International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

Selective Jamming Attacks Prevented By Packet-Hiding Methods

Sontam Sunil Kumar Reddy, K. Raghavendra Rao

The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intended interference with wireless transmissions can be used as a launchpad for increasing Denial-of-Service attacks on wireless networks. in general, jamming has been addressed under an external threat model. Though, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In this, we address the problem of selective jamming attacks in wireless networks and in these attacks, the adversary is active only for a less period of time, selectively targeting messages which are highly importance. We illustrate the advantages of selective jamming in terms of network performance degradation and adversary effort by presenting two case studies; a selective attack on TCP and one on routing. In this we show that selective jamming attacks can be launched by performing real-time packet classification at the physical layer. To moderate these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. Analyzing the security of our methods and evaluate their computational and communication overhead.

Keywords: Selective Jamming, Denial-of-Service, Wireless Networks, Packet Classification

Edition: Volume 3 Issue 9, September 2014

Pages: 18 - 25


How to Cite this Article?

Sontam Sunil Kumar Reddy, K. Raghavendra Rao, "Selective Jamming Attacks Prevented By Packet-Hiding Methods", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP1444, Volume 3 Issue 9, September 2014, 18 - 25

37 PDF Views | 28 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Selective Jamming'

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018

Pages: 1590 - 1594

A Detail Review of Jamming Attack Mitigation Techniques in Mobile Wireless Networks

Kalpana, Raj Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1468 - 1471

Organizing User Search Histories on User Precedence Based Search with Security

Pappula Praveen, S. Kalyani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 18 - 25

Selective Jamming Attacks Prevented By Packet-Hiding Methods

Sontam Sunil Kumar Reddy, K. Raghavendra Rao

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 6, June 2013

Pages: 324 - 328

Avoiding selective jam attack by packet hiding method in wireless sensor network

Dilip kumar D.P, H. Venugopal

Share this article



Similar Articles with Keyword 'Denial-of-Service'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1317 - 1328

An Efficient Approach of Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems

Shaik Shanawaz, K. Thyagarajan

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2071 - 2074

Survey on DDoS Attack in Cloud Network

Monalisa Shinde, Shripadrao Biradar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018

Pages: 1590 - 1594

A Detail Review of Jamming Attack Mitigation Techniques in Mobile Wireless Networks

Kalpana, Raj Kumar

Share this article

Research Paper, Computer Science & Engineering, United Kingdom, Volume 3 Issue 7, July 2014

Pages: 2387 - 2389

Cryptanalysis of Identity Transmission Authentication System

Sattar J. Aboud

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 511 - 516

Graph-based Attack Detection in Cloud using KDD CUP 99 Dataset

Swapnali G. Game, S. B. Natikar

Share this article



Similar Articles with Keyword 'Wireless Networks'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2591 - 2595

DASU: High Quality Video Streaming Over Multiple Wireless Access Network Using Real Time Adaptive Algorithm

Prathibha T P

Share this article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANET's Routing Protocols

Sunita, Sunil Makkar

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1828 - 1830

Distributed Cooperative Caching in Social Wireless Networks

P. Suman Prakash, M. Naga Prasad

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 1743 - 1745

A Survey Paper on Wireless Transport Layer Security

Parmar Paresh B., Ketan Patel

Share this article



Similar Articles with Keyword 'Packet Classification'

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018

Pages: 1590 - 1594

A Detail Review of Jamming Attack Mitigation Techniques in Mobile Wireless Networks

Kalpana, Raj Kumar

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1113 - 1115

Survey of SDN based Packet Classification Techniques

Nilofar Landage, Dr. Tanuja Dhope

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1468 - 1471

Organizing User Search Histories on User Precedence Based Search with Security

Pappula Praveen, S. Kalyani

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 18 - 25

Selective Jamming Attacks Prevented By Packet-Hiding Methods

Sontam Sunil Kumar Reddy, K. Raghavendra Rao

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 1, January 2016

Pages: 1060 - 1063

A Survey Paper of Novel Approach towards Multidimensional Packet Classification

Priti Rathi, Prof. Ganesh Bandal

Share this article
Top