AONT- Based Packet Hiding Method for Preventing Jamming Attacks
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 3
Abstract
Abstract: Wireless networks now enjoy widespread commercial lementation because of their ease of use, low cost andsetup. However, since accessing wireless media is much easier than tapping a wired network, then security becomes aserious concern when implementing any wireless network. We consider a particular class of Denial of Service (DoS) attacks called jamming attacks. In the simplest form of jamming, the attacker interferes with the reception of messages by transmitting a ontinuous jamming signal, or several short jamming pulses. Jamming results in the loss of link reliability, increased energy consumption, tended packet delays and disruption of end-to-end routes. The use of distinct, dedicated communication links to transmit data and control traffic introduces a single point of failure for a denial of service attack, in that an adversary may be able to jam control channel traffic and prevent relevant data traffic. To prevent such jamming attacks, in this paper we propose a packet hiding method based on all- or- nothing transforms (AONT)
Authors and Affiliations
M. prasanthi
Road User Attitudes towards Safety Initiatives in Kuwait
Abstract: Among the factors that are far important to improve traffic safety is knowing the degree of interaction of the road users with reducing these accidents and trying to share their opinions and persuasions a...
Noise Removal with Morphological Operations Opening and Closing Using Erosion and Dilation
The mathematical operations are proposed in this paper. By using two mathematical operations erosion and dilation we can add and remove pixels. We can remove the noise or interference in power system. Opening a...
An Improvement to Sensor Protocol for Information via Negotiation (SPIN) Protocol
Wireless sensor network is collection of one or more homogeneous or heterogeneous sensor nodes which sense some events and inform sink for that by sending that data towards it to perform some action. Data trans...
Improving the Security of Cloud Computing using Trusted Computing Technology
Cloud Computing is a collection of computers and servers that are publicly accessible via Internet. It is a significantly new idea that influence the power of internet to process, store and share data from a network of...
Analysis of wings using Airfoil NACA 4412 at different angle of attack
Abstract: The purpose of this paper is to analysis the basic aerodynamic theory of wings and the provide an introduction to wind tunnel testing. This is followed by the result from the wind tunnel testing of a NACA...