Abstract
In real world, wireless medium is widely used among various military agents and companies. It provides various challenging features such as
Its faster accessibility among wide set of users, but it is fragile by intentional interference attacks from internal adversary. These attacks can be easily launched by sending continuous radio signals or several short pulses. External adversaries can be easily found out. But internal adversaries are difficult to detect and prevent. To prevent these attacks various cryptographic schemes are implemented. In this paper, in order to overcome drawbacks of existing systems we propose a strong security scheme that prevents the safe transmission among communicated nodes although the jammer is present.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Xu, W., Wood, T., Trappe, W., Zhang, Y.: Channel surfing and spatial retreats: Defenses against Wireless denial of service. In: Proc. Third ACM Workshop Wireless Security, pp. 80–89 (2004)
Xu, W., Trappe, W., Zhang, Y., Wood, T.: The feasibility of launching and detecting jamming attack in wireless network. In: Proc. ACM Int’l Symposium. Mobile Ad-Hoc Networking and Computing (Mobi-Hoc), pp. 46–57 (2005)
Lazos, L., Liu, S., Krunz, M.: Mitigating Control-Channel Jmming Attacks in Multi-channel Wireless Ad Hoc Networks. In: 2nd ACM Conference on Wireless Network Security (WiSec 2009) (2009)
Simon, M.K., Omura, J.K., Schotlz, R.A., Levitt, B.K.: Spread spectrum communications Handbook. McGraw-Hill (2001)
Popper, C., Strasser, M., ÄŒapkun, S.: Jamming-Resistant Broadcast communication without shared keys. In: Proc. USENIX Security Symposium (2009)
Proano, A., Lazos, L.: Packet-Hiding Methods for Preventing Selective Jamming Attacks. IEEE Transactions on Dependable and Secure Computing (TDSC) 9(1), 101–114 (2012)
Juels, A., Brainard, J.: Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks. Springer, Heidelberg (1999)
Rivest, R.L.: All-or-nothing encryption and the package transform. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 210–218. Springer, Heidelberg (1997)
Desmedt, Y.: Broadcast Anti-jamming Systems. Computer Networks 35(2/3), 223–236 (2001)
Stinson, D.: Cryptography: Theory and practice. CRC Press (2006)
Manojkumar, K., Vinothkumar, M., Tholkappia Arasu, G.: An Analysis on Denial of Service attacks and packet defending methodologies in wireless sensor network. International Journal of Advanced Research in Computer Science and Software Engineering 2(11) (November 2012)
Dilip Kumar, D.P., Venugopal, H.: Avoiding selective jam attack by packet hiding method in wireless sensor network. International Journal of Science and Research (IJSR)Â 2(6) (June 2013)
Thamilarasu, G., Mishra, S., Shridhar, R.: Improving reliability of jamming attack detection in Ad hoc networks. IJCNISÂ 3(1) (April 2011)
Sodagari, S., Clancy, T.C.: Efficient jamming attack on MIMO channels. In: IEEE International Conference on Communications (ICC), VA,USA, pp. 1550–3607 (2012) ISSN :1550-3607
Damgård, I.B.: Commitment schemes and zero-knowledge protocols. In: Damgård, I.B. (ed.) Lectures on Data Security. LNCS, vol. 1561, pp. 63–86. Springer, Heidelberg (1999)
Noubir, G., Lin, G.: Low power DoS attacks in data wireless LANs and countermeasures. ACM SIGMOBILE Mobile Computing and Communications Review 7(3), 29–30 (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Gavali, S., Gavali, A., Limkar, S., Patil, D. (2015). Packet Hiding a New Model for Launching and Preventing Selective Jamming Attack over Wireless Network. In: Satapathy, S., Biswal, B., Udgata, S., Mandal, J. (eds) Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014. Advances in Intelligent Systems and Computing, vol 327. Springer, Cham. https://doi.org/10.1007/978-3-319-11933-5_21
Download citation
DOI: https://doi.org/10.1007/978-3-319-11933-5_21
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11932-8
Online ISBN: 978-3-319-11933-5
eBook Packages: EngineeringEngineering (R0)