A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 5
Abstract
Wireless networks are susceptible to numerous security vulnerabilities due to the open nature of the wireless medium. Anyone with a transceiver can eavesdrop on ongoing transmissions, block the transmission of legitimate ones or inject spurious messages. One of the fundamental ways for degrading the overall network performance is by jamming wireless transmissions. In this paper, we deal with the problem of selective jamming under an internal threat model. Here the eavesdropper who is aware of network secrets and the implementation details of all the layers of network protocols in the network stack. The attacker uses his/her internal knowledge for launching selective jamming attacks in which high importance messages are targeted. Hence we propose a novel method for preventing selective jamming attacks in wireless networks.
Authors and Affiliations
Ashrafunnisa
Dynamic Analysis of Delaminated Sandwich Composites
ABSTRACT: The analytical formulation for free vibration of sandwich beams consisting of two different layers and is split along the interface with single and multiple delaminations is presented here. Th...
A Review of Routing Protocols for Wireless Sensor Network
A wireless sensor network is a collection of nodes organized into a cooperative network. Each node consists of processing capability, may contain multiple types of memory, have a RF transceiver, have a power source, and...
Simulation of Explosive Welding with Reasonable Gap Based on ALE Method
In order to study the range of reasonable gap of explosive welding composite pipe, using Arbitrary Lagrange Euler (ALE) method to carry out Finite Element Analysis of explosive welding composite pipe, and simulating the...
SOME IMPUTATION METHODS IN DOUBLE SAMPLING SCHEME FOR ESTIMATION OF POPULATION MEAN
To estimate the population mean with imputation, i.e. the technique of substituting missing data, there are a number of techniques available in literature like Ratio method of imputation, Compromised method of impu...
Virtualization Technology using Virtual Machines for Cloud Computing
Cloud computing is the delivery of computing and storage capacity as a service to a community of end users. The name “cloud computing” comes from the use of a cloud-shaped symbol as an abstraction for the compl...