15-10-2010, 03:25 PM
INTERNAL GUIDE:
MRS.RUPA EZHILARASI
EXTERNAL GUIDE:
MR.RACKKI
Presented by:
ANAND.K
[attachment=6190]
Abstract
In many wireless networks depends on the ability for network users to establish and maintain communication channels using control messages from base stations.
An adversary with knowledge of the underlying communication protocol can mount an efficient denial of service attack by jamming the communication channels used to exchange control messages.
The use of spread spectrum techniques can deter an external adversary from such control channel jamming attacks.
However, malicious colluding insiders or an adversary who captures or compromises system users is not deterred by spread spectrum, as they know the required spreading sequences.
MRS.RUPA EZHILARASI
EXTERNAL GUIDE:
MR.RACKKI
Presented by:
ANAND.K
[attachment=6190]
Abstract
In many wireless networks depends on the ability for network users to establish and maintain communication channels using control messages from base stations.
An adversary with knowledge of the underlying communication protocol can mount an efficient denial of service attack by jamming the communication channels used to exchange control messages.
The use of spread spectrum techniques can deter an external adversary from such control channel jamming attacks.
However, malicious colluding insiders or an adversary who captures or compromises system users is not deterred by spread spectrum, as they know the required spreading sequences.