Perceiving TheMalevolent Sachet Fatalities

Abstract

The open nature of the wireless medium leaves it vulnerable to intentional interferenceattacks, typically referred to as jamming. This intentional interference with wirelesstransmissions can be used as a launchpad for mounting Denial-of-Service attacks on wirelessnetworks. Typically, jamming has been addressed under an external threat model. However,adversaries with internal knowledge of protocol specifications and network secrets can launchlow-effort jamming attacks that are difficult to detect and counter. In this work, we address theproblem of selective jamming attacks in wireless networks.By source annulment Such unwanted information leakage often results in privacy breaches of the people in environment.Moreover, the wireless communication employed by sensor networks facilitates eavesdropping and packet injection by an adversary.The combination of these factors demands security for sensor networks at design time to ensure operation safety, secrecy of sensitive data, and privacy for people in sensor environments.Providing security in sensor networks is even more difficult than MANETs due to the resource limitations of sensor nodes.

Authors and Affiliations

Puvvula Krishna Kanth, Jhansi Rani S

Keywords

Related Articles

Design and Development of Gesture Controlled MP3 Player Using ARM7 and Image Processing Technique

The aim of the project we are controlling the MP3 Player by Gesture. A Gesture image is taken from Camera and image will be processing in MATLAB and using the human hand movement the image is recognized and depending...

AIDA : Minimizing Communication Overhead And Enhance Privacy of Shared Data

An algorithm for anonymous sharing of private data among parties is developed. Top-down refinement masks a given table to satisfy broad range of anonymity requirements without sacrificing significantly the usefulness...

A New Approach On Incremntal Affinity Propagation Clustering Technique Based On Preference

Many of the clustering algorithms were intended for discovering patterns in static data. Nowadays, more and more data e.g., blogs, Web pages, video surveillance, etc., are come into view in dynamic manner, known as d...

Secure Authentication Schemes

There are different authentication methods to provide security. The most commonly used are textual passwords, but are commonly susceptible to brute -force attacks. Recognition and Recall-based techniques on graphical...

EVS: A Cloud Services Information Security and Privacy Eligibility and Verification System

In recent years, cloud computing services have evolved as a new paradigm for delivering computing resources thatare dynamic and customizable, and providehigh performance. Many organizations are migrating their inform...

Download PDF file
  • EP ID EP28160
  • DOI -
  • Views 247
  • Downloads 1

How To Cite

Puvvula Krishna Kanth, Jhansi Rani S (2015). Perceiving TheMalevolent Sachet Fatalities. International Journal of Research in Computer and Communication Technology, 4(3), -. https://europub.co.uk./articles/-A-28160