Secured Packet Hiding Technique for Packet Jamming Attacks
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 1
Abstract
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. Jamming attacks can severely interfere with the normal operation of Networks and, consequently, mechanisms are needed that can cope with jamming attacks. The Denial of Service attacks (DoS), the most widespread attack to the Network requires great concern and resilient mechanisms. Typically, jamming has been addressed under an external threat model. However, adversaries with internal understanding of protocol specifications and network secrets can launch low-effort jamming attacks which get problematic to detect and counter. Existing work proposed selective jamming attacks in wireless networks has some limitations. First limitation is Performance delay in a selective attack on TCP and maybe on routing. During these attacks, the adversary is active just for a brief period of valuable time, selectively targeting messages of high importance. Second limitation includes problem in real time packet classification. Proposed model evaluates robust selective jamming attacks detection mechanism while performing real-time packet classification at the physical layer. To mitigate these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication overhead.
Authors and Affiliations
Varagani Paparao , M. N. Satish Kumar
Adaptive Mobile Video Streaming and Efficient Social Video Sharing in Cloud
The mobile phones grow to be an essential part of our everyday life, with smart phone sales at present greater than before very much and also user demands to run lots of applications have enhanced. The victory of next in...
[i][/i]
Recognition of Consonants in Isolated Punjabi Words using DWT
Speech is the medium through which human beings can communicate with each other efficiently. Speech synthesis and recognition are two phases of speech. In this paper, focus is given on speech recognition. Speech recognit...
Password-Only Authenticated Key Exchange Using Distributed Server
Authentication using Password-authenticated key exchange using distributed server (PAKEUDE) is done where a cryptographic key - exchange of messages. Database of all passwords to authenticate clients are stored in a dist...
Facial Image Noise Removal Via a Trained Dictionary
In this project we address that, sparsity has shown to be useful in source separation. In most cases, the sources are not sparse currently and needs to sparsify them using a known dictionary. The problem here is that, if...