Skip to main content

An Internal Adversary Model to Prevent Selective Jamming Attacks

  • Conference paper
  • First Online:
Advances in Power Systems and Energy Management (ETAEERE 2020, ETAEERE 2020)

Abstract

Wireless networks have an open nature that will lead to jamming. Jamming attacks will lead to denial of examining attacks. Normally we address a conundrum of jamming attacks as an outer one but large amount intimidation is an inner attack, everyplace the jammer will be present inside and knows all the secrets and will attack the system. In such a scenario the jammer will be concentration on selectively important messages. We canister overcome this scenario via the authentic time envelope classification by containing the cryptographic parameters with a brute layer. In this defense, we also concentrate not merely on security purposes but also on computation and communication for further process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 379.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 379.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. S.P. Deore, A. Pravin, Ensembling: model of histogram of oriented gradient based handwritten devanagari character recognition system. Traitement du Signal 34(1–2), 7 (2017)

    Article  Google Scholar 

  2. S. Jancy, C. Jayakumar, Various lossless compression techniques surveyed, in 2017 Third International Conference on Science Technology Engineering & Management (ICONSTEM) (IEEE), pp. 65–68

    Google Scholar 

  3. S.M. Poongavanam, R. Ponnusamy, A meteorological tower based wind speed prediction model using fuzzy logic. Am. J. Environ Sci. 9(3), 226–230 (2013)

    Article  Google Scholar 

  4. R. Surendran, B. KeerthiSamhitha, Energy aware grid resource allocation by using a novel negotiation model. J. Theor. Appl. Inf. Technol. (2014)

    Google Scholar 

  5. D. Thuente, M. Acharya, Intelligent jamming in wireless networks with applications to 802.11b and other networks, in Proceedings of MILCOM, vol. 6 (2006), p. 100

    Google Scholar 

  6. Sujihelen, C. Jayakumar, C. Senthilsingh, SEC approach for detecting node replication attacks in static wireless sensor networks. J. Electr. Eng. Technol. 13(6), 2447–2455 (2018)

    Google Scholar 

  7. J. Refonaa, S.L. Shabu, G. Bogireddy, K. Ashokkumar, Wireless local area network integration with telephone line. J. Comput. Theor. Nanosci. 16(8), 3324–3326 (2019)

    Article  Google Scholar 

  8. R. Sethuraman, P. Hema, R.G. Priya, Semantic web services based implementation of home appliances into ZigBee coordinators network, in 2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM) (IEEE, 2016, March), pp. 130–134

    Google Scholar 

  9. K.K. Kumar, H. Natraj, T.P. Jacob, Motion activated security camera using Raspberry Pi, in 2017 International Conference on Communication and Signal Processing (ICCSP) (IEEE, 2017, April), pp. 1598–1601

    Google Scholar 

  10. G. Noubir, G. Lin, Low-power DoS attacks in data wireless LANs and countermeasures. ACM SIGMOBILE Mob. Comput. Commun. Rev. 7(3), 29–30 (2003)

    Article  Google Scholar 

  11. L. Lazos, S. Liu, M. Krunz, Mitigating control-channel jamming attacks in multi-channel ad hoc networks, in Proceedings of the Second ACM Conference on Wireless Network Security (2009), pp. 169–180

    Google Scholar 

  12. W. Xu, T. Wood, W. Trappe, Y. Zhang, Channel surfing and spatial retreats: defenses against wireless denial of service, in Proceedings of Third ACM Workshop Wireless Security (2004), pp. 80–89

    Google Scholar 

  13. W. Xu, W. Trappe, Y. Zhang, T. Wood, The feasibility of launching and detecting jamming attacks in wireless networks, in Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) (2005), pp. 46–57

    Google Scholar 

  14. M.K. Simon, J.K. Omura, R.A. Scholtz, B.K. Levitt, Spread Spectrum Communications Handbook (McGraw-Hill, 2001)

    Google Scholar 

  15. A. Murugan, G. Nagarajan, S.D. Sundarsingh Jebaseelan, C.N. Ravi, Performance analysis of voltage profile, power, angle of injection using combined FACTS device. Int. J. Appl. Eng. 9(21), 10303–10316 (2014)

    Google Scholar 

  16. P. Visu, L. Lakshmanan, V. Murugananthan, M.V. Cruz, Software-defined forensic framework for malware disaster management in Internet of Thing devices for extreme surveillance. Comput. Commun. 147, 14–20 (2019)

    Article  Google Scholar 

  17. S.A. Sheela, Efficient data linkage using one class decision tree. Res. J. Pharm. Biolog. Chem. Sci. 6(5), 655–660 (2015)

    Google Scholar 

  18. M. Wilhelm, I. Martinovic, J.B. Schmitt, V. Lenders, Short paper: reactive jamming in wireless networks: how realistic is the threat? in Proceedings of the Fourth ACM Conference on Wireless Network Security (2011), pp. 47–52

    Google Scholar 

  19. M. Bellare, A. Boldyreva, S. Micali, Public-key encryption in a multi-user setting: security proofs and improvements, in International Conference on the Theory and Applications of Cryptographic Techniques (Springer, Berlin, Heidelberg, 2000), pp. 259–274

    Google Scholar 

  20. Y.W. Law, M. Palaniswami, L.V. Hoesel, J. Doumen, P. Hartel, P. Havinga, Energy-efficient link-layer jamming attacks against WSN MAC protocols. ACM Trans. Sens. Netw. 5(1), 1–38 (2010)

    Google Scholar 

  21. T. Dempsey, G. Sahin, Y.T. Morton, C.M. Hopper, Intelligent sensing and classification in ad hoc networks: a case study. IEEE Aeros. Electron. Syst. Mag. 24(8), 23–30 (2009)

    Google Scholar 

  22. T.X. Brown, J.E. James, A. Sethi, Jamming and sensing of encrypted wireless ad hoc networks, in Proceeding ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) (2012), pp. 120–130

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ankinapalli Uma Maheswara Reddy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Reddy, A.U.M., Hareesh, A.S., Ankayarkanni, B. (2021). An Internal Adversary Model to Prevent Selective Jamming Attacks. In: Priyadarshi, N., Padmanaban, S., Ghadai, R.K., Panda, A.R., Patel, R. (eds) Advances in Power Systems and Energy Management. ETAEERE ETAEERE 2020 2020. Lecture Notes in Electrical Engineering, vol 690. Springer, Singapore. https://doi.org/10.1007/978-981-15-7504-4_59

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-7504-4_59

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-7503-7

  • Online ISBN: 978-981-15-7504-4

  • eBook Packages: EnergyEnergy (R0)

Publish with us

Policies and ethics