Network Packet Jamming Detection and Prevention Using Hiding Method

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - November Issue 2013 by IJCTT Journal
Volume-5 Issue-2                           
Year of Publication : 2013
Authors :M.VamsiKrishna , R.Sudhakishore

MLA

M.VamsiKrishna , R.Sudhakishore"Network Packet Jamming Detection and Prevention Using Hiding Method"International Journal of Computer Trends and Technology (IJCTT),V5(2):91-94 November Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract:- Jamming attacks are one of the very most urgent threats harming the dependability of wireless communication. Jamming attacks may be viewed as a certain case of Denial of service (DoS) attacks. Typically, jamming has actually been addressed under an external threat model. However, adversaries with internal understanding of protocol specifications and network secrets can launch low-effort jamming attacks that might be hard to detect and counter. In situations of internal threats, the attacker launches selective jamming attacks by which it targets packets of high importance. Wireless networks provide wide variety of services which is certainly never so effortless by any other medium, its means of working tends it to have several security breaches. In modern era of communication trillions of profitable vital information is found at internet but they are accessible through this open medium. Such vital information may be achieved through intentional interference or jamming. With the internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter.In this proposed work wireless packets are observed and analyzed using hidden approaches. Attacks are observed either system services or web service attacks are identified and then we provide a solution to stop these jamming type of attacks. Proposed model evaluates robust selective jamming attacks detection mechanism while performing real-time packet classification at the physical layer. To mitigate these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication overhead.

 

References -

[1].Packet-Hiding Methods for Preventing Selective Jamming Attacks Alejandro Proa˜no
[2].SHCS Technique Defined for Packet Hiding Methods in Wireless Networks Bharath J1, International Journal of Advanced Research in Computer Science and Software Engineering
[3] Providing Network Security by Preventing Selective Jamming Attack G. Sathish Kumar. Journal of Advanced Technology in Engineering, Vol. 1, No. 1, December 2012
[4] Enhanced Packet Dissembling Schemes for Selective Jamming Attacks Prevention in Wireless Networks Pushphas Chaturvedi, International Journal of Scientific and Research Publications, Volume 3, Issue 6.
[5] M.Wilhelm, I.Martinovic , J.Schmitt, and V.Lenders. Reactive Jamming in Wireless Networks: How realistic is the threat? In proceddings of Wisec, 2011.

Keywords :— Selective Jamming, Denial-of-Service, Wireless Networks, Packet Classification..