Jamming Attack Detection and Evaluating Using Wireless Application

Download Now
Provided by: Auricle Technologies
Topic: Enterprise Software
Format: PDF
When data is transferred from one host to another host, attacker may try to attack the packet or data which is in transit. In order to avoid such kind of attack in time critical wireless application and delivery message securely in wireless application. In this paper, the authors aim at modeling and detecting jamming attacks against time-critical wireless networks. To measure network performance, packet loss and throughput metrics are used. To quantify the performance of time-critical applications, message invalidation ratio metric are used.
Download Now

Find By Topic