SlideShare uma empresa Scribd logo
1 de 3
Baixar para ler offline
© 2016, IJCERT All Rights Reserved Page | 194
International Journal of Computer Engineering In Research Trends
Volume 3, Issue 4, April-2016, pp. 194-196 ISSN (O): 2349-7084
Prevention of Packet Hiding Methods In
Selective Jamming Attack
Shital Patil , Vishaka Patil , Rupali Warke , Priyanka Patil
Abstract:- The sharing nature of wireless medium provides various challenging features among various set of users. It
is very important in real world and it provides better transfer rate but authentication is ignored. The limitations of existing
wired network are overcome by wireless network. These networks act as source for various types of jamming attacks. In
analysis and detection of jamming attack various methods are available but sometime they fail. In case of external threat
the analysis and reporting of jamming attack is very easy model but it is quite difficult in terms of internal threat model,
these internal term uses the knowledge about network secrets and network protocols to launch various attacks with very
low effort. Various cryptographic techniques are implemented to prevent these attacks. The main goal of this project is to
prevent the information at the wireless physical layer and allowed the safe transmission among communicated nodes
although the attacker is present.
Keywords – Commitment scheme, Network Protocols, Packet hiding methods, Real time packet classification and
Selective jamming attacks.
——————————  ——————————
1. INTRODUCTION
The faster accessibility, compatibility and connectivity
between different users is provided by wireless
network. Various types of attacks are invited because
of the sharing medium of wireless network and it also
provides it provide additional features. The
adversaries with internal knowledge of network secrets
take more effort on jamming the network or decrease
the network performance [1], [2]. Anyone which has
transceiver can easily inject spurious messages or
create noise or interference or produce jamming attack
in an ongoing transmission or block the transmission of
legitimate users .In the simplest form, the attacker
classifies first few bytes of transmitted packet and
destroy the message Attacker must have knowledge
about each layer of the TCP protocol. The actual format
for frame in wireless
Figure 1: Generic frame format for wireless network.
A.Motivation
The motivation for proposed solution lies in problem
with sharing nature of wireless network [1].
Sometimes in the prevention of packet hiding methods
in selective jamming attack the how many packet are
loss or send to destination. For that purpose the
packet hiding methods are detected the packet hiding
method are strong packet hiding method ,puzzle
hiding ,all-or-nothing transformation, to Overcome the
disadvantage of this method we have proposed packet
hiding without packet loss method.
Available online at: www.ijcert.org
Shital Patil et al., International Journal of Computer Engineering In Research Trends
Volume 3, Issue 4, April-2016, pp. 194-196
© 2016, IJCERT All Rights Reserved Page | 195
B. Problem Definition
Because of sharing nature Of wireless network the
various jamming attack are occurred and the wireless
medium provides various challenging features.
Because of internal knowledge of network and its
secrets the jamming attack in which jammer attacks the
importance message .We propose the packet hiding
scheme without packet loss. In PHSPL, the data is send
to the selective host and packets are sending with
Header, Sequence ID and host name . Consider in
given figure. Node A and B communicates with
wireless network. Both A and B there is a jamming
Node and communicated with each other. Node j
classifies m by receiving only the first few Bytes of m
when node A transfer the packet from m to node B,
With the reception at B the J corrupts m beyond
recovery by interfering in jamming node . We address
the problem of preventing the jamming node from
classifying m in real time, thus mitigating J’s ability to
perform selective jamming. Our goal is to transform a
selective host note that in the present work, based on
protocol semantics we do not address packet
classification methods.
Fig 2. Realization of a selective jamming attack
2. RELATED WORK
In related work, we are studying the reasons for
jamming, spread spectrum techniques used by the
conventional systems and the disadvantages of existing
system, prevention mechanism they used and at the
last we are studying how the real time packet
classification is performed and strong hiding
commitment scheme which is used by our proposed
system. Because of jamming, the wireless network
either stopped or disturbed. Noise, collision,
interference these are various forms of jamming.
Jamming may be performed intentionally or
unintentionally, depending upon either performing
attack or due to network load. There is no need of
special hardware to execute these attacks only
knowledge of preserved information is required.
2.1. STRONG HIDING COMMITMENT SCHEME
(SHCS)
In prevention of packet hiding methods in selective
jamming attack, A strong hiding commitment scheme
(SHCS) is one of technique , and which is based on
symmetric cryptography. Assume that the sender has a
packet for sending to Receiver. First, the sender S
constructs message and the commitment function is an
off-the-shelf symmetric encryption algorithm is a
publicly known permutation, and k is a randomly
selected key of some desired key length s. Both the
sender and receiver are randomly selected key and
send the packet to destination.
2.2. CRYPTOGRAPHIC PUZZLE HIDING
SCHEME
In cryptographic puzzle scheme the sender S has a
packet m for transmission. The sender selects a random
key k, of a desired length for sending packet to the
receiver. Sender S generates a puzzle (key, time),
where puzzle () denotes the puzzle generator function,
and the time required for the solution of the puzzle.
After generating the puzzle P, the sender broadcasts
the puzzle. At the receiver side, any receiver R solves
the received puzzle to recover key and then computes.
2.3. ALL-OR-NOTHING TRANSFORMATION
The packets are pre-processed by an All-or-nothing
transformation (AONT) before transmission of all
packet but remain packet are unencrypted. The
attacker cannot perform packet classification until all
pseudo-messages corresponding to the original packet
have been received and then the packet transformation
has been applied in inverse way. Packet m is
partitioned to a set of x input blocks m = {m1, m2,
m3….}, which serve as an input to a set of pseudo-
messages m = {m1, m2, m3…} is transmitted over the
wireless medium.
3. PROPOSED SYSTEM
In prevention of packet hiding methods in selective
jamming attack proposed system gives brief
Shital Patil et al., International Journal of Computer Engineering In Research Trends
Volume 3, Issue 4, April-2016, pp. 194-196
© 2016, IJCERT All Rights Reserved Page | 196
introduction along with its benifits .The packet hiding
without packet loss scheme gives better solution for
jamming. for that packets are sending with Header,
Sequence ID and host name and the data is send to the
destination host. That’s why the packet loss is
minimum. So the sender and receiver can communicate
with each other securely.in packet hiding without
packet loss all the information about packet and data is
in the header of packet. The PHSPL is more effective
over other real time classification methods. There are
some advantages of proposed system- Very easy for
exploiting knowledge from compromised nodes. The
proposed system gives selective jamming attack to
DOS with very low effort and this is another advantage
of. By using proposed system strong security protocols
are achieved.
4. ACTUAL IMPLEMENTATION
In prevention of packet hiding methods in selective
jamming attack we uses the Network Simulator 2.34
tool in which front end is tcl and back end is c++. Here
are two protocols are used. TCP and AODV protocol
and TCP is used for establishing the connection and
AODV routing protocol is used for finding routing
path for data packets. The transmission rate is 11Mbps
for every link. But due to flooding feature of AODV
the random attacker fails in disturbing route path. The
continuous, random, targeted RREQ the attacker are
kept between the communicated pairs.
 Using AODV the Implementation of wireless
node in NS-2.
 Implementation of jamming attack with
selective transmission.
 In wireless network the Implementation of
packet classification is done.
 Implementation of packet hiding for real
packet.
 Detection of jamming attack and analysis with
throughput.
5. CONCLUSION
In this paper, the prevention of packet hiding methods in
selective jamming attacks generated a problem in LAN or
wireless networks. Attacker attacks the importance
message because of internal knowledge of network and its
secrets. We quantified the effectiveness of packet and
analysed the security of packet hiding schemes. We
propose the packet hiding scheme without packet loss
(PHSPL) in which the packet loss is minimum and the
sender and receiver can communicate with each other
securely. All the information about packet and data is in
the header of packet. The PHSPL is more effective over
other real time classification methods. So the sender and
receiver can communicate securely.
Fig 3: Throughput for packet hiding without packetloss
scheme.
REFERENCES
1. P. Tague, M. Li, and R. Poovendran., ―Mitigation of
control channel, jamming under node capture
attacks‖. IEEE Transactions on Computing,
8(9):1221–1234, 2009.
2. T. X. Brown, J. E. James, and A. Sethi.‖ Jamming and
sensing of Encrypted wireless ad hoc networks‖. In
Proceedings of MobiHoc, pages 120–130, 2006.
3. L. Lazos, S. Liu, and M. Krunz. ―Mitigating control-
channel jamming attacks in multi-channel ad hoc
networks‖. In Proceedings of the 2nd ACM conference
on wireless network security, pages 169–180, 2009.
4. O Goldreich. Foundations of cryptography: Basic
applications, Cambrige University press 2005.
5. Damgard. ―Commitment schemes and zero knowledge
protocols‖,
6. Lecture notes in computer science, 1561:63-86.
7. Dilip Kumar D.P 1, H.Venugopal2. ―Avoiding
selective jam attack
8. by packet hiding method in wireless sensor
network‖.
9. G. Noubir and G. Lin. ―Low power DoS attacks in
data wireless
10.LANs and countermeasures‖, ACM SIGMOBILE
Mobile computing.

Mais conteúdo relacionado

Mais procurados

Hiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesHiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesPriyangaRajaram
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksnagibtech
 
Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...ijctet
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyeSAT Publishing House
 
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksIJMER
 
Packet hiding methods for preventing selective
Packet hiding methods for preventing selectivePacket hiding methods for preventing selective
Packet hiding methods for preventing selectiveveenasraj
 
A Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetA Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetIJSRD
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...IJMER
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBirju Tank
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attackRaj Sikarwar
 
A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...Mumbai Academisc
 
Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...JPINFOTECH JAYAPRAKASH
 
Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...IJNSA Journal
 
An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...IAEME Publication
 

Mais procurados (18)

Hiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesHiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniques
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Dn36682688
Dn36682688Dn36682688
Dn36682688
 
Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...Enhancing msf for mobile ad hoc network security though active handshaking &a...
Enhancing msf for mobile ad hoc network security though active handshaking &a...
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a survey
 
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
 
A43030104
A43030104A43030104
A43030104
 
Packet hiding methods for preventing selective
Packet hiding methods for preventing selectivePacket hiding methods for preventing selective
Packet hiding methods for preventing selective
 
A Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetA Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manet
 
Ijcatr04051009
Ijcatr04051009Ijcatr04051009
Ijcatr04051009
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
 
Blackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV ProtocolBlackhole Attck detection in AODV Protocol
Blackhole Attck detection in AODV Protocol
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attack
 
A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...
 
I1086066
I1086066I1086066
I1086066
 
Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...
 
Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...
 
An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...
 

Semelhante a PREVENTION

ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...ijiert bestjournal
 
I030102056063
I030102056063I030102056063
I030102056063theijes
 
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLESSELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLESIJNSA Journal
 
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...IJNSA Journal
 
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet  Hiding MethodsJamming Attacks Prevention in Wireless Networks Using Packet  Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding MethodsIOSR Journals
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
 
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...IOSR Journals
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksJPINFOTECH JAYAPRAKASH
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksJPINFOTECH JAYAPRAKASH
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingijwmn
 
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless NetworksA Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless NetworksIRJET Journal
 
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEswar Publications
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
 
Abstract
AbstractAbstract
Abstractrajugnt
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganographyAlexander Decker
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganographyAlexander Decker
 

Semelhante a PREVENTION (20)

ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
 
I030102056063
I030102056063I030102056063
I030102056063
 
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
Container-Beating Approaches for Avoiding Discriminative Cramming AssaultsContainer-Beating Approaches for Avoiding Discriminative Cramming Assaults
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
 
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLESSELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
 
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...
Performance Analysis of Transport Layer Basedhybrid Covert Channel Detection ...
 
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet  Hiding MethodsJamming Attacks Prevention in Wireless Networks Using Packet  Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
N0704075079
N0704075079N0704075079
N0704075079
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Elgamal signature for content distribution with network coding
Elgamal signature for content distribution with network codingElgamal signature for content distribution with network coding
Elgamal signature for content distribution with network coding
 
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless NetworksA Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
 
Enhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor NetworksEnhanced security for non English users of Wireless Sensor Networks
Enhanced security for non English users of Wireless Sensor Networks
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
Am03402220229
Am03402220229Am03402220229
Am03402220229
 
Abstract
AbstractAbstract
Abstract
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
11.secure data transmission by using steganography
11.secure data transmission by using steganography11.secure data transmission by using steganography
11.secure data transmission by using steganography
 
Secure data transmission by using steganography
Secure data transmission by using steganographySecure data transmission by using steganography
Secure data transmission by using steganography
 

Mais de IJCERT

Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi MethodParametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi MethodIJCERT
 
Robust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization ProcessRobust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization ProcessIJCERT
 
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsSoftware Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsIJCERT
 
A Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation MethodsA Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation MethodsIJCERT
 
An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding   An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding IJCERT
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
 
Hard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling PowerHard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling PowerIJCERT
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyIJCERT
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationSecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationIJCERT
 
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc NetworkHandling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc NetworkIJCERT
 
GSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault DetectionGSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault DetectionIJCERT
 
Efficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodEfficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodIJCERT
 
Data Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data SetData Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data SetIJCERT
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyIJCERT
 
AUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEYAUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEYIJCERT
 
Implementation of Motion Model Using Vanet
Implementation of Motion Model Using VanetImplementation of Motion Model Using Vanet
Implementation of Motion Model Using VanetIJCERT
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoTIJCERT
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentIJCERT
 
Real Time Detection System of Driver Fatigue
Real Time Detection System of Driver FatigueReal Time Detection System of Driver Fatigue
Real Time Detection System of Driver FatigueIJCERT
 
A Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data PreprocessingA Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data PreprocessingIJCERT
 

Mais de IJCERT (20)

Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi MethodParametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
Parametric Optimization of Rectangular Beam Type Load Cell Using Taguchi Method
 
Robust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization ProcessRobust Resource Allocation in Relay Node Networks for Optimization Process
Robust Resource Allocation in Relay Node Networks for Optimization Process
 
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug ReportsSoftware Engineering Domain Knowledge to Identify Duplicate Bug Reports
Software Engineering Domain Knowledge to Identify Duplicate Bug Reports
 
A Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation MethodsA Survey on: Sound Source Separation Methods
A Survey on: Sound Source Separation Methods
 
An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding   An Image representation using Compressive Sensing and Arithmetic Coding
An Image representation using Compressive Sensing and Arithmetic Coding
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
Hard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling PowerHard starting every initial stage: Study on Less Engine Pulling Power
Hard starting every initial stage: Study on Less Engine Pulling Power
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationSecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
 
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc NetworkHandling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
Handling Selfishness in Replica Allocation over a Mobile Ad-Hoc Network
 
GSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault DetectionGSM Based Device Controlling and Fault Detection
GSM Based Device Controlling and Fault Detection
 
Efficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication MethodEfficient Multi Server Authentication and Hybrid Authentication Method
Efficient Multi Server Authentication and Hybrid Authentication Method
 
Data Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data SetData Trend Analysis by Assigning Polynomial Function For Given Data Set
Data Trend Analysis by Assigning Polynomial Function For Given Data Set
 
Online Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual CryptographyOnline Payment System using Steganography and Visual Cryptography
Online Payment System using Steganography and Visual Cryptography
 
AUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEYAUTOMATIC SPEECH RECOGNITION- A SURVEY
AUTOMATIC SPEECH RECOGNITION- A SURVEY
 
Implementation of Motion Model Using Vanet
Implementation of Motion Model Using VanetImplementation of Motion Model Using Vanet
Implementation of Motion Model Using Vanet
 
Intelligent Device TO Device Communication Using IoT
 Intelligent Device TO Device Communication Using IoT Intelligent Device TO Device Communication Using IoT
Intelligent Device TO Device Communication Using IoT
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial Environment
 
Real Time Detection System of Driver Fatigue
Real Time Detection System of Driver FatigueReal Time Detection System of Driver Fatigue
Real Time Detection System of Driver Fatigue
 
A Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data PreprocessingA Survey on Web Page Recommendation and Data Preprocessing
A Survey on Web Page Recommendation and Data Preprocessing
 

Último

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 

Último (20)

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 

PREVENTION

  • 1. © 2016, IJCERT All Rights Reserved Page | 194 International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 194-196 ISSN (O): 2349-7084 Prevention of Packet Hiding Methods In Selective Jamming Attack Shital Patil , Vishaka Patil , Rupali Warke , Priyanka Patil Abstract:- The sharing nature of wireless medium provides various challenging features among various set of users. It is very important in real world and it provides better transfer rate but authentication is ignored. The limitations of existing wired network are overcome by wireless network. These networks act as source for various types of jamming attacks. In analysis and detection of jamming attack various methods are available but sometime they fail. In case of external threat the analysis and reporting of jamming attack is very easy model but it is quite difficult in terms of internal threat model, these internal term uses the knowledge about network secrets and network protocols to launch various attacks with very low effort. Various cryptographic techniques are implemented to prevent these attacks. The main goal of this project is to prevent the information at the wireless physical layer and allowed the safe transmission among communicated nodes although the attacker is present. Keywords – Commitment scheme, Network Protocols, Packet hiding methods, Real time packet classification and Selective jamming attacks. ——————————  —————————— 1. INTRODUCTION The faster accessibility, compatibility and connectivity between different users is provided by wireless network. Various types of attacks are invited because of the sharing medium of wireless network and it also provides it provide additional features. The adversaries with internal knowledge of network secrets take more effort on jamming the network or decrease the network performance [1], [2]. Anyone which has transceiver can easily inject spurious messages or create noise or interference or produce jamming attack in an ongoing transmission or block the transmission of legitimate users .In the simplest form, the attacker classifies first few bytes of transmitted packet and destroy the message Attacker must have knowledge about each layer of the TCP protocol. The actual format for frame in wireless Figure 1: Generic frame format for wireless network. A.Motivation The motivation for proposed solution lies in problem with sharing nature of wireless network [1]. Sometimes in the prevention of packet hiding methods in selective jamming attack the how many packet are loss or send to destination. For that purpose the packet hiding methods are detected the packet hiding method are strong packet hiding method ,puzzle hiding ,all-or-nothing transformation, to Overcome the disadvantage of this method we have proposed packet hiding without packet loss method. Available online at: www.ijcert.org
  • 2. Shital Patil et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 194-196 © 2016, IJCERT All Rights Reserved Page | 195 B. Problem Definition Because of sharing nature Of wireless network the various jamming attack are occurred and the wireless medium provides various challenging features. Because of internal knowledge of network and its secrets the jamming attack in which jammer attacks the importance message .We propose the packet hiding scheme without packet loss. In PHSPL, the data is send to the selective host and packets are sending with Header, Sequence ID and host name . Consider in given figure. Node A and B communicates with wireless network. Both A and B there is a jamming Node and communicated with each other. Node j classifies m by receiving only the first few Bytes of m when node A transfer the packet from m to node B, With the reception at B the J corrupts m beyond recovery by interfering in jamming node . We address the problem of preventing the jamming node from classifying m in real time, thus mitigating J’s ability to perform selective jamming. Our goal is to transform a selective host note that in the present work, based on protocol semantics we do not address packet classification methods. Fig 2. Realization of a selective jamming attack 2. RELATED WORK In related work, we are studying the reasons for jamming, spread spectrum techniques used by the conventional systems and the disadvantages of existing system, prevention mechanism they used and at the last we are studying how the real time packet classification is performed and strong hiding commitment scheme which is used by our proposed system. Because of jamming, the wireless network either stopped or disturbed. Noise, collision, interference these are various forms of jamming. Jamming may be performed intentionally or unintentionally, depending upon either performing attack or due to network load. There is no need of special hardware to execute these attacks only knowledge of preserved information is required. 2.1. STRONG HIDING COMMITMENT SCHEME (SHCS) In prevention of packet hiding methods in selective jamming attack, A strong hiding commitment scheme (SHCS) is one of technique , and which is based on symmetric cryptography. Assume that the sender has a packet for sending to Receiver. First, the sender S constructs message and the commitment function is an off-the-shelf symmetric encryption algorithm is a publicly known permutation, and k is a randomly selected key of some desired key length s. Both the sender and receiver are randomly selected key and send the packet to destination. 2.2. CRYPTOGRAPHIC PUZZLE HIDING SCHEME In cryptographic puzzle scheme the sender S has a packet m for transmission. The sender selects a random key k, of a desired length for sending packet to the receiver. Sender S generates a puzzle (key, time), where puzzle () denotes the puzzle generator function, and the time required for the solution of the puzzle. After generating the puzzle P, the sender broadcasts the puzzle. At the receiver side, any receiver R solves the received puzzle to recover key and then computes. 2.3. ALL-OR-NOTHING TRANSFORMATION The packets are pre-processed by an All-or-nothing transformation (AONT) before transmission of all packet but remain packet are unencrypted. The attacker cannot perform packet classification until all pseudo-messages corresponding to the original packet have been received and then the packet transformation has been applied in inverse way. Packet m is partitioned to a set of x input blocks m = {m1, m2, m3….}, which serve as an input to a set of pseudo- messages m = {m1, m2, m3…} is transmitted over the wireless medium. 3. PROPOSED SYSTEM In prevention of packet hiding methods in selective jamming attack proposed system gives brief
  • 3. Shital Patil et al., International Journal of Computer Engineering In Research Trends Volume 3, Issue 4, April-2016, pp. 194-196 © 2016, IJCERT All Rights Reserved Page | 196 introduction along with its benifits .The packet hiding without packet loss scheme gives better solution for jamming. for that packets are sending with Header, Sequence ID and host name and the data is send to the destination host. That’s why the packet loss is minimum. So the sender and receiver can communicate with each other securely.in packet hiding without packet loss all the information about packet and data is in the header of packet. The PHSPL is more effective over other real time classification methods. There are some advantages of proposed system- Very easy for exploiting knowledge from compromised nodes. The proposed system gives selective jamming attack to DOS with very low effort and this is another advantage of. By using proposed system strong security protocols are achieved. 4. ACTUAL IMPLEMENTATION In prevention of packet hiding methods in selective jamming attack we uses the Network Simulator 2.34 tool in which front end is tcl and back end is c++. Here are two protocols are used. TCP and AODV protocol and TCP is used for establishing the connection and AODV routing protocol is used for finding routing path for data packets. The transmission rate is 11Mbps for every link. But due to flooding feature of AODV the random attacker fails in disturbing route path. The continuous, random, targeted RREQ the attacker are kept between the communicated pairs.  Using AODV the Implementation of wireless node in NS-2.  Implementation of jamming attack with selective transmission.  In wireless network the Implementation of packet classification is done.  Implementation of packet hiding for real packet.  Detection of jamming attack and analysis with throughput. 5. CONCLUSION In this paper, the prevention of packet hiding methods in selective jamming attacks generated a problem in LAN or wireless networks. Attacker attacks the importance message because of internal knowledge of network and its secrets. We quantified the effectiveness of packet and analysed the security of packet hiding schemes. We propose the packet hiding scheme without packet loss (PHSPL) in which the packet loss is minimum and the sender and receiver can communicate with each other securely. All the information about packet and data is in the header of packet. The PHSPL is more effective over other real time classification methods. So the sender and receiver can communicate securely. Fig 3: Throughput for packet hiding without packetloss scheme. REFERENCES 1. P. Tague, M. Li, and R. Poovendran., ―Mitigation of control channel, jamming under node capture attacks‖. IEEE Transactions on Computing, 8(9):1221–1234, 2009. 2. T. X. Brown, J. E. James, and A. Sethi.‖ Jamming and sensing of Encrypted wireless ad hoc networks‖. In Proceedings of MobiHoc, pages 120–130, 2006. 3. L. Lazos, S. Liu, and M. Krunz. ―Mitigating control- channel jamming attacks in multi-channel ad hoc networks‖. In Proceedings of the 2nd ACM conference on wireless network security, pages 169–180, 2009. 4. O Goldreich. Foundations of cryptography: Basic applications, Cambrige University press 2005. 5. Damgard. ―Commitment schemes and zero knowledge protocols‖, 6. Lecture notes in computer science, 1561:63-86. 7. Dilip Kumar D.P 1, H.Venugopal2. ―Avoiding selective jam attack 8. by packet hiding method in wireless sensor network‖. 9. G. Noubir and G. Lin. ―Low power DoS attacks in data wireless 10.LANs and countermeasures‖, ACM SIGMOBILE Mobile computing.