Secured Packet Hiding Technique for Packet Jamming Attacks
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 1
Abstract
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. Jamming attacks can severely interfere with the normal operation of Networks and, consequently, mechanisms are needed that can cope with jamming attacks. The Denial of Service attacks (DoS), the most widespread attack to the Network requires great concern and resilient mechanisms. Typically, jamming has been addressed under an external threat model. However, adversaries with internal understanding of protocol specifications and network secrets can launch low-effort jamming attacks which get problematic to detect and counter. Existing work proposed selective jamming attacks in wireless networks has some limitations. First limitation is Performance delay in a selective attack on TCP and maybe on routing. During these attacks, the adversary is active just for a brief period of valuable time, selectively targeting messages of high importance. Second limitation includes problem in real time packet classification. Proposed model evaluates robust selective jamming attacks detection mechanism while performing real-time packet classification at the physical layer. To mitigate these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication overhead.
Authors and Affiliations
Varagani Paparao , M. N. Satish Kumar
An Effective Cloud Service Reservation Through Negotiation
When making reservations for Cloud services, the consumer should provide with price and time slot for the service. The provider gives the price and time slot which are available, then the particular service will be provi...
Block Motion Based Dynamic Texture Analysis: A Review
Dynamic texture refers to image sequences of non-rigid objects that exhibit some regularity in their movement. Videos of smoke, fire etc. fall under the category of dynamic texture. Researchers have investigated differen...
Performance Estimation of 2*3 MIMO-MC-CDMA in Rayleigh Fading Channel
In this paper we analyze the performance of 2*3 MIMO-MC-CDMA system in MATLAB which greatly reduces BER by increasing the efficiency of system. MIMO and MC-CDMA system arrangement is used to decrease bit error rate and a...
Statistical Anomaly Detection Technique for Real Time Datasets
Data mining is the technique of discovering patterns among data to analyze patterns or decision making predictions. Anomaly detection is the technique of identifying occurrences that deviate immensely from the large a...
Multi-Class Tweet Categorization Using Map Reduce Paradigm
Twitter is one of the most popular micro-blogging website in today's globalized world. Twitter messages can be mined to gain valuable information. Although Twitter provides a list of most popular topics people tweet abou...