Selective Jamming Attacks Prevented By Packet-Hiding Methods
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 116 | Views: 526

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014 | Popularity: 6.6 / 10


     

Selective Jamming Attacks Prevented By Packet-Hiding Methods

Sontam Sunil Kumar Reddy, K. Raghavendra Rao


Abstract: The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intended interference with wireless transmissions can be used as a launchpad for increasing Denial-of-Service attacks on wireless networks. in general, jamming has been addressed under an external threat model. Though, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In this, we address the problem of selective jamming attacks in wireless networks and in these attacks, the adversary is active only for a less period of time, selectively targeting messages which are highly importance. We illustrate the advantages of selective jamming in terms of network performance degradation and adversary effort by presenting two case studies; a selective attack on TCP and one on routing. In this we show that selective jamming attacks can be launched by performing real-time packet classification at the physical layer. To moderate these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. Analyzing the security of our methods and evaluate their computational and communication overhead.


Keywords: Selective Jamming, Denial-of-Service, Wireless Networks, Packet Classification


Edition: Volume 3 Issue 9, September 2014


Pages: 18 - 25



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Sontam Sunil Kumar Reddy, K. Raghavendra Rao, "Selective Jamming Attacks Prevented By Packet-Hiding Methods", International Journal of Science and Research (IJSR), Volume 3 Issue 9, September 2014, pp. 18-25, https://www.ijsr.net/getabstract.php?paperid=SEP1444, DOI: https://www.doi.org/10.21275/SEP1444

Similar Articles

Downloads: 161 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023

Pages: 734 - 741

Enhanced Congestion Control in Wireless Networks: A Joint Random Early Detection and Drop Tail Mechanism

S. Mohanarangan, R. Kalaivani Sri, P. Nithya, M. Sowndharya, M. Hemamalini

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 9 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 2, February 2024

Pages: 736 - 741

Energy Efficient Routing Algorithm for Future Ad-hoc Wireless Networks

Dr. J. Seetaram, Dr. M. Nagaraju Naik

Share this Article

Downloads: 80

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article
Top