Secured Packet Hiding Technique for Packet Jamming Attacks

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 1

Abstract

Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. Jamming attacks can severely interfere with the normal operation of Networks and, consequently, mechanisms are needed that can cope with jamming attacks. The Denial of Service attacks (DoS), the most widespread attack to the Network requires great concern and resilient mechanisms. Typically, jamming has been addressed under an external threat model. However, adversaries with internal understanding of protocol specifications and network secrets can launch low-effort jamming attacks which get problematic to detect and counter. Existing work proposed selective jamming attacks in wireless networks has some limitations. First limitation is Performance delay in a selective attack on TCP and maybe on routing. During these attacks, the adversary is active just for a brief period of valuable time, selectively targeting messages of high importance. Second limitation includes problem in real time packet classification. Proposed model evaluates robust selective jamming attacks detection mechanism while performing real-time packet classification at the physical layer. To mitigate these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication overhead.

Authors and Affiliations

Varagani Paparao , M. N. Satish Kumar

Keywords

Related Articles

Efficient Preprocessing and Patterns Identification Approach for Text Mining

Due to the rapid expansion of digital data , knowledge discovery and data mining have attracted significant amount of a ttention for turning such data into helpful information and knowledge. Text categorization is contin...

An Estimation Method of Measuring Image Quality for Compressed Images of Human Face

Nowadays digital image compression and decompression techniques are very much important. So our aim is to calculate the quality of face and other regions of the compressed image with respect to the original image. Image...

Vector Space Models to Classify Arabic Text

Text classification is one of the most important tasks in data mining. This paper investigates different variations of vector space models (VSMs) using KNN algorithm. The bases of our comparison are the most popular text...

Analysis on Credit Card Fraud Detection Methods

Due to the theatrical increase of fraud which results in loss of dollars worldwide each year, several modern techniques in detecting fraud are persistently evolved and applied to many business fields. Fraud detection inv...

Deriving the Probability with Machine Learning and Efficient Duplicate Detection in Hierarchical Objects

Duplicate detection is the major important task in the data mining, in order to find duplicate in the original data as well as data object. It exactly identifies whether the given data is duplicates or not. Real world du...

Download PDF file
  • EP ID EP120747
  • DOI -
  • Views 116
  • Downloads 0

How To Cite

Varagani Paparao, M. N. Satish Kumar (2013). Secured Packet Hiding Technique for Packet Jamming Attacks. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 6(1), 58-63. https://europub.co.uk/articles/-A-120747