Open Access Open Access  Restricted Access Subscription Access

Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques


Affiliations
1 Department of Computer Science, Erode Arts and Science College, Erode-638009, India
2 Department of Electronics, Erode Arts and Science College, Erode-638009, India
 

The open nature of the wireless medium leaves it liable to intentional interference attacks, generally said as jam. This intentional interference with wireless transmissions is used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jam has been self-addressed beneath associate external threat model. However, adversaries with internal information of protocol specifications and network secrets will launch loweffort jam attacks that are troublesome to notice and counter. during this work, we have a tendency to address the matter of jamming attacks in wireless networks. In these attacks, the resister is active just for a brief amount of your time, by selection targeting messages of high importance. In our work two offender nodes (node that creates jamming) and introduce one new node i.e sender node. The new node(jammer node) is at intervals the twenty five nodes. Victimization that new sender node we have to eliminate the offender nodes absolutely. We have a tendency to conclude that however jam happens within the network and approach of elimination of the offender nodes victimization new sender node. We propose mistrial approach for avoid flooding packets in jammer network. We conclude the performance between the mistrial and damping approach for avoid jamming packets We have a tendency to illustrate the benefits of {selective jam|spot-jamming|jamming|electronic jamming|jam} in terms of network performance degradation and resister effort by to beat the sender in network with the assistance of recent jamming node. We illustrate the benefits of jam|spot-jamming|jamming|electronic-jamming|jam} in terms of network performance degradation and human effort by to beat the sender in network with the assistance of recent jamming node.

Keywords

Denial-of-Service, Spot Jamming, Electronic Jamming, Wireless Networks, Packet Classification.
User
Notifications
Font Size

Abstract Views: 180

PDF Views: 5




  • Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques

Abstract Views: 180  |  PDF Views: 5

Authors

P. Srimanchari
Department of Computer Science, Erode Arts and Science College, Erode-638009, India
V. Perumal
Department of Computer Science, Erode Arts and Science College, Erode-638009, India
M. Saroja
Department of Electronics, Erode Arts and Science College, Erode-638009, India
M. Venkatachalam
Department of Electronics, Erode Arts and Science College, Erode-638009, India

Abstract


The open nature of the wireless medium leaves it liable to intentional interference attacks, generally said as jam. This intentional interference with wireless transmissions is used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jam has been self-addressed beneath associate external threat model. However, adversaries with internal information of protocol specifications and network secrets will launch loweffort jam attacks that are troublesome to notice and counter. during this work, we have a tendency to address the matter of jamming attacks in wireless networks. In these attacks, the resister is active just for a brief amount of your time, by selection targeting messages of high importance. In our work two offender nodes (node that creates jamming) and introduce one new node i.e sender node. The new node(jammer node) is at intervals the twenty five nodes. Victimization that new sender node we have to eliminate the offender nodes absolutely. We have a tendency to conclude that however jam happens within the network and approach of elimination of the offender nodes victimization new sender node. We propose mistrial approach for avoid flooding packets in jammer network. We conclude the performance between the mistrial and damping approach for avoid jamming packets We have a tendency to illustrate the benefits of {selective jam|spot-jamming|jamming|electronic jamming|jam} in terms of network performance degradation and resister effort by to beat the sender in network with the assistance of recent jamming node. We illustrate the benefits of jam|spot-jamming|jamming|electronic-jamming|jam} in terms of network performance degradation and human effort by to beat the sender in network with the assistance of recent jamming node.

Keywords


Denial-of-Service, Spot Jamming, Electronic Jamming, Wireless Networks, Packet Classification.