Seclusiveness Jamming Attacks Using Packet Hiding Method
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 11
Abstract
We explains the problem of selective jamming attacks in wireless networks. The adversary is active only for a short period of time in this particular attack, it selectively targets the messages of high priority with huge information. We described and given many examples regarding the advantages of selective jamming and network performance degradation. We have presented two case studies; a selective attack on TCP and one on routing. We demonstrate that selective jamming attacks can be implement by performing real-time packet classification at the physical layer. To find and resolve this attacks we introduce three schemes which prevent real-time packet classification .We show that selective jamming attacks can be launched by performing real-time packet classification at the physical layerWe have analyzed the security of this method and compared with the existing methods.
Authors and Affiliations
Mohana Rao Kurakula, Nagesh Babu Dasari
Optimum Image Filtering Algorithm Over The Unit Sphere
A statistical shape model, which includes a network of deformable curves on the unit sphere as reference framework for seeking geometric features such as high curvature regions and labels such features via a deforma...
A NOVEL APPROACH FOR DATA PUBLISHING IN MINING
In recent years, advances in technology have lead to an increase in the capability to store and record personal data about consumers and individuals. This has guide to concerns that the personal data may be misused for...
A Survey on Multipath Routing Protocols for Reliable Data Transmission in Wireless Sensor Networks
Multipath routing approach is used in wireless sensor networks to improve network performance through efficient utilization of available network resources. In Wireless sensor networks (WSNs) many multipath routing pro...
Providing High Security for WSN’s Using Distributed Hash Table (DHT)
There have been two novel node clone detection protocols with diverse tradeoffs on network circumstances and performance. The first one is based on a distributed hash table (DHT) by which a completely decentralized,...
Investigating the user profile of potential users of e-government in Yemen
Understanding the citizens’ needs by e-government decision makers offers great opportunities to make communication more effective and efficient, to infer and predict citizens’ behaviour and to even influence behaviou...