Seclusiveness Jamming Attacks Using Packet Hiding Method

Abstract

We explains the problem of selective jamming attacks in wireless networks. The adversary is active only for a short period of time in this particular attack, it selectively targets the messages of high priority with huge information. We described and given many examples regarding the advantages of selective jamming and network performance degradation. We have presented two case studies; a selective attack on TCP and one on routing. We demonstrate that selective jamming attacks can be implement by performing real-time packet classification at the physical layer. To find and resolve this attacks we introduce three schemes which prevent real-time packet classification .We show that selective jamming attacks can be launched by performing real-time packet classification at the physical layerWe have analyzed the security of this method and compared with the existing methods.

Authors and Affiliations

Mohana Rao Kurakula, Nagesh Babu Dasari

Keywords

Related Articles

Minimising Attacks Using ATPG On Networks

Today's networks require much human involvement to keep them working. Everyday network engineers struggle with router mis-configurations, fibercuts, faulty interfaces, mislabelled cables, software bugs, intermittent...

Providing Privacy For Sensitive Data In Relational Database With Imprecision Bounds

The perception of privacy-preservation for receptive data can necessitate the enforcement of privacy policies or the fortification against uniqueness revelation by rewarding some privacy requirements. In this paper w...

A Novel Survey on SLA based Load leveling in Cloud Computing

The provision of Virtual Machines (VMs) in cloud is one major concern of cloud computing. Cloud Computing is nothing however a group of computing resources and services pooled along and is provided to the users on pay...

A Comparative Study for Slot-Loaded Compact Microstrip Antennas by Using Methods Based on FDTD, FEM and MoM

A comparativestudy on the performance of the computational electromagnetic methods (CEMs) namely finite difference time domain (FDTD), finite element method (FEM) and moment method (MoM) via their corresponding elect...

Transportation XSS Model Data Escape Finding In Content Delivery Networks

Recently increasing use of multimedia scheme applications and services the applications is trusted video sources to dentations undesirable content-loss become critical. While preserving user security XSS model is use...

Download PDF file
  • EP ID EP27748
  • DOI -
  • Views 279
  • Downloads 2

How To Cite

Mohana Rao Kurakula, Nagesh Babu Dasari (2013). Seclusiveness Jamming Attacks Using Packet Hiding Method. International Journal of Research in Computer and Communication Technology, 2(11), -. https://europub.co.uk/articles/-A-27748