Secured Packet Hiding Technique for Packet Jamming Attacks

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 1

Abstract

Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. Jamming attacks can severely interfere with the normal operation of Networks and, consequently, mechanisms are needed that can cope with jamming attacks. The Denial of Service attacks (DoS), the most widespread attack to the Network requires great concern and resilient mechanisms. Typically, jamming has been addressed under an external threat model. However, adversaries with internal understanding of protocol specifications and network secrets can launch low-effort jamming attacks which get problematic to detect and counter. Existing work proposed selective jamming attacks in wireless networks has some limitations. First limitation is Performance delay in a selective attack on TCP and maybe on routing. During these attacks, the adversary is active just for a brief period of valuable time, selectively targeting messages of high importance. Second limitation includes problem in real time packet classification. Proposed model evaluates robust selective jamming attacks detection mechanism while performing real-time packet classification at the physical layer. To mitigate these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication overhead.

Authors and Affiliations

Varagani Paparao , M. N. Satish Kumar

Keywords

Related Articles

Adaptive Mobile Video Streaming and Efficient Social Video Sharing in Cloud

The mobile phones grow to be an essential part of our everyday life, with smart phone sales at present greater than before very much and also user demands to run lots of applications have enhanced. The victory of next in...

Recognition of Consonants in Isolated Punjabi Words using DWT

Speech is the medium through which human beings can communicate with each other efficiently. Speech synthesis and recognition are two phases of speech. In this paper, focus is given on speech recognition. Speech recognit...

Password-Only Authenticated Key Exchange Using Distributed Server

Authentication using Password-authenticated key exchange using distributed server (PAKEUDE) is done where a cryptographic key - exchange of messages. Database of all passwords to authenticate clients are stored in a dist...

Facial Image Noise Removal Via a Trained Dictionary

In this project we address that, sparsity has shown to be useful in source separation. In most cases, the sources are not sparse currently and needs to sparsify them using a known dictionary. The problem here is that, if...

Download PDF file
  • EP ID EP120747
  • DOI -
  • Views 97
  • Downloads 0

How To Cite

Varagani Paparao, M. N. Satish Kumar (2013). Secured Packet Hiding Technique for Packet Jamming Attacks. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 6(1), 58-63. https://europub.co.uk/articles/-A-120747