Seclusiveness Jamming Attacks Using Packet Hiding Method
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 11
Abstract
We explains the problem of selective jamming attacks in wireless networks. The adversary is active only for a short period of time in this particular attack, it selectively targets the messages of high priority with huge information. We described and given many examples regarding the advantages of selective jamming and network performance degradation. We have presented two case studies; a selective attack on TCP and one on routing. We demonstrate that selective jamming attacks can be implement by performing real-time packet classification at the physical layer. To find and resolve this attacks we introduce three schemes which prevent real-time packet classification .We show that selective jamming attacks can be launched by performing real-time packet classification at the physical layerWe have analyzed the security of this method and compared with the existing methods.
Authors and Affiliations
Mohana Rao Kurakula, Nagesh Babu Dasari
Minimising Attacks Using ATPG On Networks
Today's networks require much human involvement to keep them working. Everyday network engineers struggle with router mis-configurations, fibercuts, faulty interfaces, mislabelled cables, software bugs, intermittent...
Providing Privacy For Sensitive Data In Relational Database With Imprecision Bounds
The perception of privacy-preservation for receptive data can necessitate the enforcement of privacy policies or the fortification against uniqueness revelation by rewarding some privacy requirements. In this paper w...
A Novel Survey on SLA based Load leveling in Cloud Computing
The provision of Virtual Machines (VMs) in cloud is one major concern of cloud computing. Cloud Computing is nothing however a group of computing resources and services pooled along and is provided to the users on pay...
A Comparative Study for Slot-Loaded Compact Microstrip Antennas by Using Methods Based on FDTD, FEM and MoM
A comparativestudy on the performance of the computational electromagnetic methods (CEMs) namely finite difference time domain (FDTD), finite element method (FEM) and moment method (MoM) via their corresponding elect...
Transportation XSS Model Data Escape Finding In Content Delivery Networks
Recently increasing use of multimedia scheme applications and services the applications is trusted video sources to dentations undesirable content-loss become critical. While preserving user security XSS model is use...