Perceiving TheMalevolent Sachet Fatalities

Abstract

The open nature of the wireless medium leaves it vulnerable to intentional interferenceattacks, typically referred to as jamming. This intentional interference with wirelesstransmissions can be used as a launchpad for mounting Denial-of-Service attacks on wirelessnetworks. Typically, jamming has been addressed under an external threat model. However,adversaries with internal knowledge of protocol specifications and network secrets can launchlow-effort jamming attacks that are difficult to detect and counter. In this work, we address theproblem of selective jamming attacks in wireless networks.By source annulment Such unwanted information leakage often results in privacy breaches of the people in environment.Moreover, the wireless communication employed by sensor networks facilitates eavesdropping and packet injection by an adversary.The combination of these factors demands security for sensor networks at design time to ensure operation safety, secrecy of sensitive data, and privacy for people in sensor environments.Providing security in sensor networks is even more difficult than MANETs due to the resource limitations of sensor nodes.

Authors and Affiliations

Puvvula Krishna Kanth, Jhansi Rani S

Keywords

Related Articles

A Study on Feature Extraction and Classification on Medical Images

The field of medical imaging has gained many important advances with the increase in the need of a completely automated and highly efficient diagnosis system in a short period of time. The shortage of medical professio...

Image Watermarking And Its Techniques: A Review

With the fast development in computer network and multimedia technology, the need of protecting the ownership of digital media becomes a major issue. Digital watermarking is a process of hiding imperceptible data int...

Effective Routing Plan For Quality Results On Linked Data Using Keyword Search

Keyword search is a natural world view for seeking connected information sources on the web. We propose to route keywords just to pertinent sources to reduce the high cost of handling keyword search queries over all...

Securing a Network by Modeling and Containment of Worms Using Preference Scanning

Self-propagating codes, called worms. In this paper, we present an inclination branching process model for characterizing the propagation of Internet worms. Basically user knows the name and the definition of worms, b...

Annotation Wrapper for Annotating The Search Result Records Retrieved From Any Given Web Database

An annotation wrapper for the search site is automatically created and can be used to interpret new result pages from the similar web database. The data units arrived from the fundamental database are generally encod...

Download PDF file
  • EP ID EP28160
  • DOI -
  • Views 260
  • Downloads 1

How To Cite

Puvvula Krishna Kanth, Jhansi Rani S (2015). Perceiving TheMalevolent Sachet Fatalities. International Journal of Research in Computer and Communication Technology, 4(3), -. https://europub.co.uk/articles/-A-28160