SELECTIVE JAMMING ATTACKS PREVENTION SCHEMES IN WIRELESS NETWORKS USING COMBINED CRYPTOGRAPHIC PRIMITIVES
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2013, Vol 2, Issue 4
Abstract
The open nature of the wireless average greeneries it susceptible to intended interfering attacks, typically referred to as blocking. This intended interfering with wireless transmissions can be used as a Launch pad for rising Denial-ofService attacks on wireless networks. Typically, blocking has been addressed under an external threat model. However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort blocking attacks that are difficult to detect and counter. In this work, we address the problem of selective blocking attacks in wireless networks. In these attacks, the adversary is active only for a short period of time, selectively directing messages of high importance. We illustrate the advantages of selective blocking in terms of network performance reduction and adversary effort by presenting two case studies; a selective attack on TCP and one on routing. We show that selective blocking attacks can be launched by performing real-time packet classification at the physical layer. To lessen these attacks, we develop three schemes that prevent realtime packet classification by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and message overhead.
Authors and Affiliations
Lavanya K, Vamsee Mohan, Sushma K
A Survey on Password Attack Resist Tools
Passwords are the key to all digital secrets. Passwords remain the most widely used authentication method despite their well-known security weaknesses. Text password is the most popular form of user authentication on...
New architecture and efficient inter device communication for content transferring in human networks
We present B-SUB, an interest-driven information sharing system for HUNETs, which stands for the bloom-filter-based publish/SUBscribe. B-SUB is calculated for small to medium sized networks selfpossessed of dozens of...
Inter Transactional Association Rule Mining using Boolean Matrix
One of the extensions of the data mining is Temporal data mining, which mines or discovers knowledge and patterns from temporal information which includes time attribute analysis. From the various types of temporal...
Effect Self Loop Avoidance Weighted NDFA Method Using Fuzzy Cache Counter Classifier Algorithm for Efficient and Fastest Reachable Path in Travelling Networks
Now a days in computer path networks or travelling networks, the routing of vehicles or moving objects is mainly based on the best path. This will help in minimize the costs of paths in a place, city or any specified...
Adaptive Contention & Slot Reservation Based MAC protocol
The IEEE 802.16 standard is the basic protocol for data communication in the upstream channel in wireless sensor network. Also the reservation based medium access control MAC protocol is adopted by the IEEE 802.16 st...