SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 302 
PACKET-HIDING METHODS FOR PREVENTING SELECTIVE JAMMING ATTACKS Sayyed Aziz Ahmed Dafedar1, Sanaulla.S.Kadariinamadar2, Mohammed Muzamil Mujawar3 1M.Tech in Computer Science Engineering, P.A.C.E Mangalore, Karnataka, India 2M.Tech in Biomedical Electronics & Industrial Instrumentation, P.D.A.C.E Gulbarga, Karnataka, India 3M.Tech in Computer Science Engineering, K.B.N.C.E Gulbarga, Karnataka, India Abstract In this paper we develop an cryptography where efficient data packet are transferred in an wireless medium. The vulnerability of an wireless medium for its intentional interface attacks for its behaviour as its an open nature leads to intentional interference attacks known as jamming. Making use of these intentional interference attacks we perform lauchpad for mounting the Denial-of-Service attacks on these open wireless networks. As jamming is an external threat model used commonly over an wireless mediums which effects adversely to the protocol specifications which lead to low-effort jamming attacks in an network secreat which is very difficult to mount the error and detect the failure of network. For these problems we address selective jamming attacks in wireless medium network. We create a sensor that has four components. First historic model where detecting known protocol sequence is developed for probabilistic modelSecond is probabilistic model where sizes of packets and inter-packet timing of different packet types are arranged. Third is victim network to produce known sequences for historic analyzer using active jamming mechanism. Lastly online classifier which makes packet type classification decisions For a short period of time and selective targeting messages of high importance are active in these attacks which effect adversely. We evolve an advantage of selective jamming with respect to network adversary efforts and performance degradation is done by case studies such as on routing and attacks on TCP. These selective jamming attacks can be launched by means of performance in real-time packet classification at physical layer of TCP. To overcome these attacks we develop three schemas which prevent real time packet classification by combining cryptographic primitives with physical layer attributesToovercome these attacks we develop three schemas that prevent real-time packet classification by using combined cryptographic primitives with its physical layer attributes. Keywords: Jamming attacks, Launch pad, eavesdropping 
-----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION As wireless networks rely on its uninterrupted availability for interconnecting nodes. However in this medium there are several multiple security threats. Using an transceiver which can lead to eavesdrop in an wireless transmission, another by injecting some messages or jam legitimate ones. Where eavesdropping and unwanted messages can be prevented by making use of crypto systems even then these are very difficult to trace out. As these have been shown for actualize server Denial-of-Service (DoS) attacks against wireless networks. In simple form of jamming adversary interfaces with reception of messages by transmitting jamming signals continuously or by its pulses. As an external threat model jamming strategies include continuous or random transmission of high power interface signals. As jamming is an external threat model. Where it leads to some of the major disadvantages for always sending jamming signals. Some are for expend a significant amount of energy for jamming frequency bands of interest another is continuous presence of unusual high interference levels these attacks makes us easy to detect and trace the error in an medium. 
2 EXISTING SYSTEM 
Jamming as an external threat model which is considered for jamming attacks on an wireless network medium where jammer is not an part of network medium. Jamming is used for continuous or random transmission of high power interference signals. Anti-jamming rely on spread-spectrum commonly known as SS communications where it provides some protection as per secret pseudo-noise known as PN code here only parties communicating are known. In these it’s easy to detect the attacks. 2.1 Disadvantages 
1. Jamming attacks are not taken in consideration in internal threat models. 
2. Always-on strategy has disadvantages as power consumption and efficiency on an network to jam frequency bands of interest. 
3. Cost efficiency is more.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 303 
3.SELECTIVE JAMMING IMPACTS In Selective jamming attacks of a two multi-hop wireless network scenarios. In the first scenario, the attacker targeted a TCP connection established over a multi-hop wireless route. In the second scenario, the jammer targeted network-layer control messages transmitted during the route establishment process. 3.1 Selective Jamming at the Transport Layer In experiments we adopt a transfer of file between two users for a small file by making use of an multi-hop route. We use TCP protocol for reliable transport of request files between the users. In MAC layer RTS/CTS system mechanisms are enabled. In results we found 11 Mbps speed at each users for an 3 MB of file transmissions on each user links. Placing jammer within proximity of one of the intermediate hops of the TCP connection. In this Four jamming strategies were considered: (a) selective jamming of cumulative TCP-ACKs, (b) selective jamming of RTS/CTS messages, (c) selective jamming of data packets, and (d) random jamming of any packet. In each of the strategies, a fraction p of the targeted packets is jammed. 3.2 Selective Jamming at the Network Layer In this scenario, we simulated a multi-hop wireless network of 35 nodes, randomly placed within a square area. The AODV routing protocol was used to discover and establish routing paths [19]. Connection requests were initiated between random source/destination pairs. Three jammers were strategically placed to selectively jam non-overlapping areas of the network. Three types of jamming strategies were considered: (a) a continuous jammer, (b) a random jammer blocking only a fraction p of the transmitted packets, and (c) a selective jammer targeting route request (RREQ) packets. 4.MODULES 4.1 Adversary Design In this module the adversary is in control of the communication medium and can jam messages at any instance of time and any part of the network of its own i.e. it decides by its own for which medium it has to. This adversary module operates in full-duplex mode and thus being able to receive and transmit simultaneously. 4.2 Real Time Packet Classification 
In this module real time packet classification at Physical layer is done where packet is encoded, interleaved, and modulated before the transmitting on an wireless channel. At receiver side it is demodulated, de inter leaved and decoded for recovering an original packet by sender side. At sender and receiver we place an jamming node where only few bytes within jammer corrupts by interfering with either user sender or receiver. 
4.3 Strong Hiding Commitment Scheme 
A strong hiding commitment scheme (SHCS), which is based on symmetric cryptography. 
4.4 Cryptographic Puzzle Hiding Scheme At sender end a packet for transmission. Here the sender selects an random key of a desired length. System generates a puzzle of an key and on time where an puzzle generates a function of an key and on an specified time slot where it has to solve the puzzle with appropriate key in desired time slot. 4.5 Hiding Based on all-or-Nothing Transformations Transmission of unencrypted packets is pre-processed by AONT it is done before transmission. 4.6 Hiding Based on MD5 Pre-computed MD5 checksum for user files to compare the checksum for an downloaded file. The receiver also performs same packet of sequence while receiving the data packets. 5.ALGORITHM USED Start Server, Intermediate Server and ‘n’ number of nodes Node chooses a file ‘F’ to send file data to serverIf node chooses the technique ‘SHCS’(A Strong Hiding Commitment Scheme), the message block m is encrypted and encrypted message m| sent to receiver, where receiver decrypts and receives the message block m. If node chooses the technique ‘Cryptographic Puzzle Hiding Scheme (CPHS)’, the message block m is encrypted, a puzzle P and time duration tp is generated at the sender side and sent to receiver, where receive must solve the puzzle in the given duration tp and gets the decrypted message m. If node chooses the technique ‘AONT’ (Hiding Based On All-Or-Nothing Transformations), the message block m is partitioned into n number of blocks. Then the blocks are encrypted and sent to receiver. The receiver the blocks are If node chooses the technique ‘MD5’ (Message Digest), the message block m is split into n number of blocks. Then the blocks are encrypted and sent as four round trips to receiver. In the receiver the blocks are decrypted and the sequence is checked and received. 6.CONCLUSIONS 
We consider an internal adversary model in which the jammer is part of the network under attack, thus being aware of the protocol specifications and shared network secrets. Jammer can classify transmitted packets in real time by decoding the first few symbols of an ongoing transmission. The impact of selective jamming attacks is evaluated on network protocols such as TCP and routing. Three schemes have been proposed
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
__________________________________________________________________________________________ 
Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 304 
that transform a selective jammer to a random one by preventing real-time packet classification. The schemes combine cryptographic primitives such as commitment schemes, cryptographic puzzles, and all-or-nothing transformations (AONTs) with physical layer characteristics. REFERENCES [1]. T. X. Brown, J. E. James, and A. Sethi. Jamming and sensing of encrypted wireless ad hoc networks. In Proceedings of MobiHoc, pages 120–130, 2006. [2]. M. Cagalj, S. Capkun, and J.-P. Hubaux. Wormhole-based antijamming techniques in sensor networks IEEE Transactions on Mobile Computing, 6(1):100–114, 2007. [3]. A. Chan, X. Liu, G. Noubir, and B. Thapa. Control channel jamming: Resilience and identification of traitors. In Proceedings of ISIT, 2007 [4]. T. Dempsey, G. Sahin, Y. Morton, and C. Hopper. Intelligent sensing and classification in ad hoc networks: a case study. Aerospace and Electronic Systems Magazine, IEEE, 24(8):23–30, August 2009. [5]. Y. Desmedt. Broadcast anti-jamming systems. Computer Networks, 35(2-3):223–236, February 2001. [6]. K. Gaj and P. Chodowiec. FPGA and ASIC implementations of AES Cryptographic Engineering, pages 235–294, 2009 [7]. O. Goldreich. Foundations of cryptography: Basic applications. Cambridge University Press, 2004 [8]. B. Greenstein, D. Mccoy, J. Pang, T. Kohno, S. Seshan, and D. Wetherall. Improving wireless privacy with an identifier-free link layer protocolIn Proceedings of MobiSys, 2008 [9]. A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proceedings of NDSS, pages 151–165, 1999. [10]. M. Strasser, C. Popper, and S. Capkun. Efficient uncoordinated fhssanti-jamming communicationIn Proceedings of MobiHoc, pages 207– 218, 2009. [11]. M. Strasser, C. P¨opper, S. ˇCapkun, and M. Cagalj. Jamming-resistant key establishment using uncoordinated frequency hopping In Pro- ceedings of IEEE Symposium on Security and Privacy, 2008 [12]. B. Thapa, G. Noubir, R. Rajaramanand, and B. Sheng. On the robustness of IEEE802.11 rate adaptation algorithms against smart jamming. In Proceedings of WiSec, 2011 [13]. Uppsala University, The Ad hoc Protocol Evaluation(APE) testbed, release 0.3, downloaded Nov. 2005 http://apetestbed.sourceforge.net BIOGRAPHIES 
Author 1Sayyed Aziz Ahmed Dafedar Presently Perusing MTECH in CSE, P.A.C.E Mangalore. 
Author 2 Sanaulla.S.Kadariinamadar Presently Perusing MTECH in Biomedical Electronics & Industrial Instrumentation, PDACE Gulbarga 
Author 3Mohammed MuzamilMujawar Presently Perusing MTECH in CSE, Khaja Banda Nawaz College of Engineering Gulbarga.

More Related Content

What's hot

Packet hiding methods for preventing selective
Packet hiding methods for preventing selectivePacket hiding methods for preventing selective
Packet hiding methods for preventing selective
veenasraj
 
Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...
JPINFOTECH JAYAPRAKASH
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
nagibtech
 
Dn36682688
Dn36682688Dn36682688
Dn36682688
IJERA Editor
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
CSCJournals
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
IJMER
 
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsConsensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
IJCNCJournal
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
JPINFOTECH JAYAPRAKASH
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksJPINFOTECH JAYAPRAKASH
 
Security management in mobile ad hoc networks
Security management in mobile ad hoc networksSecurity management in mobile ad hoc networks
Security management in mobile ad hoc networks
Prof. Dr. Noman Islam
 
A Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetA Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manet
IJSRD
 
Hiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesHiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniques
PriyangaRajaram
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
eSAT Journals
 
Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...
eSAT Journals
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Editor IJCATR
 
Grayhole
GrayholeGrayhole
Grayhole
Kumud Dixit
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
Editor IJCATR
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
cscpconf
 

What's hot (20)

Packet hiding methods for preventing selective
Packet hiding methods for preventing selectivePacket hiding methods for preventing selective
Packet hiding methods for preventing selective
 
Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Dn36682688
Dn36682688Dn36682688
Dn36682688
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
 
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsConsensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Security management in mobile ad hoc networks
Security management in mobile ad hoc networksSecurity management in mobile ad hoc networks
Security management in mobile ad hoc networks
 
A Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetA Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manet
 
Hiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesHiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniques
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 
Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...Performance analysis of papr reduction techniques in multicarrier modulation ...
Performance analysis of papr reduction techniques in multicarrier modulation ...
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
Grayhole
GrayholeGrayhole
Grayhole
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
A43030104
A43030104A43030104
A43030104
 

Viewers also liked

Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesForestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Eswar Publications
 
Enhancement of power quality in a
Enhancement of power quality in aEnhancement of power quality in a
Enhancement of power quality in a
eSAT Publishing House
 
A survey on secured logging in the cloud
A survey on secured logging in the cloudA survey on secured logging in the cloud
A survey on secured logging in the cloud
eSAT Publishing House
 
Raspberry pi based liquid flow monitoring and control
Raspberry pi based liquid flow monitoring and controlRaspberry pi based liquid flow monitoring and control
Raspberry pi based liquid flow monitoring and control
eSAT Publishing House
 
Detect and overcome the selfish problem in wifi network using energy sharing
Detect and overcome the selfish problem in wifi network using energy sharingDetect and overcome the selfish problem in wifi network using energy sharing
Detect and overcome the selfish problem in wifi network using energy sharing
eSAT Publishing House
 
Microstructural and electrical study of
Microstructural and electrical study ofMicrostructural and electrical study of
Microstructural and electrical study of
eSAT Publishing House
 
Key frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptorsKey frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptors
eSAT Publishing House
 
Gesture control algorithm for personal computers
Gesture control algorithm for personal computersGesture control algorithm for personal computers
Gesture control algorithm for personal computers
eSAT Publishing House
 
The effect of fiber orientation and laminate stacking
The effect of fiber orientation and laminate stackingThe effect of fiber orientation and laminate stacking
The effect of fiber orientation and laminate stacking
eSAT Publishing House
 
Analysis of factors contributing delays and claims in
Analysis of factors contributing delays and claims inAnalysis of factors contributing delays and claims in
Analysis of factors contributing delays and claims in
eSAT Publishing House
 
Causes of delay in indian transportation
Causes of delay in indian transportationCauses of delay in indian transportation
Causes of delay in indian transportation
eSAT Publishing House
 
Numerical simulation of tidal circulation in the
Numerical simulation of tidal circulation in theNumerical simulation of tidal circulation in the
Numerical simulation of tidal circulation in the
eSAT Publishing House
 
A clonal based algorithm for the reconstruction of
A clonal based algorithm for the reconstruction ofA clonal based algorithm for the reconstruction of
A clonal based algorithm for the reconstruction of
eSAT Publishing House
 
Batch arrival retrial queuing system with state
Batch arrival retrial queuing system with stateBatch arrival retrial queuing system with state
Batch arrival retrial queuing system with state
eSAT Publishing House
 
Effect of fly ash on the properties of cement
Effect of fly ash on the properties of cementEffect of fly ash on the properties of cement
Effect of fly ash on the properties of cement
eSAT Publishing House
 
Experimental investigation and stastical analysis of
Experimental investigation and stastical analysis ofExperimental investigation and stastical analysis of
Experimental investigation and stastical analysis of
eSAT Publishing House
 
Estimation of surface runoff in nallur amanikere
Estimation of surface runoff in nallur amanikereEstimation of surface runoff in nallur amanikere
Estimation of surface runoff in nallur amanikere
eSAT Publishing House
 
Unity power factor control by pwm rectifier
Unity power factor control by pwm rectifierUnity power factor control by pwm rectifier
Unity power factor control by pwm rectifier
eSAT Publishing House
 
Smfir technology based transportation system and applicability of mppt
Smfir technology based transportation system and applicability of mpptSmfir technology based transportation system and applicability of mppt
Smfir technology based transportation system and applicability of mppt
eSAT Publishing House
 
Environmental sciences
Environmental sciencesEnvironmental sciences
Environmental sciences
eSAT Publishing House
 

Viewers also liked (20)

Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding TechniquesForestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
Forestalling Meticulous Jam Attacks Using Packet-Hiding Techniques
 
Enhancement of power quality in a
Enhancement of power quality in aEnhancement of power quality in a
Enhancement of power quality in a
 
A survey on secured logging in the cloud
A survey on secured logging in the cloudA survey on secured logging in the cloud
A survey on secured logging in the cloud
 
Raspberry pi based liquid flow monitoring and control
Raspberry pi based liquid flow monitoring and controlRaspberry pi based liquid flow monitoring and control
Raspberry pi based liquid flow monitoring and control
 
Detect and overcome the selfish problem in wifi network using energy sharing
Detect and overcome the selfish problem in wifi network using energy sharingDetect and overcome the selfish problem in wifi network using energy sharing
Detect and overcome the selfish problem in wifi network using energy sharing
 
Microstructural and electrical study of
Microstructural and electrical study ofMicrostructural and electrical study of
Microstructural and electrical study of
 
Key frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptorsKey frame extraction for video summarization using motion activity descriptors
Key frame extraction for video summarization using motion activity descriptors
 
Gesture control algorithm for personal computers
Gesture control algorithm for personal computersGesture control algorithm for personal computers
Gesture control algorithm for personal computers
 
The effect of fiber orientation and laminate stacking
The effect of fiber orientation and laminate stackingThe effect of fiber orientation and laminate stacking
The effect of fiber orientation and laminate stacking
 
Analysis of factors contributing delays and claims in
Analysis of factors contributing delays and claims inAnalysis of factors contributing delays and claims in
Analysis of factors contributing delays and claims in
 
Causes of delay in indian transportation
Causes of delay in indian transportationCauses of delay in indian transportation
Causes of delay in indian transportation
 
Numerical simulation of tidal circulation in the
Numerical simulation of tidal circulation in theNumerical simulation of tidal circulation in the
Numerical simulation of tidal circulation in the
 
A clonal based algorithm for the reconstruction of
A clonal based algorithm for the reconstruction ofA clonal based algorithm for the reconstruction of
A clonal based algorithm for the reconstruction of
 
Batch arrival retrial queuing system with state
Batch arrival retrial queuing system with stateBatch arrival retrial queuing system with state
Batch arrival retrial queuing system with state
 
Effect of fly ash on the properties of cement
Effect of fly ash on the properties of cementEffect of fly ash on the properties of cement
Effect of fly ash on the properties of cement
 
Experimental investigation and stastical analysis of
Experimental investigation and stastical analysis ofExperimental investigation and stastical analysis of
Experimental investigation and stastical analysis of
 
Estimation of surface runoff in nallur amanikere
Estimation of surface runoff in nallur amanikereEstimation of surface runoff in nallur amanikere
Estimation of surface runoff in nallur amanikere
 
Unity power factor control by pwm rectifier
Unity power factor control by pwm rectifierUnity power factor control by pwm rectifier
Unity power factor control by pwm rectifier
 
Smfir technology based transportation system and applicability of mppt
Smfir technology based transportation system and applicability of mpptSmfir technology based transportation system and applicability of mppt
Smfir technology based transportation system and applicability of mppt
 
Environmental sciences
Environmental sciencesEnvironmental sciences
Environmental sciences
 

Similar to Packet hiding methods for preventing selective jamming attacks

Abstract
AbstractAbstract
Abstract
rajugnt
 
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
IJMER
 
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
Advisedly delayed packet attack on tcp based mobile ad-hoc networksAdvisedly delayed packet attack on tcp based mobile ad-hoc networks
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
eSAT Journals
 
Advisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobileAdvisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobile
eSAT Publishing House
 
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ijiert bestjournal
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
IJTET Journal
 
Secure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay NetworksSecure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay Networks
International Journal of Engineering Inventions www.ijeijournal.com
 
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
IJERA Editor
 
Br33421423
Br33421423Br33421423
Br33421423
IJERA Editor
 
Br33421423
Br33421423Br33421423
Br33421423
IJERA Editor
 
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
IOSR Journals
 
I030102056063
I030102056063I030102056063
I030102056063
theijes
 
TAM new report
TAM new reportTAM new report
TAM new reportSuzit Punk
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
ijfcstjournal
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
IJERA Editor
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
Editor IJMTER
 
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor Networks
Eswar Publications
 
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET Journal
 
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
IRJET Journal
 
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
theijes
 

Similar to Packet hiding methods for preventing selective jamming attacks (20)

Abstract
AbstractAbstract
Abstract
 
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
 
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
Advisedly delayed packet attack on tcp based mobile ad-hoc networksAdvisedly delayed packet attack on tcp based mobile ad-hoc networks
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
 
Advisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobileAdvisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobile
 
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
Secure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay NetworksSecure and Efficient Transmission Using Jammer and Relay Networks
Secure and Efficient Transmission Using Jammer and Relay Networks
 
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over ManetImproved SCTP Scheme To Overcome Congestion Losses Over Manet
Improved SCTP Scheme To Overcome Congestion Losses Over Manet
 
Br33421423
Br33421423Br33421423
Br33421423
 
Br33421423
Br33421423Br33421423
Br33421423
 
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
 
I030102056063
I030102056063I030102056063
I030102056063
 
TAM new report
TAM new reportTAM new report
TAM new report
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor Networks
 
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
 
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
Conservation Of Battery Power by Alleviating DOS Attacks in Wireless Sensor N...
 
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
Message Authentication And Source Privacy Using BAC Technique In Wireless Sen...
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
WENKENLI1
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
MdTanvirMahtab2
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
SupreethSP4
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
MLILAB
 

Recently uploaded (20)

NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdfGoverning Equations for Fundamental Aerodynamics_Anderson2010.pdf
Governing Equations for Fundamental Aerodynamics_Anderson2010.pdf
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
Standard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - NeometrixStandard Reomte Control Interface - Neometrix
Standard Reomte Control Interface - Neometrix
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Runway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptxRunway Orientation Based on the Wind Rose Diagram.pptx
Runway Orientation Based on the Wind Rose Diagram.pptx
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
H.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdfH.Seo,  ICLR 2024, MLILAB,  KAIST AI.pdf
H.Seo, ICLR 2024, MLILAB, KAIST AI.pdf
 

Packet hiding methods for preventing selective jamming attacks

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 302 PACKET-HIDING METHODS FOR PREVENTING SELECTIVE JAMMING ATTACKS Sayyed Aziz Ahmed Dafedar1, Sanaulla.S.Kadariinamadar2, Mohammed Muzamil Mujawar3 1M.Tech in Computer Science Engineering, P.A.C.E Mangalore, Karnataka, India 2M.Tech in Biomedical Electronics & Industrial Instrumentation, P.D.A.C.E Gulbarga, Karnataka, India 3M.Tech in Computer Science Engineering, K.B.N.C.E Gulbarga, Karnataka, India Abstract In this paper we develop an cryptography where efficient data packet are transferred in an wireless medium. The vulnerability of an wireless medium for its intentional interface attacks for its behaviour as its an open nature leads to intentional interference attacks known as jamming. Making use of these intentional interference attacks we perform lauchpad for mounting the Denial-of-Service attacks on these open wireless networks. As jamming is an external threat model used commonly over an wireless mediums which effects adversely to the protocol specifications which lead to low-effort jamming attacks in an network secreat which is very difficult to mount the error and detect the failure of network. For these problems we address selective jamming attacks in wireless medium network. We create a sensor that has four components. First historic model where detecting known protocol sequence is developed for probabilistic modelSecond is probabilistic model where sizes of packets and inter-packet timing of different packet types are arranged. Third is victim network to produce known sequences for historic analyzer using active jamming mechanism. Lastly online classifier which makes packet type classification decisions For a short period of time and selective targeting messages of high importance are active in these attacks which effect adversely. We evolve an advantage of selective jamming with respect to network adversary efforts and performance degradation is done by case studies such as on routing and attacks on TCP. These selective jamming attacks can be launched by means of performance in real-time packet classification at physical layer of TCP. To overcome these attacks we develop three schemas which prevent real time packet classification by combining cryptographic primitives with physical layer attributesToovercome these attacks we develop three schemas that prevent real-time packet classification by using combined cryptographic primitives with its physical layer attributes. Keywords: Jamming attacks, Launch pad, eavesdropping -----------------------------------------------------------------------***----------------------------------------------------------------------- 1. INTRODUCTION As wireless networks rely on its uninterrupted availability for interconnecting nodes. However in this medium there are several multiple security threats. Using an transceiver which can lead to eavesdrop in an wireless transmission, another by injecting some messages or jam legitimate ones. Where eavesdropping and unwanted messages can be prevented by making use of crypto systems even then these are very difficult to trace out. As these have been shown for actualize server Denial-of-Service (DoS) attacks against wireless networks. In simple form of jamming adversary interfaces with reception of messages by transmitting jamming signals continuously or by its pulses. As an external threat model jamming strategies include continuous or random transmission of high power interface signals. As jamming is an external threat model. Where it leads to some of the major disadvantages for always sending jamming signals. Some are for expend a significant amount of energy for jamming frequency bands of interest another is continuous presence of unusual high interference levels these attacks makes us easy to detect and trace the error in an medium. 2 EXISTING SYSTEM Jamming as an external threat model which is considered for jamming attacks on an wireless network medium where jammer is not an part of network medium. Jamming is used for continuous or random transmission of high power interference signals. Anti-jamming rely on spread-spectrum commonly known as SS communications where it provides some protection as per secret pseudo-noise known as PN code here only parties communicating are known. In these it’s easy to detect the attacks. 2.1 Disadvantages 1. Jamming attacks are not taken in consideration in internal threat models. 2. Always-on strategy has disadvantages as power consumption and efficiency on an network to jam frequency bands of interest. 3. Cost efficiency is more.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 303 3.SELECTIVE JAMMING IMPACTS In Selective jamming attacks of a two multi-hop wireless network scenarios. In the first scenario, the attacker targeted a TCP connection established over a multi-hop wireless route. In the second scenario, the jammer targeted network-layer control messages transmitted during the route establishment process. 3.1 Selective Jamming at the Transport Layer In experiments we adopt a transfer of file between two users for a small file by making use of an multi-hop route. We use TCP protocol for reliable transport of request files between the users. In MAC layer RTS/CTS system mechanisms are enabled. In results we found 11 Mbps speed at each users for an 3 MB of file transmissions on each user links. Placing jammer within proximity of one of the intermediate hops of the TCP connection. In this Four jamming strategies were considered: (a) selective jamming of cumulative TCP-ACKs, (b) selective jamming of RTS/CTS messages, (c) selective jamming of data packets, and (d) random jamming of any packet. In each of the strategies, a fraction p of the targeted packets is jammed. 3.2 Selective Jamming at the Network Layer In this scenario, we simulated a multi-hop wireless network of 35 nodes, randomly placed within a square area. The AODV routing protocol was used to discover and establish routing paths [19]. Connection requests were initiated between random source/destination pairs. Three jammers were strategically placed to selectively jam non-overlapping areas of the network. Three types of jamming strategies were considered: (a) a continuous jammer, (b) a random jammer blocking only a fraction p of the transmitted packets, and (c) a selective jammer targeting route request (RREQ) packets. 4.MODULES 4.1 Adversary Design In this module the adversary is in control of the communication medium and can jam messages at any instance of time and any part of the network of its own i.e. it decides by its own for which medium it has to. This adversary module operates in full-duplex mode and thus being able to receive and transmit simultaneously. 4.2 Real Time Packet Classification In this module real time packet classification at Physical layer is done where packet is encoded, interleaved, and modulated before the transmitting on an wireless channel. At receiver side it is demodulated, de inter leaved and decoded for recovering an original packet by sender side. At sender and receiver we place an jamming node where only few bytes within jammer corrupts by interfering with either user sender or receiver. 4.3 Strong Hiding Commitment Scheme A strong hiding commitment scheme (SHCS), which is based on symmetric cryptography. 4.4 Cryptographic Puzzle Hiding Scheme At sender end a packet for transmission. Here the sender selects an random key of a desired length. System generates a puzzle of an key and on time where an puzzle generates a function of an key and on an specified time slot where it has to solve the puzzle with appropriate key in desired time slot. 4.5 Hiding Based on all-or-Nothing Transformations Transmission of unencrypted packets is pre-processed by AONT it is done before transmission. 4.6 Hiding Based on MD5 Pre-computed MD5 checksum for user files to compare the checksum for an downloaded file. The receiver also performs same packet of sequence while receiving the data packets. 5.ALGORITHM USED Start Server, Intermediate Server and ‘n’ number of nodes Node chooses a file ‘F’ to send file data to serverIf node chooses the technique ‘SHCS’(A Strong Hiding Commitment Scheme), the message block m is encrypted and encrypted message m| sent to receiver, where receiver decrypts and receives the message block m. If node chooses the technique ‘Cryptographic Puzzle Hiding Scheme (CPHS)’, the message block m is encrypted, a puzzle P and time duration tp is generated at the sender side and sent to receiver, where receive must solve the puzzle in the given duration tp and gets the decrypted message m. If node chooses the technique ‘AONT’ (Hiding Based On All-Or-Nothing Transformations), the message block m is partitioned into n number of blocks. Then the blocks are encrypted and sent to receiver. The receiver the blocks are If node chooses the technique ‘MD5’ (Message Digest), the message block m is split into n number of blocks. Then the blocks are encrypted and sent as four round trips to receiver. In the receiver the blocks are decrypted and the sequence is checked and received. 6.CONCLUSIONS We consider an internal adversary model in which the jammer is part of the network under attack, thus being aware of the protocol specifications and shared network secrets. Jammer can classify transmitted packets in real time by decoding the first few symbols of an ongoing transmission. The impact of selective jamming attacks is evaluated on network protocols such as TCP and routing. Three schemes have been proposed
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 03 | May-2014 | NCRIET-2014, Available @ http://www.ijret.org 304 that transform a selective jammer to a random one by preventing real-time packet classification. The schemes combine cryptographic primitives such as commitment schemes, cryptographic puzzles, and all-or-nothing transformations (AONTs) with physical layer characteristics. REFERENCES [1]. T. X. Brown, J. E. James, and A. Sethi. Jamming and sensing of encrypted wireless ad hoc networks. In Proceedings of MobiHoc, pages 120–130, 2006. [2]. M. Cagalj, S. Capkun, and J.-P. Hubaux. Wormhole-based antijamming techniques in sensor networks IEEE Transactions on Mobile Computing, 6(1):100–114, 2007. [3]. A. Chan, X. Liu, G. Noubir, and B. Thapa. Control channel jamming: Resilience and identification of traitors. In Proceedings of ISIT, 2007 [4]. T. Dempsey, G. Sahin, Y. Morton, and C. Hopper. Intelligent sensing and classification in ad hoc networks: a case study. Aerospace and Electronic Systems Magazine, IEEE, 24(8):23–30, August 2009. [5]. Y. Desmedt. Broadcast anti-jamming systems. Computer Networks, 35(2-3):223–236, February 2001. [6]. K. Gaj and P. Chodowiec. FPGA and ASIC implementations of AES Cryptographic Engineering, pages 235–294, 2009 [7]. O. Goldreich. Foundations of cryptography: Basic applications. Cambridge University Press, 2004 [8]. B. Greenstein, D. Mccoy, J. Pang, T. Kohno, S. Seshan, and D. Wetherall. Improving wireless privacy with an identifier-free link layer protocolIn Proceedings of MobiSys, 2008 [9]. A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proceedings of NDSS, pages 151–165, 1999. [10]. M. Strasser, C. Popper, and S. Capkun. Efficient uncoordinated fhssanti-jamming communicationIn Proceedings of MobiHoc, pages 207– 218, 2009. [11]. M. Strasser, C. P¨opper, S. ˇCapkun, and M. Cagalj. Jamming-resistant key establishment using uncoordinated frequency hopping In Pro- ceedings of IEEE Symposium on Security and Privacy, 2008 [12]. B. Thapa, G. Noubir, R. Rajaramanand, and B. Sheng. On the robustness of IEEE802.11 rate adaptation algorithms against smart jamming. In Proceedings of WiSec, 2011 [13]. Uppsala University, The Ad hoc Protocol Evaluation(APE) testbed, release 0.3, downloaded Nov. 2005 http://apetestbed.sourceforge.net BIOGRAPHIES Author 1Sayyed Aziz Ahmed Dafedar Presently Perusing MTECH in CSE, P.A.C.E Mangalore. Author 2 Sanaulla.S.Kadariinamadar Presently Perusing MTECH in Biomedical Electronics & Industrial Instrumentation, PDACE Gulbarga Author 3Mohammed MuzamilMujawar Presently Perusing MTECH in CSE, Khaja Banda Nawaz College of Engineering Gulbarga.