Packet-Hiding Methods for Preventing Selective Jamming Attacks
#2
Wireless local area networks (WLANs) are becoming an increasingly important technology that is approaching the world. WLANs are used in every area, such as education, agriculture, pharmaceuticals, manufacturing, transportation, military, and research. Therefore, the importance of WLAN security is significant. There are two popular WLAN styles: client-server networks and ad-hoc networks. The difference between these two networks is that client-server networks use access points or routers to transmit data, but ad-hoc networks do not depend on any pre-existing transmitter. Instead, all nodes in an adhoc network participate in the routing process by sending messages to each other. According to the Institute of Electronic and Electronic Engineers (IEEE) 802.11g standards (IEEE Org., 2012), all wireless network nodes transmit packets of data in different channels. Since the channels in the WLANs are defined by the frequencies, they are susceptible to malicious interference attacks. It is easy for attackers to manage to send multitudes of useless packets on a specific frequency. Blocking attacks attempt to lock the system by flooding it with useless traffic and use all network resources so that users on the network can not connect to the system. It is constantly used by hackers to break down network systems due to ease and security issues. In this case, sis, clienterver and ad-hoc networks were simulated using the OPNET Modeler simulation tool (OPNET Technologies, Inc., 2012). During the simulation, factors that may influence the simulation result, such as distance, power level and protocols used in ad hoc networks were taken into account.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: Packet-Hiding Methods for Preventing Selective Jamming Attacks - by ijasti - 14-02-2017, 11:35 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  Secured Data Hiding and Extractions Using BPCS project report helper 4 3,673 04-02-2016, 12:52 PM
Last Post: seminar report asees
  Data Hiding in Binary Images for Authentication & Annotation project topics 2 1,836 06-11-2015, 02:27 PM
Last Post: seminar report asees
  Packet-Hiding Methods for Preventing Selective Jamming Attacks Projects9 5 4,374 30-07-2013, 05:30 PM
Last Post: mounikabujji
  Revisiting Defenses against Large-Scale Online Password Guessing Attacks Projects9 5 3,934 18-03-2013, 12:25 PM
Last Post: computer topic
  A Geometric Approach to Improving Active Packet Loss Measurement full report project topics 2 2,630 09-04-2012, 06:01 PM
Last Post: [email protected]
  Mitigating Selective Forwarding Attacks With A Channel-Aware Approach In Wmns project topics 3 2,019 02-03-2012, 11:05 AM
Last Post: seminar paper
  A New TCP For Persistent Packet Reordering mechanical engineering crazy 2 2,445 01-03-2012, 02:54 PM
Last Post: seminar paper
  COMBINATORIAL APPROACH FOR PREVENTING SQL INJECTION ATTACKS electronics seminars 7 7,344 23-02-2012, 05:05 PM
Last Post: seminar paper
  CONSTRUCTING INTER-DOMAIN PACKET FILTERS TO CONTROL IP SPOOFING BASED ON BGP UPDATES- electronics seminars 2 4,320 20-02-2012, 01:04 PM
Last Post: seminar paper
  Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source electronics seminars 12 7,486 15-02-2012, 10:48 AM
Last Post: coimbatore

Forum Jump: