Packet Hiding Scheme without Packet Loss (PHSPL) for defensive against Jamming Attack
نویسنده
چکیده
Normally wireless average greeneries leaves it vulnerable to deliberate intrusion attacks, referred to as jamming. Wireless sensor networks are based on shared medium which makes easy for opponent to conduct radio interference, or jamming, attacks that effectively cause a denial of service on transmitting and receiving functionalities. Typically, jamming has been addressed as a threat model. In this work, we illustrate the impact of selective jamming on the network performance by illustrating various selective attacks in wireless networks. In these attacks, the intruder attacks on the network for a short period of time, selectively directing messages of high importance. To overcome these attacks, we studied existing three schemes& proposed work (PHSPL) that prevents the attacker from attacking the packets. Then we evaluate the security of all schemes. Keywords—PHSPL, DOS attacks, selective jamming, WSN.
منابع مشابه
AONT - Based Packet Hiding Method for Preventing Jamming Attacks
Wireless networks now enjoy widespread commercial implementation because of their ease of use, low cost and setup. However, since accessing wireless media is much easier than tapping a wired network, then security becomes a serious concern when implementing any wireless network. We consider a particular class of Denial of Service (DoS) attacks called jamming attacks. In the simplest form of jam...
متن کاملSelective Jamming Attack Prevention Based on Packet Hiding Methods and Wormholes
The wireless networks are more sensitive to the Denial-of-Service (DoS) attacks. The existing system is based on Spread Spectrum (SS). This technique mainly focuses on an external threat model. In wireless network the communications between nodes take place through broadcast communication. That is why, if an attacker present within the network can easily eavesdrop the message sent by any node. ...
متن کاملProfile based Novel Approach for Jamming Attack Detection and Prevention in MANET
The current progression and communication in the corporate, military and industrial sectors. Nevertheless, these progressions have likewise brought new security vulnerabilities. The uses of the security methods of wired systems, for example, access control and confirmation/authentication have been unsuitable to wireless network because of the extraordinary features of such networks, for example...
متن کاملIMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملA two-phase wormhole attack detection scheme in MANETs
Mobile ad-hoc networks (MANETs) have no fixed infrastructure, so all network operations such as routing and packet forwarding are done by the nodes themselves. However, almost all common existing routing protocols basically focus on performance measures regardless of security issues. Since these protocols consider all nodes to be trustworthy, they are prone to serious security threats. Wormhole...
متن کامل