SELECTIVE JAMMING ATTACKS PREVENTION SCHEMES IN WIRELESS NETWORKS USING COMBINED CRYPTOGRAPHIC PRIMITIVES
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 4
Abstract
The open nature of the wireless average greeneries it susceptible to intended interfering attacks, typically referred to as blocking. This intended interfering with wireless transmissions can be used as a Launch pad for rising Denial-ofService attacks on wireless networks. Typically, blocking has been addressed under an external threat model. However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort blocking attacks that are difficult to detect and counter. In this work, we address the problem of selective blocking attacks in wireless networks. In these attacks, the adversary is active only for a short period of time, selectively directing messages of high importance. We illustrate the advantages of selective blocking in terms of network performance reduction and adversary effort by presenting two case studies; a selective attack on TCP and one on routing. We show that selective blocking attacks can be launched by performing real-time packet classification at the physical layer. To lessen these attacks, we develop three schemes that prevent realtime packet classification by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and message overhead.
Authors and Affiliations
Lavanya K, Vamsee Mohan, Sushma K
Wavelet Quality Assessment For Mapping Images
To improve the quality of the images which are adaptively fused by various techniques and now representing wavelet fusion scheme to increase the naturalness of the image by using the parameters like SSIM or structura...
Medium Voltage High-Power Converter Topology for the Large Permanent Magnet Wind Generator Systems
This paper proposes a modular, medium voltage, highpower converter topology for the large permanent magnet wind generator system, eliminating the grid-side step-up transformer, which is desirable for both onshore and o...
Review on Novel Approach to Filter Unwanted Messages in On-line Social Networks
Nowadays, online social networking websites are used frequently. These websites are known as social sites. Social networking sites works like an online internet users community. Depending on the websites many of these...
Relative Reference Measure for Hierarchical Document Clustering
Clustering is a foremost concept in data mining. Clustering usually require a measure that needs to be computed among the clustering objects this measure could be either a similarity or a dissimilarity measure, here...
Seclusiveness Jamming Attacks Using Packet Hiding Method
We explains the problem of selective jamming attacks in wireless networks. The adversary is active only for a short period of time in this particular attack, it selectively targets the messages of high priority with...