Abstract

Although encryption is used to protect data from being read by unintended recipients it still does not ensure complete safeness. The reason being that information can be gathered by an eavesdropper by indirect inferences like packet classification and traffic analysis. Thus our aim is to protect the header from being read by selective insider jammers. In such a scenario where we have a selective insider jammer who is active only for a period of time, protecting the header information should be given higher priority as these adversaries classify the packets using first few bits from the header fields and add bit errors to the packet if it is an important one. Header information can be protected using modified anonymous routing scheme where we employ multiple level of encryption of the packet to prevent the adversary from classifying the packet using the header information.

Highlights

  • The major threat to wireless network is Denial of Service attack

  • When the adversary is an insider compromised node who is aware of the network secrets and protocol semantics, the vulnerability is more

  • Header information can be protected using modified anonymous routing scheme where we employ multiple level of encryption of the packet to prevent the adversary from classifying the packet using the header information

Read more

Summary

INTRODUCTION

The major threat to wireless network is Denial of Service attack. An adversary can target on the communication of the nodes and can attempt to create an attack to prevent the efficient communication. Internal attacks, which are launched from compromised nodes, are more sophisticated in nature These attacks exploit knowledge of network secrets and protocol semantics to selectively and adaptively target critical network functions. When the adversary is an insider compromised node who is aware of the network secrets and protocol semantics, the vulnerability is more In such a scenario where we have a selective insider jammer who is active only for a period of time, protecting the header information should be given higher priority as these adversaries classify the packets using first few bits from the header fields and add bit errors to the packet if it is an important one. It targets messages of high importance like control packets. The adversary can physically compromise network devices and can recover stored information including cryptographic keys, PN codes, etc

RELATED WORK
RESULT
Findings
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.