International Journal of Emerging Technology and Advanced Engineering (IJETAE)
In wireless network, the authors will not limit the boundaries of network because it makes vulnerable association among the users. This vulnerable network will be used for generation of denial of service attacks thus this permits the attackers to form electronic counter measures attacks in wireless network thus it's troublesome to observe and counter. In this paper, they have a tendency to address the matter of electronic jamming attacks will be pierce by acting time period packet classification at the physical layer. To avoid such sort of attacks they have a tendency to develop completely different themes that forestall Packet classification at real time by exploitation combination of cryptographical scheme with physical layer attributes.