Selected Approach for Hiding the Packets from Jamming Attacks

Main Article Content

P. Raju
R. Shiva Shankar, M. Chilakarao


Jamming attacks are much harder to encounter and have more security problems. They have been shown to actualize severe Denial-of-Service (DoS) attacks in opposition to wireless networks. In the easiest form of jamming, the adversary interferes with the function of messages by broadcasting a constant jamming signal, or many short jamming pulses. Jamming attacks have been measured under an external threat model, wherein the jammer is not part of the network. Under this model, jamming policies include the continuous or casual broadcast of high power interference signals. The nodes to be operate in the conventional relay mode and a number of midway nodes to be broadcasted the signal. The impact of selective jamming attacks is on network protocols like TCP and routing. A selective jammer can considerably impact performance with extremely low effort. We build up three schemes that broadcast a selective jammer to a random one by avoiding real-time packet categorization.

Keywords: Selective Jamming, Denial-of-Service, Wireless Networks, Packet Classification


Download data is not yet available.

Article Details