ISSN ONLINE(2320-9801) PRINT (2320-9798)
Packet Concealing From Discriminating Selective Jamming Attacks Using Prevention Methods
The wireless medium leaves it vulnerable to deliberate interference attacks which is called as jamming. This deliberate interference with wireless transmissions can be used a rise for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been address under an outdoor threat model. Though, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect the jamming attack and it is unable to count. The problem of selective jamming attacks in wireless networks is addressed. The selective jamming attack is defined as the attack in which the adversary is active only for a short duration period. This type of attack is selectively targeting the messages of high importance. The advantages of selective jamming in terms of network performance demotion and adversary effort is presented in two case study methods. First a selective attack is implemented on TCP. Second the selective jamming attacks implemented on routing. The selective jamming attacks can be explained by performing real-time packet classification at the physical layer. To reduce the selective jamming attack, the four types of schemes are incorporated that can be prevent real-time packet classification by combining the cryptographic primitives with physical-layer attributes. The four types of schemes are Digital Signature Based Transformation (DSBT), All-Or-Nothing Transformations (AONT), Cryptographic Puzzle Hiding Scheme (CPHS), Strong Hiding Commitment Scheme (SHCS).The security of methods is tested and this will evaluate the computational and communication overhead.
Mr. A.Rajesh Kumar, Mrs. R.Bharathi
To read the full article Download Full Article | Visit Full Article