Jamming Attack Detection using Key Exchange in Wireless Network

نویسندگان

  • S. Rajeswari
  • R. Maheswari
چکیده

-The effort of this article is regarding to detect jamming attacks in wireless networks. The Jamming detection and techniques have been proposed in the journalism. They established results by the authors are often CA and JADE as most of the jamming regions are closely marked, and they do not help to clearly differentiate jamming mechanisms. We explore a different jamming attack by discovering the relationship between five parameters. Packet delivery ratio, Total-messagesize, Probability detection, Energy, End-To-End Delay and we are using JADE Method for indentifying malicious node. This proposed system used to find out the jamming attack by JADE Method and we used to protect our data by using Multi Key Generation algorithm. Jamming Attack Detection based on Estimation (JADE) scheme and establishes the hacker. Multi Key Generation techniques have been proposed in the journalism and it will be explained using through the encryption and decryption multiple key pairs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Random Key Pre-Distribution Techniques against Sybil Attacks

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

متن کامل

Cognitive Radio Based Jamming Resilient Multi-channel MAC Protocol for Wireless Network

Radio jamming attack is the most effective and easiest Denial-of –Service (DOS) attack in wireless network. In this paper, we proposed a multi-channel MAC protocol to mitigate the jamming attacks by using cognitive radio. The Cognitive Radio (CR) technology supports real-time spectrum sensing and fast channel switching. By using CR technologies, the legitimate nodes can perform periodic spectru...

متن کامل

Improving Reliability of Jamming Attack Detection in Ad hoc Networks

Defense against denial of service (DoS) attacks is a critical component of any security system as these attacks can affect the availability of a node or an entire network. In this work, we focus on jamming type DoS attacks at the physical and MAC layers in 802.11 based ad hoc networks. Collisions in wireless networks occur due to varying factors such as jamming attacks, hidden terminal interfer...

متن کامل

Detection of man-in-the-middle attacks using physical layer wireless security techniques

In a wireless network environment, all the users are able to access the wireless channel. Thus, if malicious users exploit this feature by mimicking the characteristics of a normal user or even the central wireless access point (AP), they can intercept almost all the information through the network. This scenario is referred as a Man-in-the-middle (MITM) attack. In the MITM attack, the attacker...

متن کامل

Develop a scanning algorithm for the detection of selfish nodes in cognitive radio networks

Cognitive radio is a wireless based communication technology which has intelligence built into it. Secure communication is a key for any wireless network . Like all other networks, cognitive radios are susceptible to various kinds of attacks like DOS attack , PUE attack , tunnel attack and jamming attack . While performing these attacks nodes in the network becomes selfish and start maximizing ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016