Selected Approach for Hiding the Packets from Jamming Attacks
Abstract
Jamming attacks are much harder to encounter and have more security problems. They have been shown to actualize severe Denial-of-Service (DoS) attacks in opposition to wireless networks. In the easiest form of jamming, the adversary interferes with the function of messages by broadcasting a constant jamming signal, or many short jamming pulses. Jamming attacks have been measured under an external threat model, wherein the jammer is not part of the network. Under this model, jamming policies include the continuous or casual broadcast of high power interference signals. The nodes to be operate in the conventional relay mode and a number of midway nodes to be broadcasted the signal. The impact of selective jamming attacks is on network protocols like TCP and routing. A selective jammer can considerably impact performance with extremely low effort. We build up three schemes that broadcast a selective jammer to a random one by avoiding real-time packet categorization.
Keywords: Selective Jamming, Denial-of-Service, Wireless Networks, Packet Classification
Full Text:
PDFDOI: https://doi.org/10.26483/ijarcs.v5i2.2020
Refbacks
- There are currently no refbacks.
Copyright (c) 2016 International Journal of Advanced Research in Computer Science

