Hiding Packets from the Attacker by using Cryptographic Methods

Download Now
Provided by: International Journal of Engineering Trends and Technology
Topic: Security
Format: PDF
The open nature of the wireless medium leaves an intentional interference attacks referred as Jamming. Jamming is used to compromise the wireless environment. The selective jamming attacks can be launched by performing real-time packet classification at physical layer. It may also be measurable from the access point, where network management should be able to effectively report noise of transmit channel in reaction of wireless network. Typically, jamming has been addressed under an internal threat model of jamming attacks in wireless network.
Download Now

Find By Topic