Packet-Hiding Methods for Preventing Selective Jamming Attacks
#1

Abstract—The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launchpad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In this work, we address the problem of selective jamming attacks in wireless networks. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. We illustrate the advantages of selective jamming in terms of network performance degradation and adversary effort by presenting two case studies; a selective attack on TCP and one on routing. We show that selective jamming attacks can be launched by performing real-time packet classification at the physical layer. To mitigate these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication overhead.


projects9.com
Contact us : projects[at]projects9.com
Call us :8008855666
Reply
#2
Hi, this s shiva from dpi........... please explanation given at packet hiding methods and jamming attacks
Reply
#3

to get information about the topic"Packet-Hiding Methods for Preventing Selective Jamming Attacks" related topic refer the page link bellow


http://studentbank.in/report-packet-hidi...ng-attacks
Reply
#4
please display the entire documentation of packet hiding methods for preventing selective jamming attacks.
Reply
#5

to get information about the topic "Packet-Hiding Methods for Preventing Selective Jamming Attacks" related topic refer the page link bellow

http://studentbank.in/report-packet-hidi...ng-attacks
Reply
#6
(22-01-2013, 01:00 PM)Guest Wrote: please display the entire documentation of packet hiding methods for preventing selective jamming attacks.

Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: packet hiding method preventive selective jamming attacks, mobile phone jamming, what are disadvantages of jamming attacks, packet hiding methods for preventing selective jamming attacks project usecase diagrams, packet hiding mthods for preventing jamming attacks report, packet hiding methods for preventing selective jamming attacks project literature survey, packet hiding methods for preventing selective jamming attacks project explanation,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Packet-Hiding Methods for Preventing Selective Jamming Attacks 1 665 14-02-2017, 11:35 AM
Last Post: ijasti
  Secured Data Hiding and Extractions Using BPCS project report helper 4 3,653 04-02-2016, 12:52 PM
Last Post: seminar report asees
  Data Hiding in Binary Images for Authentication & Annotation project topics 2 1,821 06-11-2015, 02:27 PM
Last Post: seminar report asees
  Revisiting Defenses against Large-Scale Online Password Guessing Attacks Projects9 5 3,906 18-03-2013, 12:25 PM
Last Post: computer topic
  A Geometric Approach to Improving Active Packet Loss Measurement full report project topics 2 2,622 09-04-2012, 06:01 PM
Last Post: [email protected]
  Mitigating Selective Forwarding Attacks With A Channel-Aware Approach In Wmns project topics 3 2,013 02-03-2012, 11:05 AM
Last Post: seminar paper
  A New TCP For Persistent Packet Reordering mechanical engineering crazy 2 2,425 01-03-2012, 02:54 PM
Last Post: seminar paper
  COMBINATORIAL APPROACH FOR PREVENTING SQL INJECTION ATTACKS electronics seminars 7 7,312 23-02-2012, 05:05 PM
Last Post: seminar paper
  CONSTRUCTING INTER-DOMAIN PACKET FILTERS TO CONTROL IP SPOOFING BASED ON BGP UPDATES- electronics seminars 2 4,303 20-02-2012, 01:04 PM
Last Post: seminar paper
  Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source electronics seminars 12 7,401 15-02-2012, 10:48 AM
Last Post: coimbatore

Forum Jump: