International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Open Access | Fully Refereed | Peer Reviewed

ISSN: 2319-7064


Downloads: 116

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014


Selective Jamming Attacks Prevented By Packet-Hiding Methods

Sontam Sunil Kumar Reddy, K. Raghavendra Rao


Abstract: The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intended interference with wireless transmissions can be used as a launchpad for increasing Denial-of-Service attacks on wireless networks. in general, jamming has been addressed under an external threat model. Though, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In this, we address the problem of selective jamming attacks in wireless networks and in these attacks, the adversary is active only for a less period of time, selectively targeting messages which are highly importance. We illustrate the advantages of selective jamming in terms of network performance degradation and adversary effort by presenting two case studies; a selective attack on TCP and one on routing. In this we show that selective jamming attacks can be launched by performing real-time packet classification at the physical layer. To moderate these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. Analyzing the security of our methods and evaluate their computational and communication overhead.


Keywords: Selective Jamming, Denial-of-Service, Wireless Networks, Packet Classification


Edition: Volume 3 Issue 9, September 2014,


Pages: 18 - 25


How to Cite this Article?

Sontam Sunil Kumar Reddy, K. Raghavendra Rao, "Selective Jamming Attacks Prevented By Packet-Hiding Methods", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SEP1444, Volume 3 Issue 9, September 2014, 18 - 25

How to Share this Article?

Enter Your Email Address


Similar Articles with Keyword 'Selective Jamming'

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1468 - 1471

Organizing User Search Histories on User Precedence Based Search with Security

Pappula Praveen, S. Kalyani

Share this Article

Downloads: 113

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018

Pages: 1590 - 1594

A Detail Review of Jamming Attack Mitigation Techniques in Mobile Wireless Networks

Kalpana, Raj Kumar

Share this Article

Similar Articles with Keyword 'Wireless Networks'

Downloads: 155

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Similar Articles with Keyword 'Packet Classification'

Downloads: 109

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1468 - 1471

Organizing User Search Histories on User Precedence Based Search with Security

Pappula Praveen, S. Kalyani

Share this Article

Downloads: 113

Research Paper, Computer Science & Engineering, India, Volume 7 Issue 6, June 2018

Pages: 1590 - 1594

A Detail Review of Jamming Attack Mitigation Techniques in Mobile Wireless Networks

Kalpana, Raj Kumar

Share this Article

Similar Articles with Keyword 'Selective'

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 104

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2500 - 2506

Detection and Mitigation of Greyhole Attack in Wireless Sensors Network Using Trust Mechanism

Bansi S. Kantariya, Dr. Narendra M. Shekokar

Share this Article

Similar Articles with Keyword 'Jamming'

Downloads: 102

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2294 - 2298

Effective Approach for Localizing Jammers in Wireless Sensor Network

Ashwini S. Chimankar, V. S. Nandedkar

Share this Article

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2473 - 2476

A Survey in Wireless Networks to Enhance An Error Minimization Framework For Localizing Jammers

Sneha V.Tiwari, Trupti Dange

Share this Article
Top