Jamming Anticipation and Convolution through Immaculate Hiding  Process of Packets

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 13, Issue 2

Abstract

 Cached data not only replies local access, but also replies data request issued from other nodes. Wireless Mesh Networks (WMNs) have emerged as an important technology in building next generation fixed  wireless broadband networks that provide low cost Internet access for fixed and mobile users. Reduce the  number of hops that request/data need to travel in the network. In these attacks, the adversary selectively targets  specific packets of “high” importance by exploiting his knowledge on the implementation details of network  protocols at various layers of the protocol stack. We illustrate the impact of selective jamming on the network  performance by illustrating various selective attacks against the TCP protocol. We show that such attacks can be  launched by performing real-time packet classification at the physical layer. We study the idealized case of  perfect knowledge by both the jammer and the network about the strategy of one another, and the case where the  jammer or the networks lack this knowledge. The latter is captured by formulating and solving optimization problems, the solutions of which constitute best responses of the attacker or the network to the worst-case  strategy of each other.

Authors and Affiliations

T Sandeep

Keywords

Related Articles

A Survey of Clustering Scheme for Manets

Abstract: Mobile adhoc network is a network in which nodes are dynamic in nature and has limited bandwidth and battery power. They are used in different situations such as military services, medical or embedded applicati...

 Analysis and Implementation of Selective Image Encryption Technique Using Matlab

 Abstract: Encryption plays a very significant role in secure transmission of digital images from one place to another. There are a number of encryption algorithms available which perform the task of encryption. How...

 An Improvement in Power Management in green Computing using Neural Networks

 The green computing is the technology which is based on the environmental use of computer related resources. The computer related resources includes processing units, storage units etc. In such type of technology...

A Variation of Layered STRIFA Pattern Matching for Intrusion Detection

[sub][/sub]Abstract: Intrusion Detection System (IDS) is an effective security tool that helps to prevent unauthorized access to network resources by analyzing the network traffic and classifying the records as either no...

Role of Fuzzy Set in Students’ Performance Prediction

Abstract: We can use educational data mining to predict student’ performance on the basis of different attribute. In this paper, the classification task is used to predict the result of students. Decision tree (DT) learn...

Download PDF file
  • EP ID EP130757
  • DOI -
  • Views 107
  • Downloads 0

How To Cite

T Sandeep (2013).  Jamming Anticipation and Convolution through Immaculate Hiding  Process of Packets. IOSR Journals (IOSR Journal of Computer Engineering), 13(2), 57-59. https://europub.co.uk/articles/-A-130757