Open Access Open Access  Restricted Access Subscription or Fee Access

An Analysis of Packet Hiding Methods

L. Sheeba, Dr.V.S. Meenakshi

Abstract


The nature of the network medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming.  This intentional interference of transmissions can be used as a launch pad for mounting Denial-of-Service attacks on networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. Here illustrate the advantages of selective jamming in terms of network performance degradation. To mitigate these attacks, these works simulate two schemes that prevent real-time packet classification by combining cryptographic primitives with mac-layer attributes. Theresults and analyze of this method and evaluate their computational and best hiding method.


Keywords


Selective Jamming, Denial-of-Service, Packet Classification.

Full Text:

PDF

References


T. X. Brown, J. E. James, and A. Sethi. Jamming and sensing of encrypted wireless ad hoc networks. In Proceedings of MobiHoc, pages 120–130, 2006.

B. Thapa, G. Noubir, R. Rajaramanand, and B. Sheng. On the robustness of IEEE802.11 rate adaptation algorithms against smart jamming. In Proceedings of WiSec, 2011.

M. Wilhelm, I. Martinovic, J. Schmitt, and V. Lenders. Reactive jamming in wireless networks: How realistic is the threat? In Proceedings of WiSec, 2011.B. Thapa, G. Noubir, R. Rajaramanand, and B. Sheng. On the robustness of IEEE802.11 rate adaptation algorithms against smart jamming. In Proceedings of WiSec, 2011.

Capkun, and J.-P. Hubaux. Wormhole-based anti-jamming techniques in sensor networks. IEEE Transactions on Mobile Computing, 6(1):100–114, 2007.

A. Chan, X. Liu, G. Noubir, and B. Thapa. Control channel jamming: Resilience and identification of traitors. In Proceedings of ISIT, 2007.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.