Intelligent Encoding of Packets Against Jamming Attacks in Wireless Network
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 1
Abstract
Wireless network never has certain limited boundaries that can’t be extended due to this nature security flaws may get developed. When someone breaks into wireless network system that person takes advantage of lapses in technology procedure and management allowing unauthorized access The open nature of wireless medium leaves some security flaws for intentional attacks may be called as jamming attacks Jamming can be viewed as form as DOS attacks whose challenge is to stop unauthorized access to related data So to retain controls with authorized persons besides giving them to illegal users we need security so we implemented drives to hide data packets while transferring into network illustrated Wireless network is still a challenging field related to security implementation . Due to boundary less nature of wireless network can provide maximum services Due to open nature of wireless network it become fertile area for attackers operate destructive behavior. Jamming are the many exploits used to compromise the wireless network In wireless network it is challenge to stop Denial of service attack Because it can be result of intentional interference active in wireless transmission Adversaries who are part of system can create attack easily with their internal knowledge of protocol details In our practice we are encountering the problem of jamming attacks in wireless network as the time period of adversary is very small they target only important message so to completely degrade the power of the attack we applied three crypto system drives which prevent packet classification.
Authors and Affiliations
pradip ravaji ugale, Ms. Hemlata Sunhare, Mr. Sachin Patel
Detecting Network And Application Layer Attacks in Networks
Distributed Denial of Service (DDoS) flooding attacks are launched by attackers disturbing server services as well as Individual users who are active in internet.espicially attackers are targeting network Transport l...
Data Possession Of Multiple Replicas Across The Distributed Storage System By Third Party Auditor
Cloud computing has four models as Public cloud through which the service is obtainable to all public use. Private cloud through which service is accessible to private enterprise or organization. Community Cloud perm...
An Effective Cost Optimization for Thickness Measurement of Metallic Plates
A sensor is a device which receives and responds to a signal when touched. A sensor's sensitivity indicates how much the sensor's output changes when the measured quantity changes. It measures a physical quantity and...
Design Of Ring Topology Using Set Of Node
This is a simple and scalable novel network-onchip (NoC) based on the ring concept. The reported prototype design is generic with respect to the number of nodes and data channels. Topology efficiently exploits the ava...
Optimum Loss Allocation in Radial Distribution Systems
In this paper, the proposed method has the advantage that no assumptions are made in the allocation of real power losses as opposed other algorithms available in the literature. A detailed comparison of the real loss...