A Critical Study on Wireless Network Attacks for Preventing Channel Congestion
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - July Issue 2013 by IJCTT Journal|
|Volume-4 Issue-7 |
|Year of Publication : 2013|
|Authors :N.Lakshmi Haritha, M.Ashok|
N.Lakshmi Haritha, M.Ashok"A Critical Study on Wireless Network Attacks for Preventing Channel Congestion"International Journal of Computer Trends and Technology (IJCTT),V4(7):2154-2158 July Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract: - The Wireless communication has been favoured by many promising applications that require packet delivery from one or more senders to multiple receivers. Notifications are sensitive to various types of attacks because the channels are unsecured in wireless. The wireless communication has a number of difficult issues. In this article we present the types of attacks and countermeasures and address the problem of channel congestion of interference in wireless networks. In these attacks, the opponent is active only for a short period of time, selectively posts of great importance. We illustrate the advantages of channel blockade in terms of degradation of network performance. Wireless networks are used in many commercial and military applications to bring data based on real-time events. Research in network security has produced several security solutions. And `it is observed that the rate of delivery of packets decreases as the number of nodes increases.
 I.F. Akyildiz, X. Wang, and W. Wang. Wireless mesh networks: a survey. Computer Networks, 47(4):445–487, 2005.
 EEE P802.11s/D1.01 standard. At https: //mentor.ieee.org/802.11/dcn/07/11-07-0335-00-000s -tgs-redline-between-draft-d1-00-and-d1-01.pdf, 2007.
 Alejandro Proano and Loukas Lazos. Selective jamming attacks in wireless networks. In Proceedings of the IEEE International Conference on Communications (ICC), 2010.
 T.X. Brown, J.E. James, and A. Sethi. Jamming and sensing of encrypted wireless ad hoc networks. In Proceedings of the 7th ACM International Symposium on Mobile ad hoc networking and computing, 2006.
 J. So and N.H. Vaidya. Multi-channel MAC for ad hoc networks: handling multi-channel hidden terminals using a single transceiver. In Proceedings of the ACM MobiHoc Conference, pages 222–233, 2004.
 P. Tague, M. Li, and R. Poovendran. Probabilistic mitigation of control channel jamming via random key distribution. In Proceedings of the International Symposium in Personal, Indoor and Mobile Radio Communications (PIMRC), pages 1–5, 2007.
 L. Lazos, S. Liu, and M. Krunz. Mitigating control-channel jamming attacks in multi-channel ad hoc networks. In Proceedings of the Second ACM Conference on Wireless Network Security (WiSec), pages 169–180, 2009.
 Jerry Chiang and Yih-Chun Hu. Cross-layer jamming detection and mitigation in wireless broadcast networks. In Proceedings of the ACM MobiCom Conference, pages 346–349, 2007.
 Christina Popper, Mario Strasser, and Srdjan Capkun. Jamming- ´ resistant broadcast communication without shared keys. In Proceedings of the USENIX Security Symposium, 2009.
 K. Liu, J. Deng, P.K. Varshney, and K. Balakrishnan. An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5):536–550, 2007.
Keywords : — —wirelesscommunication; Reciever;Attacks,congestion.