Volume : 2, Issue : 11, November - 2013

Packet–Hiding Methods for Detection and prevention of congestion attacks In Selective Jamming

K. Gajendran, Balamurugan. D

Abstract :

In this article, we consider the problem of jamming–aware source routing and avoiding jamming by spliting data rate. The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launchpad for mounting Denial of–Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. We addressed the problem of selective jamming attacks in wireless networks. We considered an internal adversary model in which the jammer is part of the network under attack, thus being aware of the protocol specifications and shared network secrets. We showed that the jammer can classify transmitted packets in real time by decoding the first few symbols of an ongoing transmission. We evaluated the impact of selective jamming attacks on network protocols such as TCP and routing. Our findings show that a selective jammer can significantly impact performance with very low effort. We developed three schemes that transform a selective jammer to a random one by preventing real–time packet classification. Our schemes combine cryptographic primitives such as commitment schemes, cryptographic puzzles, and all–or–nothing transformations with physical–layer characteristics. We analyzed the security of our schemes and quantified their computational and communication overhead.

Keywords :


Cite This Article:

K.Gajendran, Balamurugan. D / Packet-Hiding Methods for Detection and prevention of congestion attacks In Selective Jamming / Global Journal For Research Analysis, Vol:2, Issue:11 November 2013


Article No. : 1


Number of Downloads : 1


References :