SELECTIVE JAMMING ATTACKS PREVENTION SCHEMES IN WIRELESS NETWORKS USING COMBINED CRYPTOGRAPHIC PRIMITIVES
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 4
Abstract
The open nature of the wireless average greeneries it susceptible to intended interfering attacks, typically referred to as blocking. This intended interfering with wireless transmissions can be used as a Launch pad for rising Denial-ofService attacks on wireless networks. Typically, blocking has been addressed under an external threat model. However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort blocking attacks that are difficult to detect and counter. In this work, we address the problem of selective blocking attacks in wireless networks. In these attacks, the adversary is active only for a short period of time, selectively directing messages of high importance. We illustrate the advantages of selective blocking in terms of network performance reduction and adversary effort by presenting two case studies; a selective attack on TCP and one on routing. We show that selective blocking attacks can be launched by performing real-time packet classification at the physical layer. To lessen these attacks, we develop three schemes that prevent realtime packet classification by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and message overhead.
Authors and Affiliations
Lavanya K, Vamsee Mohan, Sushma K
Real Time Infants monitoring by developing an Embedded Device for incubator
An Incubator is an apparatus for maintaining an infant, especially one that is ill or born before the usual gestation period. Continuous monitoring of physiological parameters is very often necessary for the evaluatio...
An Efficient and Effective Ranking On Spatial Data By Quality Preferences
A spatial database is database that is optimized to gather and query the information that is linked to objects in space and a spatial preference query objects are based on the qualities of their spatial area. A huge...
Local Sharing of Multiple Torrents in Peer to Peer System
The rapid growth traffic of Peer-toPeer applications, especially BitTorrent, is putting a lot of pressure to Internet Service Providers. In this paper, we examine the existence of the locality through a large-scale hy...
A Wavelet Domain Approach Based On DT-CWT For Satellite Image Processing
A DT-CWT-based nonlocal-means-based RE (DT-CWTNLM-RE) strategy is proposed, utilizing the DT-CWT, Lanczos addition, and NLM. Note that DT-CWT is almost move invariant and directional specific. In addition, DTCWT safegu...
A Systematic Methodology and Guidelines for Software Project Manager to Identify Key Stakeholders
Involving as many as possible of those who may be affected by or have an effect on any software project will lead to a better understanding, better process, greater community support as well as a more effective system...