Open Access Open Access  Restricted Access Subscription Access

Jamming Attack Detection Using Key Exchange in Wireless Network


Affiliations
1 Department of Computer Science, Sree Saraswathi Thyagaraja College, Coimbatore-46, India
 

The effort of this article is regarding to detect jamming attacks in wireless networks. The Jamming detection and techniques have been proposed in the journalism. They established results by the authors are often CA and JADE as most of the jamming regions are closely marked, and they do not help to clearly differentiate jamming mechanisms. We explore a different jamming attack by discovering the relationship between five parameters. Packet delivery ratio, Total-message-size, Probability detection, Energy, End-To-End Delay and we are using JADE Method for indentifying malicious node. This proposed system used to find out the jamming attack by JADE Method and we used to protect our data by using Multi Key Generation algorithm. Jamming Attack Detection based on Estimation (JADE) scheme and establishes the hacker. Multi Key Generation techniques have been proposed in the journalism and it will be explained using through the encryption and decryption multiple key pairs.

Keywords

Jamming Attacks, Types of Jamming Attacks, CA, JADE, and Multi Key Generation Algorithm.
User
Notifications
Font Size

Abstract Views: 136

PDF Views: 2




  • Jamming Attack Detection Using Key Exchange in Wireless Network

Abstract Views: 136  |  PDF Views: 2

Authors

R. Maheswari
Department of Computer Science, Sree Saraswathi Thyagaraja College, Coimbatore-46, India
S. Rajeswari
Department of Computer Science, Sree Saraswathi Thyagaraja College, Coimbatore-46, India

Abstract


The effort of this article is regarding to detect jamming attacks in wireless networks. The Jamming detection and techniques have been proposed in the journalism. They established results by the authors are often CA and JADE as most of the jamming regions are closely marked, and they do not help to clearly differentiate jamming mechanisms. We explore a different jamming attack by discovering the relationship between five parameters. Packet delivery ratio, Total-message-size, Probability detection, Energy, End-To-End Delay and we are using JADE Method for indentifying malicious node. This proposed system used to find out the jamming attack by JADE Method and we used to protect our data by using Multi Key Generation algorithm. Jamming Attack Detection based on Estimation (JADE) scheme and establishes the hacker. Multi Key Generation techniques have been proposed in the journalism and it will be explained using through the encryption and decryption multiple key pairs.

Keywords


Jamming Attacks, Types of Jamming Attacks, CA, JADE, and Multi Key Generation Algorithm.