Search Paper
  • Home
  • Login
  • Categories
  • Post URL
  • Academic Resources
  • Contact Us

 

Selective Jamming Attack Prevention Based on Packet Hiding Methods and Wormholes

google+
Views: 91                 

Author :  Divya Ann Luke

Affiliation :  SCT College of Engineering

Country :  India

Category :  Software Engineering & Security

Volume, Issue, Month, Year :  6, 3, May, 2014

Abstract :


The wireless networks are more sensitive to the Denial-of-Service (DoS) attacks. The existing system is based on Spread Spectrum (SS). This technique mainly focuses on an external threat model. In wireless network the communications between nodes take place through broadcast communication. That is why, if an attacker present within the network can easily eavesdrop the message sent by any node. The main attack present in the wireless network is the selective jamming attack. This type of attack mainly focuses a single node termed as target node. Attacker always tries to block the message sent by the target node. This leads to the Denial-of-Service attack. We are proposing a new method to prevent the selective jamming attack in an internal threat model. A wormhole is used, which will generate an alarm to indicate the presence of jammer and sent IP address of jammer node to all other nodes in the network. Using a method called packet hiding, we can send message through the network even though a jammer is present. This method is based on the technique called Strong Hiding Commitment Scheme (SHCS). Here, the access point in a network region becomes the wormhole whenever it finds out any node that violates the rules in a particular network region. That node is then considered as a jammer node. The wormhole sends IP address of jammer to all other nodes. Wormhole then prevents the jamming activity of the jammer by encrypting the source ID of message along with the message packet.So that the jammer is unable to identify its target node and the source can forward its message safely through jammer node itself.

Keyword :  Selective jamming, Spread spectrum, Denial-of-Service attack, Wormholes, AES

URL :  https://airccse.org/journal/nsa/6314nsa08.pdf

User Name : Brendon Clarke
Posted 24-08-2022 on 14:16:14 AEDT



Related Research Work

  • Service Oriented Configuration Management Of ‎software ‎architecture
  • Service Oriented Configuration Management Of ‎software ‎architecture
  • Metrics For Evaluating Alerts In Intrusion Detection Systems
  • Hybrid Cryptographic Technique Using Rsa Algorithm And Scheduling Concepts

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals