Abstract
Although encryption is used to protect data from being read by unintended recipients it still does not ensure complete safeness. The reason being that information can be gathered by an eavesdropper by indirect inferences like packet classification and traffic analysis. Thus our aim is to protect the header from being read by selective insider jammers. In such a scenario where we have a selective insider jammer who is active only for a period of time, protecting the header information should be given higher priority as these adversaries classify the packets using first few bits from the header fields and add bit errors to the packet if it is an important one. Header information can be protected using modified anonymous routing scheme where we employ multiple level of encryption of the packet to prevent the adversary from classifying the packet using the header information.
Highlights
The major threat to wireless network is Denial of Service attack
When the adversary is an insider compromised node who is aware of the network secrets and protocol semantics, the vulnerability is more
Header information can be protected using modified anonymous routing scheme where we employ multiple level of encryption of the packet to prevent the adversary from classifying the packet using the header information
Summary
The major threat to wireless network is Denial of Service attack. An adversary can target on the communication of the nodes and can attempt to create an attack to prevent the efficient communication. Internal attacks, which are launched from compromised nodes, are more sophisticated in nature These attacks exploit knowledge of network secrets and protocol semantics to selectively and adaptively target critical network functions. When the adversary is an insider compromised node who is aware of the network secrets and protocol semantics, the vulnerability is more In such a scenario where we have a selective insider jammer who is active only for a period of time, protecting the header information should be given higher priority as these adversaries classify the packets using first few bits from the header fields and add bit errors to the packet if it is an important one. It targets messages of high importance like control packets. The adversary can physically compromise network devices and can recover stored information including cryptographic keys, PN codes, etc
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.