SlideShare a Scribd company logo
© 2016, IJCERT All Rights Reserved Page | 194
International Journal of Computer Engineering In Research Trends
Volume 3, Issue 4, April-2016, pp. 194-196 ISSN (O): 2349-7084
Prevention of Packet Hiding Methods In
Selective Jamming Attack
Shital Patil , Vishaka Patil , Rupali Warke , Priyanka Patil
Abstract:- The sharing nature of wireless medium provides various challenging features among various set of users. It
is very important in real world and it provides better transfer rate but authentication is ignored. The limitations of existing
wired network are overcome by wireless network. These networks act as source for various types of jamming attacks. In
analysis and detection of jamming attack various methods are available but sometime they fail. In case of external threat
the analysis and reporting of jamming attack is very easy model but it is quite difficult in terms of internal threat model,
these internal term uses the knowledge about network secrets and network protocols to launch various attacks with very
low effort. Various cryptographic techniques are implemented to prevent these attacks. The main goal of this project is to
prevent the information at the wireless physical layer and allowed the safe transmission among communicated nodes
although the attacker is present.
Keywords – Commitment scheme, Network Protocols, Packet hiding methods, Real time packet classification and
Selective jamming attacks.
——————————  ——————————
1. INTRODUCTION
The faster accessibility, compatibility and connectivity
between different users is provided by wireless
network. Various types of attacks are invited because
of the sharing medium of wireless network and it also
provides it provide additional features. The
adversaries with internal knowledge of network secrets
take more effort on jamming the network or decrease
the network performance [1], [2]. Anyone which has
transceiver can easily inject spurious messages or
create noise or interference or produce jamming attack
in an ongoing transmission or block the transmission of
legitimate users .In the simplest form, the attacker
classifies first few bytes of transmitted packet and
destroy the message Attacker must have knowledge
about each layer of the TCP protocol. The actual format
for frame in wireless
Figure 1: Generic frame format for wireless network.
A.Motivation
The motivation for proposed solution lies in problem
with sharing nature of wireless network [1].
Sometimes in the prevention of packet hiding methods
in selective jamming attack the how many packet are
loss or send to destination. For that purpose the
packet hiding methods are detected the packet hiding
method are strong packet hiding method ,puzzle
hiding ,all-or-nothing transformation, to Overcome the
disadvantage of this method we have proposed packet
hiding without packet loss method.
Available online at: www.ijcert.org
Shital Patil et al., International Journal of Computer Engineering In Research Trends
Volume 3, Issue 4, April-2016, pp. 194-196
© 2016, IJCERT All Rights Reserved Page | 195
B. Problem Definition
Because of sharing nature Of wireless network the
various jamming attack are occurred and the wireless
medium provides various challenging features.
Because of internal knowledge of network and its
secrets the jamming attack in which jammer attacks the
importance message .We propose the packet hiding
scheme without packet loss. In PHSPL, the data is send
to the selective host and packets are sending with
Header, Sequence ID and host name . Consider in
given figure. Node A and B communicates with
wireless network. Both A and B there is a jamming
Node and communicated with each other. Node j
classifies m by receiving only the first few Bytes of m
when node A transfer the packet from m to node B,
With the reception at B the J corrupts m beyond
recovery by interfering in jamming node . We address
the problem of preventing the jamming node from
classifying m in real time, thus mitigating J’s ability to
perform selective jamming. Our goal is to transform a
selective host note that in the present work, based on
protocol semantics we do not address packet
classification methods.
Fig 2. Realization of a selective jamming attack
2. RELATED WORK
In related work, we are studying the reasons for
jamming, spread spectrum techniques used by the
conventional systems and the disadvantages of existing
system, prevention mechanism they used and at the
last we are studying how the real time packet
classification is performed and strong hiding
commitment scheme which is used by our proposed
system. Because of jamming, the wireless network
either stopped or disturbed. Noise, collision,
interference these are various forms of jamming.
Jamming may be performed intentionally or
unintentionally, depending upon either performing
attack or due to network load. There is no need of
special hardware to execute these attacks only
knowledge of preserved information is required.
2.1. STRONG HIDING COMMITMENT SCHEME
(SHCS)
In prevention of packet hiding methods in selective
jamming attack, A strong hiding commitment scheme
(SHCS) is one of technique , and which is based on
symmetric cryptography. Assume that the sender has a
packet for sending to Receiver. First, the sender S
constructs message and the commitment function is an
off-the-shelf symmetric encryption algorithm is a
publicly known permutation, and k is a randomly
selected key of some desired key length s. Both the
sender and receiver are randomly selected key and
send the packet to destination.
2.2. CRYPTOGRAPHIC PUZZLE HIDING
SCHEME
In cryptographic puzzle scheme the sender S has a
packet m for transmission. The sender selects a random
key k, of a desired length for sending packet to the
receiver. Sender S generates a puzzle (key, time),
where puzzle () denotes the puzzle generator function,
and the time required for the solution of the puzzle.
After generating the puzzle P, the sender broadcasts
the puzzle. At the receiver side, any receiver R solves
the received puzzle to recover key and then computes.
2.3. ALL-OR-NOTHING TRANSFORMATION
The packets are pre-processed by an All-or-nothing
transformation (AONT) before transmission of all
packet but remain packet are unencrypted. The
attacker cannot perform packet classification until all
pseudo-messages corresponding to the original packet
have been received and then the packet transformation
has been applied in inverse way. Packet m is
partitioned to a set of x input blocks m = {m1, m2,
m3….}, which serve as an input to a set of pseudo-
messages m = {m1, m2, m3…} is transmitted over the
wireless medium.
3. PROPOSED SYSTEM
In prevention of packet hiding methods in selective
jamming attack proposed system gives brief
Shital Patil et al., International Journal of Computer Engineering In Research Trends
Volume 3, Issue 4, April-2016, pp. 194-196
© 2016, IJCERT All Rights Reserved Page | 196
introduction along with its benifits .The packet hiding
without packet loss scheme gives better solution for
jamming. for that packets are sending with Header,
Sequence ID and host name and the data is send to the
destination host. That’s why the packet loss is
minimum. So the sender and receiver can communicate
with each other securely.in packet hiding without
packet loss all the information about packet and data is
in the header of packet. The PHSPL is more effective
over other real time classification methods. There are
some advantages of proposed system- Very easy for
exploiting knowledge from compromised nodes. The
proposed system gives selective jamming attack to
DOS with very low effort and this is another advantage
of. By using proposed system strong security protocols
are achieved.
4. ACTUAL IMPLEMENTATION
In prevention of packet hiding methods in selective
jamming attack we uses the Network Simulator 2.34
tool in which front end is tcl and back end is c++. Here
are two protocols are used. TCP and AODV protocol
and TCP is used for establishing the connection and
AODV routing protocol is used for finding routing
path for data packets. The transmission rate is 11Mbps
for every link. But due to flooding feature of AODV
the random attacker fails in disturbing route path. The
continuous, random, targeted RREQ the attacker are
kept between the communicated pairs.
 Using AODV the Implementation of wireless
node in NS-2.
 Implementation of jamming attack with
selective transmission.
 In wireless network the Implementation of
packet classification is done.
 Implementation of packet hiding for real
packet.
 Detection of jamming attack and analysis with
throughput.
5. CONCLUSION
In this paper, the prevention of packet hiding methods in
selective jamming attacks generated a problem in LAN or
wireless networks. Attacker attacks the importance
message because of internal knowledge of network and its
secrets. We quantified the effectiveness of packet and
analysed the security of packet hiding schemes. We
propose the packet hiding scheme without packet loss
(PHSPL) in which the packet loss is minimum and the
sender and receiver can communicate with each other
securely. All the information about packet and data is in
the header of packet. The PHSPL is more effective over
other real time classification methods. So the sender and
receiver can communicate securely.
Fig 3: Throughput for packet hiding without packetloss
scheme.
REFERENCES
1. P. Tague, M. Li, and R. Poovendran., ―Mitigation of
control channel, jamming under node capture
attacks‖. IEEE Transactions on Computing,
8(9):1221–1234, 2009.
2. T. X. Brown, J. E. James, and A. Sethi.‖ Jamming and
sensing of Encrypted wireless ad hoc networks‖. In
Proceedings of MobiHoc, pages 120–130, 2006.
3. L. Lazos, S. Liu, and M. Krunz. ―Mitigating control-
channel jamming attacks in multi-channel ad hoc
networks‖. In Proceedings of the 2nd ACM conference
on wireless network security, pages 169–180, 2009.
4. O Goldreich. Foundations of cryptography: Basic
applications, Cambrige University press 2005.
5. Damgard. ―Commitment schemes and zero knowledge
protocols‖,
6. Lecture notes in computer science, 1561:63-86.
7. Dilip Kumar D.P 1, H.Venugopal2. ―Avoiding
selective jam attack
8. by packet hiding method in wireless sensor
network‖.
9. G. Noubir and G. Lin. ―Low power DoS attacks in
data wireless
10.LANs and countermeasures‖, ACM SIGMOBILE
Mobile computing.

More Related Content

What's hot

Hiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesHiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniques
PriyangaRajaram
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
nagibtech
 
Dn36682688
Dn36682688Dn36682688
Dn36682688
IJERA Editor
 
Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...
ijctet
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a survey
eSAT Publishing House
 
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
IJMER
 
A43030104
A43030104A43030104
A43030104
IJERA Editor
 
Packet hiding methods for preventing selective
Packet hiding methods for preventing selectivePacket hiding methods for preventing selective
Packet hiding methods for preventing selective
veenasraj
 
A Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetA Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manet
IJSRD
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
Editor IJCATR
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
IJMER
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV Protocol
Birju Tank
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attack
Raj Sikarwar
 
A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...
Mumbai Academisc
 
I1086066
I1086066I1086066
I1086066
IJERD Editor
 
Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...
JPINFOTECH JAYAPRAKASH
 
Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...
IJNSA Journal
 
An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...
IAEME Publication
 

What's hot (18)

Hiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesHiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniques
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Dn36682688
Dn36682688Dn36682688
Dn36682688
 
Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a survey
 
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
 
A43030104
A43030104A43030104
A43030104
 
Packet hiding methods for preventing selective
Packet hiding methods for preventing selectivePacket hiding methods for preventing selective
Packet hiding methods for preventing selective
 
A Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetA Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manet
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV Protocol
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attack
 
A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...
 
I1086066
I1086066I1086066
I1086066
 
Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...
 
Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...
 
An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...
 

Similar to Prevention of Packet Hiding Methods In Selective Jamming Attack

ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ijiert bestjournal
 
I030102056063
I030102056063I030102056063
I030102056063
theijes
 
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
Container-Beating Approaches for Avoiding Discriminative Cramming AssaultsContainer-Beating Approaches for Avoiding Discriminative Cramming Assaults
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
International Journal of Engineering Inventions www.ijeijournal.com
 
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLESSELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
IJNSA Journal
 
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...
IJNSA Journal
 
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet  Hiding MethodsJamming Attacks Prevention in Wireless Networks Using Packet  Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
IOSR Journals
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
IJTET Journal
 
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
IOSR Journals
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
JPINFOTECH JAYAPRAKASH
 
N0704075079
N0704075079N0704075079
N0704075079
IJERD Editor
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
JPINFOTECH JAYAPRAKASH
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network coding
ijwmn
 
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless NetworksA Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
IRJET Journal
 
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor Networks
Eswar Publications
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
IJERA Editor
 
Am03402220229
Am03402220229Am03402220229
Am03402220229
ijceronline
 
Abstract
AbstractAbstract
Abstract
rajugnt
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
Alexander Decker
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
Alexander Decker
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganography
Alexander Decker
 

Similar to Prevention of Packet Hiding Methods In Selective Jamming Attack (20)

ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
 
I030102056063
I030102056063I030102056063
I030102056063
 
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
Container-Beating Approaches for Avoiding Discriminative Cramming AssaultsContainer-Beating Approaches for Avoiding Discriminative Cramming Assaults
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
 
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLESSELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
 
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...
 
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet  Hiding MethodsJamming Attacks Prevention in Wireless Networks Using Packet  Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
N0704075079
N0704075079N0704075079
N0704075079
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network coding
 
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless NetworksA Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
 
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor Networks
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
Am03402220229
Am03402220229Am03402220229
Am03402220229
 
Abstract
AbstractAbstract
Abstract
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganography
 

More from IJCERT

Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi MethodParametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
IJCERT
 
Robust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization ProcessRobust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization Process
IJCERT
 
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsSoftware Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
IJCERT
 
A Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation MethodsA Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation Methods
IJCERT
 
An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding   An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding
IJCERT
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
IJCERT
 
Hard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling PowerHard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling Power
IJCERT
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
IJCERT
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationSecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
IJCERT
 
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc NetworkHandling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
IJCERT
 
GSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault DetectionGSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault Detection
IJCERT
 
Efficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodEfficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication Method
IJCERT
 
Data Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data SetData Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data Set
IJCERT
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
IJCERT
 
AUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEYAUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEY
IJCERT
 
Implementation of Motion Model Using Vanet
Implementation of Motion Model Using VanetImplementation of Motion Model Using Vanet
Implementation of Motion Model Using Vanet
IJCERT
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoT
IJCERT
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial Environment
IJCERT
 
Real Time Detection System of Driver Fatigue
Real Time Detection System of Driver FatigueReal Time Detection System of Driver Fatigue
Real Time Detection System of Driver Fatigue
IJCERT
 
A Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data PreprocessingA Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data Preprocessing
IJCERT
 

More from IJCERT (20)

Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi MethodParametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
 
Robust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization ProcessRobust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization Process
 
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsSoftware Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
 
A Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation MethodsA Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation Methods
 
An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding   An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
Hard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling PowerHard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling Power
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationSecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
 
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc NetworkHandling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
 
GSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault DetectionGSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault Detection
 
Efficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodEfficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication Method
 
Data Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data SetData Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data Set
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
 
AUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEYAUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEY
 
Implementation of Motion Model Using Vanet
Implementation of Motion Model Using VanetImplementation of Motion Model Using Vanet
Implementation of Motion Model Using Vanet
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoT
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial Environment
 
Real Time Detection System of Driver Fatigue
Real Time Detection System of Driver FatigueReal Time Detection System of Driver Fatigue
Real Time Detection System of Driver Fatigue
 
A Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data PreprocessingA Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data Preprocessing
 

Recently uploaded

BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
ClaraZara1
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
IJECEIAES
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
Victor Morales
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
zwunae
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
wisnuprabawa3
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
IJECEIAES
 

Recently uploaded (20)

BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)6th International Conference on Machine Learning & Applications (CMLA 2024)
6th International Conference on Machine Learning & Applications (CMLA 2024)
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...Adaptive synchronous sliding control for a robot manipulator based on neural ...
Adaptive synchronous sliding control for a robot manipulator based on neural ...
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsKuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressions
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
 
New techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdfNew techniques for characterising damage in rock slopes.pdf
New techniques for characterising damage in rock slopes.pdf
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...Advanced control scheme of doubly fed induction generator for wind turbine us...
Advanced control scheme of doubly fed induction generator for wind turbine us...
 

Prevention of Packet Hiding Methods In Selective Jamming Attack

  • 1. © 2016, IJCERT All Rights Reserved Page | 194 International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 194-196 ISSN (O): 2349-7084 Prevention of Packet Hiding Methods In Selective Jamming Attack Shital Patil , Vishaka Patil , Rupali Warke , Priyanka Patil Abstract:- The sharing nature of wireless medium provides various challenging features among various set of users. It is very important in real world and it provides better transfer rate but authentication is ignored. The limitations of existing wired network are overcome by wireless network. These networks act as source for various types of jamming attacks. In analysis and detection of jamming attack various methods are available but sometime they fail. In case of external threat the analysis and reporting of jamming attack is very easy model but it is quite difficult in terms of internal threat model, these internal term uses the knowledge about network secrets and network protocols to launch various attacks with very low effort. Various cryptographic techniques are implemented to prevent these attacks. The main goal of this project is to prevent the information at the wireless physical layer and allowed the safe transmission among communicated nodes although the attacker is present. Keywords – Commitment scheme, Network Protocols, Packet hiding methods, Real time packet classification and Selective jamming attacks. ——————————  —————————— 1. INTRODUCTION The faster accessibility, compatibility and connectivity between different users is provided by wireless network. Various types of attacks are invited because of the sharing medium of wireless network and it also provides it provide additional features. The adversaries with internal knowledge of network secrets take more effort on jamming the network or decrease the network performance [1], [2]. Anyone which has transceiver can easily inject spurious messages or create noise or interference or produce jamming attack in an ongoing transmission or block the transmission of legitimate users .In the simplest form, the attacker classifies first few bytes of transmitted packet and destroy the message Attacker must have knowledge about each layer of the TCP protocol. The actual format for frame in wireless Figure 1: Generic frame format for wireless network. A.Motivation The motivation for proposed solution lies in problem with sharing nature of wireless network [1]. Sometimes in the prevention of packet hiding methods in selective jamming attack the how many packet are loss or send to destination. For that purpose the packet hiding methods are detected the packet hiding method are strong packet hiding method ,puzzle hiding ,all-or-nothing transformation, to Overcome the disadvantage of this method we have proposed packet hiding without packet loss method. Available online at: www.ijcert.org
  • 2. Shital Patil et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 194-196 © 2016, IJCERT All Rights Reserved Page | 195 B. Problem Definition Because of sharing nature Of wireless network the various jamming attack are occurred and the wireless medium provides various challenging features. Because of internal knowledge of network and its secrets the jamming attack in which jammer attacks the importance message .We propose the packet hiding scheme without packet loss. In PHSPL, the data is send to the selective host and packets are sending with Header, Sequence ID and host name . Consider in given figure. Node A and B communicates with wireless network. Both A and B there is a jamming Node and communicated with each other. Node j classifies m by receiving only the first few Bytes of m when node A transfer the packet from m to node B, With the reception at B the J corrupts m beyond recovery by interfering in jamming node . We address the problem of preventing the jamming node from classifying m in real time, thus mitigating J’s ability to perform selective jamming. Our goal is to transform a selective host note that in the present work, based on protocol semantics we do not address packet classification methods. Fig 2. Realization of a selective jamming attack 2. RELATED WORK In related work, we are studying the reasons for jamming, spread spectrum techniques used by the conventional systems and the disadvantages of existing system, prevention mechanism they used and at the last we are studying how the real time packet classification is performed and strong hiding commitment scheme which is used by our proposed system. Because of jamming, the wireless network either stopped or disturbed. Noise, collision, interference these are various forms of jamming. Jamming may be performed intentionally or unintentionally, depending upon either performing attack or due to network load. There is no need of special hardware to execute these attacks only knowledge of preserved information is required. 2.1. STRONG HIDING COMMITMENT SCHEME (SHCS) In prevention of packet hiding methods in selective jamming attack, A strong hiding commitment scheme (SHCS) is one of technique , and which is based on symmetric cryptography. Assume that the sender has a packet for sending to Receiver. First, the sender S constructs message and the commitment function is an off-the-shelf symmetric encryption algorithm is a publicly known permutation, and k is a randomly selected key of some desired key length s. Both the sender and receiver are randomly selected key and send the packet to destination. 2.2. CRYPTOGRAPHIC PUZZLE HIDING SCHEME In cryptographic puzzle scheme the sender S has a packet m for transmission. The sender selects a random key k, of a desired length for sending packet to the receiver. Sender S generates a puzzle (key, time), where puzzle () denotes the puzzle generator function, and the time required for the solution of the puzzle. After generating the puzzle P, the sender broadcasts the puzzle. At the receiver side, any receiver R solves the received puzzle to recover key and then computes. 2.3. ALL-OR-NOTHING TRANSFORMATION The packets are pre-processed by an All-or-nothing transformation (AONT) before transmission of all packet but remain packet are unencrypted. The attacker cannot perform packet classification until all pseudo-messages corresponding to the original packet have been received and then the packet transformation has been applied in inverse way. Packet m is partitioned to a set of x input blocks m = {m1, m2, m3….}, which serve as an input to a set of pseudo- messages m = {m1, m2, m3…} is transmitted over the wireless medium. 3. PROPOSED SYSTEM In prevention of packet hiding methods in selective jamming attack proposed system gives brief
  • 3. Shital Patil et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 194-196 © 2016, IJCERT All Rights Reserved Page | 196 introduction along with its benifits .The packet hiding without packet loss scheme gives better solution for jamming. for that packets are sending with Header, Sequence ID and host name and the data is send to the destination host. That’s why the packet loss is minimum. So the sender and receiver can communicate with each other securely.in packet hiding without packet loss all the information about packet and data is in the header of packet. The PHSPL is more effective over other real time classification methods. There are some advantages of proposed system- Very easy for exploiting knowledge from compromised nodes. The proposed system gives selective jamming attack to DOS with very low effort and this is another advantage of. By using proposed system strong security protocols are achieved. 4. ACTUAL IMPLEMENTATION In prevention of packet hiding methods in selective jamming attack we uses the Network Simulator 2.34 tool in which front end is tcl and back end is c++. Here are two protocols are used. TCP and AODV protocol and TCP is used for establishing the connection and AODV routing protocol is used for finding routing path for data packets. The transmission rate is 11Mbps for every link. But due to flooding feature of AODV the random attacker fails in disturbing route path. The continuous, random, targeted RREQ the attacker are kept between the communicated pairs.  Using AODV the Implementation of wireless node in NS-2.  Implementation of jamming attack with selective transmission.  In wireless network the Implementation of packet classification is done.  Implementation of packet hiding for real packet.  Detection of jamming attack and analysis with throughput. 5. CONCLUSION In this paper, the prevention of packet hiding methods in selective jamming attacks generated a problem in LAN or wireless networks. Attacker attacks the importance message because of internal knowledge of network and its secrets. We quantified the effectiveness of packet and analysed the security of packet hiding schemes. We propose the packet hiding scheme without packet loss (PHSPL) in which the packet loss is minimum and the sender and receiver can communicate with each other securely. All the information about packet and data is in the header of packet. The PHSPL is more effective over other real time classification methods. So the sender and receiver can communicate securely. Fig 3: Throughput for packet hiding without packetloss scheme. REFERENCES 1. P. Tague, M. Li, and R. Poovendran., ―Mitigation of control channel, jamming under node capture attacks‖. IEEE Transactions on Computing, 8(9):1221–1234, 2009. 2. T. X. Brown, J. E. James, and A. Sethi.‖ Jamming and sensing of Encrypted wireless ad hoc networks‖. In Proceedings of MobiHoc, pages 120–130, 2006. 3. L. Lazos, S. Liu, and M. Krunz. ―Mitigating control- channel jamming attacks in multi-channel ad hoc networks‖. In Proceedings of the 2nd ACM conference on wireless network security, pages 169–180, 2009. 4. O Goldreich. Foundations of cryptography: Basic applications, Cambrige University press 2005. 5. Damgard. ―Commitment schemes and zero knowledge protocols‖, 6. Lecture notes in computer science, 1561:63-86. 7. Dilip Kumar D.P 1, H.Venugopal2. ―Avoiding selective jam attack 8. by packet hiding method in wireless sensor network‖. 9. G. Noubir and G. Lin. ―Low power DoS attacks in data wireless 10.LANs and countermeasures‖, ACM SIGMOBILE Mobile computing.