Seclusiveness Jamming Attacks Using Packet Hiding Method
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 11
Abstract
We explains the problem of selective jamming attacks in wireless networks. The adversary is active only for a short period of time in this particular attack, it selectively targets the messages of high priority with huge information. We described and given many examples regarding the advantages of selective jamming and network performance degradation. We have presented two case studies; a selective attack on TCP and one on routing. We demonstrate that selective jamming attacks can be implement by performing real-time packet classification at the physical layer. To find and resolve this attacks we introduce three schemes which prevent real-time packet classification .We show that selective jamming attacks can be launched by performing real-time packet classification at the physical layerWe have analyzed the security of this method and compared with the existing methods.
Authors and Affiliations
Mohana Rao Kurakula, Nagesh Babu Dasari
AR Simulated Camera
This paper provides an interactive idea for interior designing application using augmented reality (AR). Augmented reality merges real world and virtual world together. Due to the developing technology and lack of time,...
Mobile Cloud Computing: A Emerging Technology, Its Advantages and Issues
In spite of great advances in the mobile devices as a computing platform, applications is still very limited due to the poor computing capability of mobile devices and limited battery life. In order to overcome these...
Comparison of EEA3 and EEA1 Algorithms in Terms of Encryption Time and Throughput
EEA3 (Evolved Packet System Encryption Algorithm 3) and EEA1 (Evolved Packet System Encryption Algorithm 1) are confidentiality algorithms that are used to en/decrypt blocks of data. In this paper we present the enc...
Requirement Elicitation in Web Applications: Challenges
Requirement elicitation is a vital activity in the process of requirement development and it discovers the requirements of end users. The successfulness of this process mainly depends on identifying the appropriate s...
Review Paper on Diagnosis of increased risk of heart failure by using a dynamic risk scores
we are living in the world of technology and there is large number of disorders these days. Heart failure is amongst one of them. Heart failure (HF), often called congestive heart failure (CHF) or congestive cardiac...