Enhanced Packet Delivery Techniques Using Crypto-Logic on Jamming Attacks for Wireless Communication Medium
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2013, Vol 3, Issue 4
Abstract
In this paper, we address the problem of jamming under an internal threat model. We discuss about Swift jamming attacks in wireless networks,presenting a challenger model for selective jamming attacks, which may give to the high importance for packet Delivery Techniques in which specific messages of “high importance” are targeted. Further, we illustrate the impact of selective jamming on the network performance by illustrating various selective attacks against the TCP protocol. We show that such attacks can be launched by performing real-time packet classification at the physical layer. We examined the combination of cryptographic primitives with physical layer attributes for preventing real-time packet classification and neutralizing the inside knowledge of the attacker. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. We develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. Here we propose the Packet delivery techniques on Jamming Attacks over a wireless medium. In this paper we use hiding mechanisms and cryptographic techniques based on the Riddles.
Authors and Affiliations
Ambarisha M alladi , M. Chandra Naik , Sayyed Nagul Meera
A Survey of Emerging ITU-TH.264 Video Encoding Standard
H.264/AVC is a recently completed video compression standard jointly developed by ITU-T and ISO MPEG standards committees. The standard is becoming more popular as it promises much higher compression than that possible w...
Implementation and Analysis of Modified Double Precision Interval Arithmetic Array Multiplication
This paper presents the design of a 64 bit array multiplier that performs interval multiplication. This multiplier requires carry save adders instead of full adders that reduces the delay i n r e s p e c t o f co...
Security Issues and Data Management In Cloud Computing
Cloud computing placed IT to higher and new limits by providing the market environment data storage and capacity with flexible and scalable and processing power to reach the demand and supply while reducing the capital e...
Redundancy Efficient Crosstalk Avoidance Scheme in VLSI Circuits
In deep sub micrometer design interconnect delay has become a major factor. Crosstalk is highly evident in deep sub micrometer design. Crosstalk depends on different data patterns that are transmitted on the bus. For the...
A Brief Survey on Encryption Schemes in Cloud Environments
For the last two years cloud computing is a important in the IT industry. In cloud computing data owners and service providers are not in the same trusted domain so the Service providers should not be a trusted one and t...