachin Patel

Keywords

Related Articles

Implementation of Multinomial Standard Product for RSA State Identify Algorithm

This paper presents architecture and modeling of public key RSA encryption/decryption systems. The RSA(rivest -shamir-adleman)algorithm is a secure, high quality public key algorithm.public key supports confidential...

In-dependable Data hiding in an Encrypted Image using FCM-DH Algorithm

In this paper, a data mining technique, Fuzzy C Means Clustering (FCM) based data hiding algorithm (FCM-DH) is used to divide pixels into classes or clusters from the encrypted image. Clustering of pixels in an encry...

A Key Private Re-Encryption Scheme To Secure And PrivacyPreserving Using Cam

In a remote Health monitoring system a client can set up a portable sensor to collect various physiological data to diagnosis himself. Such physiological data could then be sent to a central server which could then r...

Detecting Misbehaving Node In Ad-Hoc Network By Audit Mechanism

The purpose of this project is to detect misbehaving nodes and isolate them in order to make successful message forwarding in ad-hoc networks. In this project we are trying to find the node which does not forward the...

Analyzing Mel Frequency Cepstral Coefficient for Recognition of Isolated English Word using DTW Matching

In this paper we proposed Mel-frequency cepstrum coefficients feature extraction and Dynamic Time Warping matching algorithm for speech recognition. Feature vector (Mel-frequency cepstrum coefficients) obtained from...

Download PDF file
  • EP ID EP27933
  • DOI -
  • Views 248
  • Downloads 0

How To Cite

Ugale Pradip, Hemlata Sunhare, Sachin Patel (2014). Intelligent encoding with added puzzle & TESLA security of packets Against Jamming Attacks in Wireless Network. International Journal of Research in Computer and Communication Technology, 3(6), -. https://europub.co.uk/articles/-A-27933