Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification

Journal Title: Indian Journal of Computer Science and Engineering - Year 2013, Vol 4, Issue 3

Abstract

The major threat to wireless network is Denial of Service attack. An adversary can target on the communication of the nodes and can attempt to create an attack to prevent the efficient communication. Here, we address the problem of jamming under an internal threat model by considering a sophisticated adversary who is aware of the network secrets and the implementation details of network protocols at any layer in the network stack. The jammer can classify the transmitted packets in real time by decoding the first few symbols of an ongoing transmission. With this internal knowledge, the adversary targets specific message of high importance. Our aim is to delay the jamming node from classifying a packet in real time, thus mitigating the jamming node’s ability to perform selective jamming by preventing real time packet classification.

Authors and Affiliations

LEKSHMI. M. R , Prof. N. NITYANANDAM

Keywords

Related Articles

COST MINIMIZATION MODEL FOR AN ADAPTIVE INTRUSION RESPONSE SYSTEM

As attacks on computer systems are becoming increasingly numerous and sophisticated, there is a growing need for intrusion detection and response systems to dynamically adapt to better detect and respond to attacks. Annu...

REINFORCEMENT LEARNING IN COMPLEX REAL WORLD DOMAINS: A REVIEW

Reinforcement Learning is an area of Machine Learning inspired by behaviorist psychology based on the mechanism of learning from rewards. RL does not require prior knowledge and automatically get optimal policy with the...

Discovering Non-Redundant Association Rules using MinMax Approximation Rules

Frequent pattern mining is an important area of data mining used to generate the Association Rules. The extracted Frequent Patterns quality is a big concern, as it generates huge sets of rules and many of them are redund...

ANALYSING THE ACCEPTANCE CRITERIA AMONG THE CONCEPTS FOR GENERATING AUTOMATED ONTOLOGIES

The semantic search yields fruitful results while searching the concepts. Ontologies play a crucial role in searching the concepts in a semantic way. It is otherwise said that, wherever search is needed, ontology search...

CONTENT BASED LEAF IMAGE RETRIEVAL (CBLIR) USING SHAPE, COLOR AND TEXTURE FEATURES

This paper proposes an efficient computer-aided Plant Image Retrieval method based on plant leaf images using Shape, Color and Texture features intended mainly for medical industry, botanical gardening and cosmetic indus...

Download PDF file
  • EP ID EP109493
  • DOI -
  • Views 163
  • Downloads 0

How To Cite

LEKSHMI. M. R, Prof. N. NITYANANDAM (2013). Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification. Indian Journal of Computer Science and Engineering, 4(3), 244-249. https://europub.co.uk/articles/-A-109493