Packet Hiding Techniques for Jamming Attacks

Authors

  • V .Divya
  • Dr.K.R.Radhika

DOI:

https://doi.org/10.29027/IJIRASE.v4.i3.2020.681-685

Keywords:

Jamming attack, , wireless Local area networks, jammed networks, Encryption methods, packets, Wireless

Abstract

Wireless local area network has a proliferation of nature leads to a very dangerous intrusion attack, known as Jamming. This Intrusion attack uses wireless technologies as a medium to launch Denial of service attack over these vulnerable networks. The recently jamming attack has been referred to as a very risky attack model. However, experts have been working on these security protocols. Although challengers with interior information and data privacy can execute a jamming attack which is hard to analyze, detect and protect. In this project, we have worked on particular problems of jamming attack in WLAN. In these jammed networks the attackers are active only for some time till the attack is planned as per the level of importance of the data/message shared and according to that attack will be executed. Here we have demonstrated a particular jamming attack by executing real-time packet transmission at the physical layer, to diminish these issues we have established three encryption methods of the physical layer characteristics for preventing from jamming attack. We examine the safety of the encryption hidden techniques and asses algorithmic and transmission overheads.

Author Biographies

V .Divya

Department of ISE, B.M.S College of Engineering,
Bangalore, under VTU, Belagavi, India

Dr.K.R.Radhika

Department of ISE, B.M.S College of Engineering,
Bangalore, under VTU, Belagavi, India

Additional Files

Published

15-09-2020