Enhanced Packet Delivery Techniques Using Crypto-Logic on Jamming Attacks for Wireless Communication Medium
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2013, Vol 3, Issue 4
Abstract
In this paper, we address the problem of jamming under an internal threat model. We discuss about Swift jamming attacks in wireless networks,presenting a challenger model for selective jamming attacks, which may give to the high importance for packet Delivery Techniques in which specific messages of “high importance” are targeted. Further, we illustrate the impact of selective jamming on the network performance by illustrating various selective attacks against the TCP protocol. We show that such attacks can be launched by performing real-time packet classification at the physical layer. We examined the combination of cryptographic primitives with physical layer attributes for preventing real-time packet classification and neutralizing the inside knowledge of the attacker. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. We develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. Here we propose the Packet delivery techniques on Jamming Attacks over a wireless medium. In this paper we use hiding mechanisms and cryptographic techniques based on the Riddles.
Authors and Affiliations
Ambarisha M alladi , M. Chandra Naik , Sayyed Nagul Meera
Effect of Couple Stress Fluid on Peristaltic Motion in a Uniform and Non-Uniform Annulus
Peristalsis is now well known to physiologists to be one of the major mechanisms for fluid transport in many biological systems. In particular, a mechanism may be involved in swallowing food through the esophagus, in uri...
Power Efficient Weighted Modulo 2n+1 Adder
The comparison of three different architectures for modulo 2n+1 adders are introduced in this paper. The first two architecture can be implemented different power consumptions, while maintain the same delay. The partitio...
Role Of Clustering On Gene Data
This Data mining is the process of finding correlations or patterns among dozens of fields in large relational databases. Clustering algorithm used to find groups of objects such that the objects in a group will be simil...
ALL-EMBRACING REVIEW OF WIRELESS NETWORK PROTOCOL,OPTIMUM NETWORK SIMULATOR
Wireless connectivity is the new murmur utterance in computer networks. It involves connecting laptops, mobile libraries and even fridges to computer networks, without physical wire connections. Wireless connectivi...