International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 7, July 2013

Avoiding Selective Attacks with using Packet Hiding Approaches in Wireless Network

Patel Dhaval Dhirubhai, Singh Kashkumar Nirmalsingh

We address the problem of selective attacks in wireless networks. In these attacks, the opponent selectively targets specific packets of high importance by exploiting his knowledge on the implementation details of network protocols at various layers of the protocol stack. We illustrate illustrating various selective attacks against the TCP protocol. We show that selective attacks can be launched by performing real-time packet classification at the physical layer. To mitigate these attacks, we develop three schemes that Avoid real-time packet classification by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication overhead.

Keywords: Wireless Network, Packet Classification, Selective Attacks, Time-Lock Puzzle, Cryptography

Edition: Volume 2 Issue 7, July 2013

Pages: 146 - 151


How to Cite this Article?

Patel Dhaval Dhirubhai, Singh Kashkumar Nirmalsingh, "Avoiding Selective Attacks with using Packet Hiding Approaches in Wireless Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013129, Volume 2 Issue 7, July 2013, 146 - 151

29 PDF Views | 24 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Wireless Network'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2409 - 2411

Routing in MANET and the Various Threats: A Survey

Anita, Er. Abhilasha

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1803 - 1808

Performance Comparison of DSDV, OLSR, DSR and AODV MANET Routing Protocols in Traffic Conditions

Katroth Balakrishna Maruthiram, Kare Suresh Babu

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1220 - 1223

EAACK-An Innovative Intrusion Detection System for MANET using Digital Signature

Prof. G. M.Bhandari, Swati Pawar, Varsha Zaware, Ujjawala Bankar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1833 - 1838

Study of Secure Fault Tolerant Routing Protocol for IoT

Chaithra.S, Gowrishankar S

Share this article

Similar Articles with Keyword 'Packet Classification'

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018

Pages: 1590 - 1594

A Detail Review of Jamming Attack Mitigation Techniques in Mobile Wireless Networks

Kalpana, Raj Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1468 - 1471

Organizing User Search Histories on User Precedence Based Search with Security

Pappula Praveen, S. Kalyani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 18 - 25

Selective Jamming Attacks Prevented By Packet-Hiding Methods

Sontam Sunil Kumar Reddy, K. Raghavendra Rao

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1060 - 1063

A Survey Paper of Novel Approach towards Multidimensional Packet Classification

Priti Rathi, Prof. Ganesh Bandal

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1113 - 1115

Survey of SDN based Packet Classification Techniques

Nilofar Landage, Dr. Tanuja Dhope

Share this article

Similar Articles with Keyword 'Cryptography'

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 3099 - 3106

Separable Reversible Data Hiding In Encrypted Image Using Modified Least Significant Bit and Virtual Embedding

Shreya M. S., Sandeep Kumar S

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2382 - 2385

Data Sharing through Multimedia Steganocryptic and Visual Cryptography System

Gajangi Rahul Kumar, U.Shivaji

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 1934 - 1936

Trapping Unauthorized Signals in Jammer

Meena Kudande, D. C. Mehetre

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1200 - 1203

Efficient Hardware Encryption Using Lightweight Process

Deeksha Bhardwaj, Rohit Pawar, Aman Jain

Share this article

Top