Secured Packet Hiding Technique for Packet Jamming Attacks

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - December Issue 2013 by IJCTT Journal
Volume-6 Issue-1                           
Year of Publication : 2013
Authors :Varagani Paparao , M.N.Satish Kumar

MLA

Varagani Paparao , M.N.Satish Kumar"Secured Packet Hiding Technique for Packet Jamming Attacks"International Journal of Computer Trends and Technology (IJCTT),V6(1):58-63 December Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract:- -Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. Jamming attacks can severely interfere with the normal operation of Networks and, consequently, mechanisms are needed that can cope with jamming attacks. The Denial of Service attacks (DoS), the most widespread attack to the Network requires great concern and resilient mechanisms. Typically, jamming has been addressed under an external threat model. However, adversaries with internal understanding of protocol specifications and network secrets can launch low-effort jamming attacks which get problematic to detect and counter. Existing work proposed selective jamming attacks in wireless networks has some limitations. First limitation is Performance delay in a selective attack on TCP and maybe on routing. During these attacks, the adversary is active just for a brief period of valuable time, selectively targeting messages of high importance. Second limitation includes problem in real time packet classification. Proposed model evaluates robust selective jamming attacks detection mechanism while performing real-time packet classification at the physical layer. To mitigate these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication overhead.

References:-

[1] Saurabh S,SaiRam,A.S Linear and Remainder Packet Marking for fast IP Traceback COSMNET, fourth international journal 2012.
[2] NingLu;Yulong wang a novel approach for single packet ip traceback based on routing path parallel and distributed systems 20 international conference 2012.
[3] Mercy Shaline and Vijayalakshmi M IP traceback system for network and application layer attacks Recent trends in Information Technology,2012.
[4] Okada M, Katsuno Y 32-BIT as number based ip traceback (IMIS)2011 fifth International conference.
[5] Khan ,Z.S;Akram N; secure single packet ip traceback mechanism to identify the source (ICITST)2010
[6] Integrated DDoS Attack Defense Infrastructure for Effective Attack Prevention, Yang-Seo Choi, Jin-Tae Oh, Jong-Soo Jang

Keywords:-J A M M I N G, Message, PACKET.