Jamming Anticipation and Convolution through Immaculate Hiding Process of Packets
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 13, Issue 2
Abstract
Cached data not only replies local access, but also replies data request issued from other nodes. Wireless Mesh Networks (WMNs) have emerged as an important technology in building next generation fixed wireless broadband networks that provide low cost Internet access for fixed and mobile users. Reduce the number of hops that request/data need to travel in the network. In these attacks, the adversary selectively targets specific packets of “high” importance by exploiting his knowledge on the implementation details of network protocols at various layers of the protocol stack. We illustrate the impact of selective jamming on the network performance by illustrating various selective attacks against the TCP protocol. We show that such attacks can be launched by performing real-time packet classification at the physical layer. We study the idealized case of perfect knowledge by both the jammer and the network about the strategy of one another, and the case where the jammer or the networks lack this knowledge. The latter is captured by formulating and solving optimization problems, the solutions of which constitute best responses of the attacker or the network to the worst-case strategy of each other.
Authors and Affiliations
T Sandeep
Interfacing and Analysis of GPS data using VB
Abstract: Global Positioning System (GPS) provides location and time information anywhere on the earth. We can utilize GPS data to create new applications that can be very useful nowadays. If we want to build a new appli...
Study of Java Access Control Mechanism
a class as "a collection of data and methods." One of the important object-oriented techniques is hiding the data within the class and making it available only through the methods. This technique is known as &nbs...
Artificially Intelligent Investment Risk Calculation system based on Distributed Data Mining
Abstract:- In the present days of e-commerce and social engineering the use of artificial intelligent system and data mining is one of the most relevant issue. Several investment sector giants use highly developed data m...
An Efficient Approach for Prevention of Cooperative Black Hole Attack on DSR Protocol
In the mobile ad hoc networks, the major role is played by the routing protocols in order to route the data from one mobile node to another mobile node with security. But in such mobile networks, routing protocol...
Bridging Socially Enhanced Virtual Communities
As technologies required for collaborative computing grow, there are business collaborations among companies carrying out related business. The communication and interactions across the companies has become a com...