Skip to main content
Article
Encryption Techniques in Packet Hiding Methods to Prevent Jamming Attacks in Wireless Network
IJCSIT (2014)
  • Rashmi B. Dhamannavar
  • Dr. Rashmi M. Jogdand
Abstract
Wireless Networks are becoming an increasingly important technology that is bringing the world closer together. In this type of network environment there could be more chances of attacks. The packets cannot be easily transferred over the network. It affects network performance degrade. While eavesdropping and message injection can be prevented using cryptographic methods, jamming attacks are much harder to counter. They have been shown to actualize severe Denial-of-Service (DoS) attacks against networks. In Simplest form adversary blocks the packets that are transmitted over wireless network. Typically, jamming attacks has been considered under an external threat model, in which the jammer is not part of the network. To overcome the above problem of network traffic and performance in this paper we have considered a packet hiding methods that can be securely transmit packets over the network. We are addressing the problem of jamming attacks under internal threat model and two schemes are proposed that prevent real-time packet classification of packets by combining hiding scheme based on cryptographic primitives.
Keywords
  • Selective Jamming,
  • Denial-of-Service,
  • Wireless Networks,
  • Packet Classification
Publication Date
August, 2014
Publisher Statement
References

Alejandro Proan˜o and Loukas Lazos,” Packet-Hiding Methods for Preventing Selective Jamming Attacks”, ieee transactions on dependable and secure computing, vol. 9, no. 1, january/february 2012

Singh, Kirat Pal, Shivani Parmar, and Dilip Kumar. "Design of High Performance MIPS Cryptography Processor." International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness. Springer Berlin Heidelberg, 2013.

G. Noubir and G. Lin. Low-power DoS attacks in data wireless lans and countermeasures. Mobile Computing and Communications Review,7(3):29–30, 2003.

M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. Levitt. Spread Spectrum Communications Handbook. McGraw-Hill, 2001.
Y. Desmedt. Broadcast anti-jamming systems. Computer Networks,35(2-3):223–236, February 2001

M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. Levitt. Spread Spectrum Communications Handbook. McGraw-Hill, 2001.

T. X. Brown, J. E. James, and A. Sethi. Jamming and sensing of encrypted wireless ad hoc networks. In Proceedings of MobiHoc, pages120–130, 2006.

M. Cagalj, S. Capkun, and J.-P. Hubaux. Wormhole-based antijamming techniques in sensor networks. IEEE Transactions on Mobile Computing, 6(1):100–114, 2007.

L. Lazos, S. Liu, and M. Krunz. Mitigating control-channel jamming attacks in multi-channel ad hoc networks. In Proceedings of the 2ndACM conference on wireless network security, pages 169–180, 2009.
Citation Information
Rashmi B. Dhamannavar and Rashmi M. Jogdand. "Encryption Techniques in Packet Hiding Methods to Prevent Jamming Attacks in Wireless Network" IJCSIT (2014)
Available at: http://works.bepress.com/sakshi-sharma/5/
Creative Commons license
Creative Commons License
This work is licensed under a Creative Commons CC_BY-NC International License.