ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques

Journal: International Journal of Advanced Networking and Applications (Vol.6, No. 01)

Publication Date:

Authors : ; ; ; ; ;

Page : 2168-2175

Keywords : Denial-of-Service; Spot Jamming; Electronic Jamming; Wireless networks; Packet classification;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The open nature of the wireless medium leaves it liable to intentional interference attacks, generally said as jam. This intentional interference with wireless transmissions is used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jam has been self-addressed beneath associate external threat model. However,adversaries with internal information of protocol specifications and network secrets will launch low effort jam attacks that are troublesome to notice and counter. during this work, we have a tendency to address the matter of jamming attacks in wireless networks. In these attacks, the resister is active just for a brief amount of your time, by selection targeting messages of high importance. In our work two offender nodes (node that creates jamming) and introduce one new node i.e sender node. The new node(jammer node) is at intervals the twenty five nodes. Victimization that new sender node we have to eliminate the offender nodes absolutely. We have a tendency to conclude that however jam happens within the network and approach of elimination of the offender nodes victimization new sender node. We propose mistrial approach for avoid flooding packets in jammer network. We conclude the performance between the mistrial and damping approach for avoid jamming packets We have a tendency to illustrate the benefits of {selective jam|spot jamming |jamming| electronic jamming|jam} in terms of network performance degradation and resister effort by to beat the sender in network with the assistance of recent jamming node. We illustrate the benefits of jam|spot jamming |jamming| electronic-jamming | jam} in terms of network performance degradation and human effort by to beat the sender in network with the assistance of recent jamming node.

Last modified: 2015-12-01 19:12:15