Averting Selective Jamming Attacks Using Packet-Hiding Techniques

Download Now
Provided by: International Journal of Advanced Research in Computer Engineering & Technology
Topic: Networking
Format: PDF
The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. Anyone with a transceiver can eavesdrop on wireless transmissions, inject spurious messages or jam legitimate ones. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. The problem of selective jamming attacks in wireless networks is to be considered as the key aspect during the packet delivered from source to destination. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance the advantages of selective jamming in terms of network performance degradation can be classified into two different types such as by selective attack on TCP and one on routing.
Download Now

Find By Topic