Provided by:
International Journal of Reviews on Recent Electronics and Computer Science (IJRRECS)
Topic:
Security
Format:
PDF
Jamming attacks might be sighted as an extraordinary case of Denial of service attacks. In recent times, quite a lot of alternative jamming schemes were demonstrated. Jamming attacks in general were measured under representation of external threat, in which they transmits constant or random high power interference signals; however these types of strategies contain quite a lot of disadvantages. In this paper, the authors consider jamming attacks under a representation of internal threat. Selective jamming attacks are comparatively simple to actualize by using knowledge of network protocols as well as cryptographic primitives that are extracted from compromised nodes.