A Medial node based privacy approaches for preventing selective jamming in wireless networks
Wireless networks is still an emerging field in terms of security. Taking advantage from unreliability nature of wireless medium, antagonists can easily accomplish numerous attacks. Among those attacks, selective jamming is more clever technique in which jammer will target and corrupt only the messa...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 6 |
---|---|
container_issue | |
container_start_page | 1 |
container_title | |
container_volume | |
creator | Raju, Bksp Kumar Rao, R. Rajeswara |
description | Wireless networks is still an emerging field in terms of security. Taking advantage from unreliability nature of wireless medium, antagonists can easily accomplish numerous attacks. Among those attacks, selective jamming is more clever technique in which jammer will target and corrupt only the messages of high importance. There are existing methods to prevent selective jamming in internal threat model like strong hiding commitment scheme(SHCS), cryptographic puzzle hiding scheme(CPHS) in which they focused only on the correct message delivery to the receiver node. But on the other side, jammer node can solve the puzzle by taking entire packet, making the adversary to know the secured message that was transmitted. Initially, a mechanism to identify the existence of selective jamming is demonstrated. Later, a solution to know the exact node that is performing selective jamming is derived. Then two novel techniques called Embedding Future Key (EFK) and Medial node Method (MNM) are proposed to prevent selective jamming. Finally, experiments are conducted on proposed methods and it is established that better throughput is achieved than the existing methods. |
doi_str_mv | 10.1109/ISPCC.2013.6663439 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6663439</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6663439</ieee_id><sourcerecordid>6663439</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-15cf67cc11e87d4ad5f91e30b2001cb599e17f4b81a0ef50e9975823c4b44cc93</originalsourceid><addsrcrecordid>eNotkMtKxDAYRuNCUMa-gG7yAq35mzRplkPxMjCi4CyFIU3_aMbeSEqHeXsrM6sPzuLjcAi5B5YBMP24-fyoqixnwDMpJRdcX5FEqxKEVFxCWbIbksR4YIyBkgoU3JKvNX3DxpuW9kODtDYRGzoGPxt7omYcw2DsD0bqhrBgnLGffP9NI7ZoJz8jPZiu-ye-p0cfFhwj7XE6DuE33pFrZ9qIyWVXZPf8tKte0-37y6Zab1Ov2ZRCYZ1U1gJgqRphmsJpQM7qfPG0daE1gnKiLsEwdAVDrVVR5tyKWghrNV-Rh_OtR8T9It-ZcNpfEvA_utNTQQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A Medial node based privacy approaches for preventing selective jamming in wireless networks</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Raju, Bksp Kumar ; Rao, R. Rajeswara</creator><creatorcontrib>Raju, Bksp Kumar ; Rao, R. Rajeswara</creatorcontrib><description>Wireless networks is still an emerging field in terms of security. Taking advantage from unreliability nature of wireless medium, antagonists can easily accomplish numerous attacks. Among those attacks, selective jamming is more clever technique in which jammer will target and corrupt only the messages of high importance. There are existing methods to prevent selective jamming in internal threat model like strong hiding commitment scheme(SHCS), cryptographic puzzle hiding scheme(CPHS) in which they focused only on the correct message delivery to the receiver node. But on the other side, jammer node can solve the puzzle by taking entire packet, making the adversary to know the secured message that was transmitted. Initially, a mechanism to identify the existence of selective jamming is demonstrated. Later, a solution to know the exact node that is performing selective jamming is derived. Then two novel techniques called Embedding Future Key (EFK) and Medial node Method (MNM) are proposed to prevent selective jamming. Finally, experiments are conducted on proposed methods and it is established that better throughput is achieved than the existing methods.</description><identifier>EISBN: 9781467361880</identifier><identifier>EISBN: 1467361909</identifier><identifier>EISBN: 9781467361903</identifier><identifier>EISBN: 1467361887</identifier><identifier>DOI: 10.1109/ISPCC.2013.6663439</identifier><language>eng</language><publisher>IEEE</publisher><subject>Cryptography ; Jamming ; Medial node ; Nickel ; Packet classification ; Privacy ; Receivers ; Selective jamming ; Throughput ; Tin ; Wireless networks</subject><ispartof>2013 IEEE International Conference on Signal Processing, Computing and Control (ISPCC), 2013, p.1-6</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6663439$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6663439$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Raju, Bksp Kumar</creatorcontrib><creatorcontrib>Rao, R. Rajeswara</creatorcontrib><title>A Medial node based privacy approaches for preventing selective jamming in wireless networks</title><title>2013 IEEE International Conference on Signal Processing, Computing and Control (ISPCC)</title><addtitle>ISPCC</addtitle><description>Wireless networks is still an emerging field in terms of security. Taking advantage from unreliability nature of wireless medium, antagonists can easily accomplish numerous attacks. Among those attacks, selective jamming is more clever technique in which jammer will target and corrupt only the messages of high importance. There are existing methods to prevent selective jamming in internal threat model like strong hiding commitment scheme(SHCS), cryptographic puzzle hiding scheme(CPHS) in which they focused only on the correct message delivery to the receiver node. But on the other side, jammer node can solve the puzzle by taking entire packet, making the adversary to know the secured message that was transmitted. Initially, a mechanism to identify the existence of selective jamming is demonstrated. Later, a solution to know the exact node that is performing selective jamming is derived. Then two novel techniques called Embedding Future Key (EFK) and Medial node Method (MNM) are proposed to prevent selective jamming. Finally, experiments are conducted on proposed methods and it is established that better throughput is achieved than the existing methods.</description><subject>Cryptography</subject><subject>Jamming</subject><subject>Medial node</subject><subject>Nickel</subject><subject>Packet classification</subject><subject>Privacy</subject><subject>Receivers</subject><subject>Selective jamming</subject><subject>Throughput</subject><subject>Tin</subject><subject>Wireless networks</subject><isbn>9781467361880</isbn><isbn>1467361909</isbn><isbn>9781467361903</isbn><isbn>1467361887</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2013</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotkMtKxDAYRuNCUMa-gG7yAq35mzRplkPxMjCi4CyFIU3_aMbeSEqHeXsrM6sPzuLjcAi5B5YBMP24-fyoqixnwDMpJRdcX5FEqxKEVFxCWbIbksR4YIyBkgoU3JKvNX3DxpuW9kODtDYRGzoGPxt7omYcw2DsD0bqhrBgnLGffP9NI7ZoJz8jPZiu-ye-p0cfFhwj7XE6DuE33pFrZ9qIyWVXZPf8tKte0-37y6Zab1Ov2ZRCYZ1U1gJgqRphmsJpQM7qfPG0daE1gnKiLsEwdAVDrVVR5tyKWghrNV-Rh_OtR8T9It-ZcNpfEvA_utNTQQ</recordid><startdate>201309</startdate><enddate>201309</enddate><creator>Raju, Bksp Kumar</creator><creator>Rao, R. Rajeswara</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201309</creationdate><title>A Medial node based privacy approaches for preventing selective jamming in wireless networks</title><author>Raju, Bksp Kumar ; Rao, R. Rajeswara</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-15cf67cc11e87d4ad5f91e30b2001cb599e17f4b81a0ef50e9975823c4b44cc93</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2013</creationdate><topic>Cryptography</topic><topic>Jamming</topic><topic>Medial node</topic><topic>Nickel</topic><topic>Packet classification</topic><topic>Privacy</topic><topic>Receivers</topic><topic>Selective jamming</topic><topic>Throughput</topic><topic>Tin</topic><topic>Wireless networks</topic><toplevel>online_resources</toplevel><creatorcontrib>Raju, Bksp Kumar</creatorcontrib><creatorcontrib>Rao, R. Rajeswara</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Raju, Bksp Kumar</au><au>Rao, R. Rajeswara</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A Medial node based privacy approaches for preventing selective jamming in wireless networks</atitle><btitle>2013 IEEE International Conference on Signal Processing, Computing and Control (ISPCC)</btitle><stitle>ISPCC</stitle><date>2013-09</date><risdate>2013</risdate><spage>1</spage><epage>6</epage><pages>1-6</pages><eisbn>9781467361880</eisbn><eisbn>1467361909</eisbn><eisbn>9781467361903</eisbn><eisbn>1467361887</eisbn><abstract>Wireless networks is still an emerging field in terms of security. Taking advantage from unreliability nature of wireless medium, antagonists can easily accomplish numerous attacks. Among those attacks, selective jamming is more clever technique in which jammer will target and corrupt only the messages of high importance. There are existing methods to prevent selective jamming in internal threat model like strong hiding commitment scheme(SHCS), cryptographic puzzle hiding scheme(CPHS) in which they focused only on the correct message delivery to the receiver node. But on the other side, jammer node can solve the puzzle by taking entire packet, making the adversary to know the secured message that was transmitted. Initially, a mechanism to identify the existence of selective jamming is demonstrated. Later, a solution to know the exact node that is performing selective jamming is derived. Then two novel techniques called Embedding Future Key (EFK) and Medial node Method (MNM) are proposed to prevent selective jamming. Finally, experiments are conducted on proposed methods and it is established that better throughput is achieved than the existing methods.</abstract><pub>IEEE</pub><doi>10.1109/ISPCC.2013.6663439</doi><tpages>6</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISBN: 9781467361880 |
ispartof | 2013 IEEE International Conference on Signal Processing, Computing and Control (ISPCC), 2013, p.1-6 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6663439 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Cryptography Jamming Medial node Nickel Packet classification Privacy Receivers Selective jamming Throughput Tin Wireless networks |
title | A Medial node based privacy approaches for preventing selective jamming in wireless networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T12%3A36%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20Medial%20node%20based%20privacy%20approaches%20for%20preventing%20selective%20jamming%20in%20wireless%20networks&rft.btitle=2013%20IEEE%20International%20Conference%20on%20Signal%20Processing,%20Computing%20and%20Control%20(ISPCC)&rft.au=Raju,%20Bksp%20Kumar&rft.date=2013-09&rft.spage=1&rft.epage=6&rft.pages=1-6&rft_id=info:doi/10.1109/ISPCC.2013.6663439&rft_dat=%3Cieee_6IE%3E6663439%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781467361880&rft.eisbn_list=1467361909&rft.eisbn_list=9781467361903&rft.eisbn_list=1467361887&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6663439&rfr_iscdi=true |