AONT - Based Packet Hiding Method for Preventing Jamming Attacks
نویسنده
چکیده
Wireless networks now enjoy widespread commercial implementation because of their ease of use, low cost and setup. However, since accessing wireless media is much easier than tapping a wired network, then security becomes a serious concern when implementing any wireless network. We consider a particular class of Denial of Service (DoS) attacks called jamming attacks. In the simplest form of jamming, the attacker interferes with the reception of messages by transmitting a continuous jamming signal, or several short jamming pulses. Jamming results in the loss of link reliability, increased energy consumption, extended packet delays and disruption of end-to-end routes. The use of distinct, dedicated communication links to transmit data and control traffic introduces a single point of failure for a denial of service attack, in that an adversary may be able to jam control channel traffic and prevent relevant data traffic. To prevent such jamming attacks, in this paper we propose a packet hiding method based on allornothing transforms (AONT).
منابع مشابه
Packet-Hiding Methods for Preventing Selective Jamming Attacks
The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of p...
متن کاملPacket Hiding Scheme without Packet Loss (PHSPL) for defensive against Jamming Attack
Normally wireless average greeneries leaves it vulnerable to deliberate intrusion attacks, referred to as jamming. Wireless sensor networks are based on shared medium which makes easy for opponent to conduct radio interference, or jamming, attacks that effectively cause a denial of service on transmitting and receiving functionalities. Typically, jamming has been addressed as a threat model. In...
متن کاملGPS Jamming Detection in UAV Navigation Using Visual Odometry and HOD Trajectory Descriptor
Auto-navigating of unmanned aerial vehicles (UAV) in the outdoor environment is performed by using the Global positioning system (GPS) receiver. The power of the GPS signal on the earth surface is very low. This can affect the performance of GPS receivers in the environments contaminated with the other source of radio frequency interference (RFI). GPS jamming and spoofing are the most serious a...
متن کاملA New Vision-Based and GPS-Signal-Independent Approach in Jamming Detection and UAV Absolute Positioning Assessment
The Unmanned Aerial Vehicles (UAV) positioning in the outdoor environment is usually done by the Global Positioning System (GPS). Due to the low power of the GPS signal at the earth surface, its performance disrupted in the contaminated environments with the jamming attacks. The UAV positioning and its accuracy using GPS will be degraded in the jamming attacks. A positioning error about tens of...
متن کاملSelective Jamming Attack Prevention Based on Packet Hiding Methods and Wormholes
The wireless networks are more sensitive to the Denial-of-Service (DoS) attacks. The existing system is based on Spread Spectrum (SS). This technique mainly focuses on an external threat model. In wireless network the communications between nodes take place through broadcast communication. That is why, if an attacker present within the network can easily eavesdrop the message sent by any node. ...
متن کامل