Jamming Anticipation and Convolution through Immaculate Hiding Process of Packets
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 13, Issue 2
Abstract
Cached data not only replies local access, but also replies data request issued from other nodes. Wireless Mesh Networks (WMNs) have emerged as an important technology in building next generation fixed wireless broadband networks that provide low cost Internet access for fixed and mobile users. Reduce the number of hops that request/data need to travel in the network. In these attacks, the adversary selectively targets specific packets of “high” importance by exploiting his knowledge on the implementation details of network protocols at various layers of the protocol stack. We illustrate the impact of selective jamming on the network performance by illustrating various selective attacks against the TCP protocol. We show that such attacks can be launched by performing real-time packet classification at the physical layer. We study the idealized case of perfect knowledge by both the jammer and the network about the strategy of one another, and the case where the jammer or the networks lack this knowledge. The latter is captured by formulating and solving optimization problems, the solutions of which constitute best responses of the attacker or the network to the worst-case strategy of each other.
Authors and Affiliations
T Sandeep
A Survey of Clustering Scheme for Manets
Abstract: Mobile adhoc network is a network in which nodes are dynamic in nature and has limited bandwidth and battery power. They are used in different situations such as military services, medical or embedded applicati...
Analysis and Implementation of Selective Image Encryption Technique Using Matlab
Abstract: Encryption plays a very significant role in secure transmission of digital images from one place to another. There are a number of encryption algorithms available which perform the task of encryption. How...
An Improvement in Power Management in green Computing using Neural Networks
The green computing is the technology which is based on the environmental use of computer related resources. The computer related resources includes processing units, storage units etc. In such type of technology...
A Variation of Layered STRIFA Pattern Matching for Intrusion Detection
[sub][/sub]Abstract: Intrusion Detection System (IDS) is an effective security tool that helps to prevent unauthorized access to network resources by analyzing the network traffic and classifying the records as either no...
Role of Fuzzy Set in Students’ Performance Prediction
Abstract: We can use educational data mining to predict student’ performance on the basis of different attribute. In this paper, the classification task is used to predict the result of students. Decision tree (DT) learn...