Intelligent encoding with added puzzle & TESLA security of packets Against Jamming Attacks in Wireless Network

Abstract

Wireless network never has certain defined boundaries that can’t be extended due to this nature security flaws may get developed. Broadcast nature of wireless network makes it easy for intentional attacks to disturb the network management Due to these attacks wireless networks integrity performance effectiveness gets affected Wireless networks mainly based on sharing this makes jammer to implement specific jamming attacks So because of this jamming attacks intended functions of network resources gets disturbed to neutralize effects of attacks we implemented puzzle security with added TESLA properties so that double coverage will be given to security.

Authors and Affiliations

Ugale Pradip, Hemlata Sunhare, Sachin Patel

Keywords

Related Articles

Text Clustering Using Cosine Similarity and Matrix Factorization

Clustering is a useful technique that organizes a large quantity of unordered text documents into a small number of meaningful and coherent clusters, thereby providing a basis for intuitive and informative navigation...

Secure Group Communication by Establishing a Novel Trust Relationship Model and Detecting Malicious nodes in Peer to Peer Systems

Trust administration in P2P framework is utilized to distinguish vindictive practices and to advance legitimate and agreeable communications. The fundamental objective of the prior P2P frameworks is the capacity of c...

Identifying Misuse of Data In Cloud

Cloud Storage Enables Users To Store Their Data Offering strong data protection to cloud users while enabling rich applications is a challenging task. We explore a new cloud platform architecture called Data Protecti...

Design and Implementation of Body Movement Recognition System

In this project body movement recognition system based on the Non-vision over the Zigbee Wireless Sensor Network. Now a day's always (day and night time) vision based coma, paralysis patient’s posture information can...

Secure Authentication Schemes

There are different authentication methods to provide security. The most commonly used are textual passwords, but are commonly susceptible to brute -force attacks. Recognition and Recall-based techniques on graphical...

Download PDF file
  • EP ID EP27933
  • DOI -
  • Views 260
  • Downloads 0

How To Cite

Ugale Pradip, Hemlata Sunhare, Sachin Patel (2014). Intelligent encoding with added puzzle & TESLA security of packets Against Jamming Attacks in Wireless Network. International Journal of Research in Computer and Communication Technology, 3(6), -. https://europub.co.uk/articles/-A-27933