Preventing Real-time Packet Classification in Wireless Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 11
Abstract
This paper proposes the problem of selective jamming attacks in wireless networks. The adversary is active only for a short period of time in this particular attack, it selectively targets the messages of high priority with huge information. We have presented two case studies; a selective attack on TCP and one on routing. We demonstrate that selective jamming attacks can be implement by performing real-time packet classification at the physical layer. In this project we propose four methods to prevent the following attacks. A selective attack on TCP and one on routing. Performing real-time packet classification at the physical layer. mitigating selective forwarding attack or gray hole attack.
Authors and Affiliations
G. jayavani , G. ramanjaneya raju
Vision Defect Identification System (VDIS) using Knowledge Base and Image Processing Framework
In this research paper, a novel system has been designed which is using two discipline of Computer science area which are Artificial intelligence and image Processing. Fuzzy sets and logic has been chosen from AI and...
Automated Sentiment Analysis System Using Machine Learning Algorithms
Sentiment analysis can be very useful for business if employed correctly. In this article, I will attempt to demystify the process, provide context, and offer some concrete examples of how businesses can utilize it....
Efficient Approximate Algorithms To Estimate The Sr Score For Queries Over Databases
One necessitates province information about the data sets to enlarge idea of clearness score for queries over databases. Each subject in a database encloses the units that are about a similar subject. It is in genera...
Coverage Modeling For Verification Of Floating Point Arithmetic Units
Scope displaying is one of the key errands of the confirmation stream in frameworks improvement. The subsequent model is regularly used to assess the advancement and nature of the check process; it likewise gives a v...
Implementation of Trust Aware Routing Framework With Link Failure Consideration and Recovery
Wireless Sensor Network has now huge scope for research and application development but sensor networks are vulnerable to different attack. Hence security is key issue while using Sensor networks. Identity deceptions...