Avoiding selective jam attack by packet hiding method in wireless sensor network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 6, June 2013

Avoiding selective jam attack by packet hiding method in wireless sensor network

Dilip kumar D.P, H. Venugopal

the open nature of the wireless medium leaves it vulnerable to drive or wedge packets forcibly into a tight position referred as squeeze. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks typically; squeeze has been addressed under an external threat model. However, person with depth knowledge of internet protocol specications and network secrets can launch low-effort squeeze attacks that are difficult to detect and counter. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. We illustrate the advantages of selective squeeze in terms of network performance degradation and adversary effort by presenting two case studies; a selective attack on TCP and one on routing. In this work, we address the problem of selective squeeze attacks in wireless networks. We show that selective squeeze attacks can be launched by performing real-time packet classication at the physical layer. To reduce these attacks, we develop three schemes that prevent real-time packet classication by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication overhead

Keywords: Selective Jamming, Denial-of-Service, Wireless Networks, Packet Classication

Edition: Volume 2 Issue 6, June 2013

Pages: 324 - 328

Share this Article

How to Cite this Article?

Dilip kumar D.P, H. Venugopal, "Avoiding selective jam attack by packet hiding method in wireless sensor network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON12013147, Volume 2 Issue 6, June 2013, 324 - 328

84 PDF Views | 72 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Selective Jamming'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1468 - 1471

Organizing User Search Histories on User Precedence Based Search with Security

Pappula Praveen, S. Kalyani

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 18 - 25

Selective Jamming Attacks Prevented By Packet-Hiding Methods

Sontam Sunil Kumar Reddy, K. Raghavendra Rao

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018

Pages: 1590 - 1594

A Detail Review of Jamming Attack Mitigation Techniques in Mobile Wireless Networks

Kalpana, Raj Kumar

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 324 - 328

Avoiding selective jam attack by packet hiding method in wireless sensor network

Dilip kumar D.P, H. Venugopal

Share this Article

Similar Articles with Keyword 'Denial-of-Service'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1317 - 1328

An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Shaik Shanawaz, K. Thyagarajan

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2071 - 2074

Survey on DDoS Attack in Cloud Network

Monalisa Shinde, Shripadrao Biradar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2196 - 2199

A Cumulative Study on Counter Measure Technique for DOS Attacks Using Software Puzzle

Jyoti B. Shende, S. V. Todkari

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 511 - 516

Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset

Swapnali G. Game, S. B. Natikar

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1485 - 1487

NICE A: Implementation with Active Intrusion Detection System

Rasika R. Pawar, Mrunalinee Patole

Share this Article

Similar Articles with Keyword 'Wireless Networks'

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANET's Routing Protocols

Sunita, Sunil Makkar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1057 - 1058

Survey on Novel Hybrid Techniques in EAACK for Prevention of Attacks in MANET'S

Pranita Prakash Kulkarni

Share this Article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 842 - 845

Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks

Srihari Babu Kolla, B. B. K. Prasad

Share this Article
Top