Loading...
Please wait, while we are loading the content...
Similar Documents
Packet-hiding Methods for Preventing Selective Jamming Attacks
| Content Provider | Semantic Scholar |
|---|---|
| Author | Aziz, Sayyed Dafedar, Ahmed Mujawar, Mohammed Muzamil |
| Copyright Year | 2014 |
| Abstract | In this paper we develop an cryptography where efficient data packet are transferred in an wireless medium. The vulnerability of an wireless medium for its intentional interface attacks for its behaviour as its an open nature leads to intentional interference attacks known as jamming. Making use of these intentional interference attacks we perform lauchpad for mounting the Denial-of-Service attacks on these open wireless networks. As jamming is an external threat model used commonly over an wireless mediums which effects adversely to the protocol specifications which lead to low-effort jamming attacks in an network secreat which is very difficult to mount the error and detect the failure of network. For these problems we address selective jamming attacks in wireless medium network. We create a sensor that has four components. First historic model where detecting known protocol sequence is developed for probabilistic modelSecond is probabilistic model where sizes of packets and inter-packet timing of different packet types are arranged. Third is victim network to produce known sequences for historic analyzer using active jamming mechanism. Lastly online classifier which makes packet type classification decisions For a short period of time and selective targeting messages of high importance are active in these attacks which effect adversely. We evolve an advantage of selective jamming with respect to network adversary efforts and performance degradation is done by case studies such as on routing and attacks on TCP. These selective jamming attacks can be launched by means of performance in real-time packet classification at physical layer of TCP. To overcome these attacks we develop three schemas which prevent real time packet classification by combining cryptographic primitives with physical layer attributesToovercome these attacks we develop three schemas that prevent real-time packet classification by using combined cryptographic primitives with its physical layer attributes. |
| Starting Page | 302 |
| Ending Page | 304 |
| Page Count | 3 |
| File Format | PDF HTM / HTML |
| DOI | 10.15623/ijret.2014.0315058 |
| Volume Number | 03 |
| Alternate Webpage(s) | http://esatjournals.net/ijret/2014v03/i15/IJRET20140315058.pdf |
| Alternate Webpage(s) | https://doi.org/10.15623/ijret.2014.0315058 |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |