Enhanced Packet Delivery Techniques Using Crypto-Logic on Jamming Attacks for Wireless Communication Medium
|
International Journal of Computer & Organization Trends (IJCOT) | |
© 2013 by IJCOT Journal | ||
Volume-3 Issue-2 |
||
Year of Publication : 2013 | ||
Authors : Ambarisha Malladi , M. Chandra Naik, Sayyed Nagul Meera |
Citation
Ambarisha Malladi , M. Chandra Naik, Sayyed Nagul Meera " Enhanced Packet Delivery Techniques Using Crypto-Logic on Jamming Attacks for Wireless Communication Medium . "International Journal of Computer & organization Trends (IJCOT), V3(2):32-39 Mar - Apr 2013, ISSN:2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.
Abstract
In this paper, we address the problem of jamming under an internal threat model. We discuss about Swift jamming attacks in wireless networks, presenting a challenger model for selective jamming attacks, which may give to the high importance for packet Delivery Techniques in which specific messages of “high importance” are targeted. Further, we illustrate the impact of selective jamming on the network performance by illustrating various selective attacks against the TCP protocol. We show that such attacks can be launched by performing real-time packet classification at the physical layer. We examined the combination of cryptographic primitives with physical layer attributes for preventing real-time packet classification and neutralizing the inside knowledge of the attacker. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. We develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. Here we propose the Packet delivery techniques on Jamming Attacks over a wire less medium. In this paper we use hiding mechanisms and cryptographic techniques based on the Riddles.
References
[1].Alejandro Proa˜no and Loukas Lazos- Packet-Hiding Methods for Preventing Selective Jamming Attacks.
[2]. G. Noubir and G. Lin. Low-power DoS attacks in data wireless LANs and bad guys. In DIMACS Workshop on Mobile and Wireless Security, 2004.
[3]. www.techterms.com/definition/wireless
[4]. http://www.geocaching.com/seek/cache_details.aspx?guid=395a56a3-61b4-4c29-b413-69374d4c2565
[5]. Y.Wang, G. Attebury, and B. Ramamurthy. A survey of security issues in wireless sensor networks. IEEE Communications Surveys and Tutorials, 8(2):2–23, 2006.
[6]. J. Douceur. The sybil attack. In 1st International Workshop on Peer-to-Peer Systems - IPTPS,2002.
[7]. Andrew S. Tanembaum. Redes de computadores. Elsevier, Rio de Janeiro, 4ž edition edition,2003.
[8]. www.spamlaws.com/jamming-attacks.html
[9]. www.cambridge.org/us/catalogue/
[10]. Gustavo S. Quirino, Admilson R. L. Ribeiro and Edward David Moreno- Asymmetric Encryption in WirelessSensor Networks
Keywords
Jamming Attacks, Wireless Networks Elements, Crypto–logic Riddles, Enhanced Packet Delivery Techniques, wi-fi, Blue Tooth.