International Journal of Advanced Research in Computer Engineering & Technology
The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. Anyone with a transceiver can eavesdrop on wireless transmissions, inject spurious messages or jam legitimate ones. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. The problem of selective jamming attacks in wireless networks is to be considered as the key aspect during the packet delivered from source to destination. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance the advantages of selective jamming in terms of network performance degradation can be classified into two different types such as by selective attack on TCP and one on routing.