ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login


Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.3, No. 10)

Publication Date:

Authors : ; ;

Page : 25-28

Keywords : Denial-of-Service attack; AES; wireless networks elements; Selective jamming;

Source : Downloadexternal Find it from : Google Scholarexternal


The wireless networks always exposed to deliberate intrusion attacks referred to as jamming attacks. The wireless medium is more responsive to the Denial-of-Service (DoS) attacks. This is primarily focused on an exterior threat model. In wireless system the interactions between nodes get set through broadcast communication. therefore, whether an attacker is there inside the network can simply pry the message dispatched by whichever node. The major attack existing in the wireless system is the selective jamming attack. This kind of attack mostly naves a particular node termed as target node. Attacker at all times tries to prevent the message sent by the target node. This proceeds to the Denial-of-Service attack. We are presenting a novel technique to block the selective jamming attack in an interior threat model. Using packet hiding technique, we can transmit a message through the network however a jammer is there. This process is based on the technique named as Strong Hiding Commitment Scheme (SHCS).Whenever it detects any node that abuses the regulations in a meticulous network area. Afterward that node is considered as a jammer node. To conquer these attacks, we expand three proposals that avert the attacker from violating the packets. We are evolutions real time packet arrangement compounding cryptographic naives with imputed of physical layer also we evaluate computational and communique overhead in the security study.

Last modified: 2014-10-02 23:02:29