An Analysis of Packet Hiding Methods
Subscribe/Renew Journal
The nature of the network medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference of transmissions can be used as a launch pad for mounting Denial-of-Service attacks on networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. Here illustrate the advantages of selective jamming in terms of network performance degradation. To mitigate these attacks, these works simulate two schemes that prevent real-time packet classification by combining cryptographic primitives with mac-layer attributes. Theresults and analyze of this method and evaluate their computational and best hiding method.
Keywords
Abstract Views: 225
PDF Views: 2