Research Paper | Computer Science & Engineering | India | Volume 2 Issue 7, July 2013
Avoiding Selective Attacks with using Packet Hiding Approaches in Wireless Network
Patel Dhaval Dhirubhai, Singh Kashkumar Nirmalsingh
We address the problem of selective attacks in wireless networks. In these attacks, the opponent selectively targets specific packets of high importance by exploiting his knowledge on the implementation details of network protocols at various layers of the protocol stack. We illustrate illustrating various selective attacks against the TCP protocol. We show that selective attacks can be launched by performing real-time packet classification at the physical layer. To mitigate these attacks, we develop three schemes that Avoid real-time packet classification by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication overhead.
Keywords: Wireless Network, Packet Classification, Selective Attacks, Time-Lock Puzzle, Cryptography
Edition: Volume 2 Issue 7, July 2013
Pages: 146 - 151
How to Cite this Article?
Patel Dhaval Dhirubhai, Singh Kashkumar Nirmalsingh, "Avoiding Selective Attacks with using Packet Hiding Approaches in Wireless Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013129, Volume 2 Issue 7, July 2013, 146 - 151
138 PDF Views | 122 PDF Downloads
Similar Articles with Keyword 'Wireless Network'
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
| Weekly Popularity: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021
Pages: 1663 - 1668PAPR Reduction in OFDM System using Clipping and Filtering based new Hybrid VLM Pre-Coded SLM
Muneeb Manzoor Bhat, Preeti Sondhi
| Weekly Popularity: ⮙3
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
| Weekly Popularity: ⮙7
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 2450 - 2452A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols
Sunita, Sunil Makkar
| Weekly Popularity: ⮙5
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Similar Articles with Keyword 'Packet Classification'
| Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1468 - 1471Organizing User Search Histories on User Precedence Based Search with Security
Pappula Praveen, S. Kalyani
| Weekly Popularity: ⮙4
Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018
Pages: 1590 - 1594A Detail Review of Jamming Attack Mitigation Techniques in Mobile Wireless Networks
Kalpana, Raj Kumar
| Weekly Popularity: ⮙3
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1113 - 1115Survey of SDN based Packet Classification Techniques
Nilofar Landage, Dr. Tanuja Dhope
| Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 18 - 25Selective Jamming Attacks Prevented By Packet-Hiding Methods
Sontam Sunil Kumar Reddy, K. Raghavendra Rao
| Weekly Popularity: ⮙5
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016
Pages: 1060 - 1063A Survey Paper of Novel Approach towards Multidimensional Packet Classification
Priti Rathi, Prof. Ganesh Bandal
Similar Articles with Keyword 'Cryptography'
| Weekly Popularity: ⮙5
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1057 - 1058Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANETS
Pranita Prakash Kulkarni
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1069 - 1073Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN
Rucha Agrawal, Simran Khiani
| Weekly Popularity: ⮙6
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1200 - 1203Efficient Hardware Encryption Using Lightweight Process
Deeksha Bhardwaj, Rohit Pawar, Aman Jain
| Weekly Popularity: ⮙3
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 2394 - 2397Multilayered Security Approach for Cloud Data Centers using Hash Functions
Jashanpreet Pal Kaur, Rajbhupinder Kaur
| Weekly Popularity: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1525 - 1529Blowfish Algorithm by Modify Randomness for S-Boxes using Fuzzy Value and Apply Encryption or Decryption on Image
Maulik P. Chaudhari, Neha Parmar