Abstract
Wireless networks have an open nature that will lead to jamming. Jamming attacks will lead to denial of examining attacks. Normally we address a conundrum of jamming attacks as an outer one but large amount intimidation is an inner attack, everyplace the jammer will be present inside and knows all the secrets and will attack the system. In such a scenario the jammer will be concentration on selectively important messages. We canister overcome this scenario via the authentic time envelope classification by containing the cryptographic parameters with a brute layer. In this defense, we also concentrate not merely on security purposes but also on computation and communication for further process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
S.P. Deore, A. Pravin, Ensembling: model of histogram of oriented gradient based handwritten devanagari character recognition system. Traitement du Signal 34(1–2), 7 (2017)
S. Jancy, C. Jayakumar, Various lossless compression techniques surveyed, in 2017 Third International Conference on Science Technology Engineering & Management (ICONSTEM) (IEEE), pp. 65–68
S.M. Poongavanam, R. Ponnusamy, A meteorological tower based wind speed prediction model using fuzzy logic. Am. J. Environ Sci. 9(3), 226–230 (2013)
R. Surendran, B. KeerthiSamhitha, Energy aware grid resource allocation by using a novel negotiation model. J. Theor. Appl. Inf. Technol. (2014)
D. Thuente, M. Acharya, Intelligent jamming in wireless networks with applications to 802.11b and other networks, in Proceedings of MILCOM, vol. 6 (2006), p. 100
Sujihelen, C. Jayakumar, C. Senthilsingh, SEC approach for detecting node replication attacks in static wireless sensor networks. J. Electr. Eng. Technol. 13(6), 2447–2455 (2018)
J. Refonaa, S.L. Shabu, G. Bogireddy, K. Ashokkumar, Wireless local area network integration with telephone line. J. Comput. Theor. Nanosci. 16(8), 3324–3326 (2019)
R. Sethuraman, P. Hema, R.G. Priya, Semantic web services based implementation of home appliances into ZigBee coordinators network, in 2016 Second International Conference on Science Technology Engineering and Management (ICONSTEM) (IEEE, 2016, March), pp. 130–134
K.K. Kumar, H. Natraj, T.P. Jacob, Motion activated security camera using Raspberry Pi, in 2017 International Conference on Communication and Signal Processing (ICCSP) (IEEE, 2017, April), pp. 1598–1601
G. Noubir, G. Lin, Low-power DoS attacks in data wireless LANs and countermeasures. ACM SIGMOBILE Mob. Comput. Commun. Rev. 7(3), 29–30 (2003)
L. Lazos, S. Liu, M. Krunz, Mitigating control-channel jamming attacks in multi-channel ad hoc networks, in Proceedings of the Second ACM Conference on Wireless Network Security (2009), pp. 169–180
W. Xu, T. Wood, W. Trappe, Y. Zhang, Channel surfing and spatial retreats: defenses against wireless denial of service, in Proceedings of Third ACM Workshop Wireless Security (2004), pp. 80–89
W. Xu, W. Trappe, Y. Zhang, T. Wood, The feasibility of launching and detecting jamming attacks in wireless networks, in Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) (2005), pp. 46–57
M.K. Simon, J.K. Omura, R.A. Scholtz, B.K. Levitt, Spread Spectrum Communications Handbook (McGraw-Hill, 2001)
A. Murugan, G. Nagarajan, S.D. Sundarsingh Jebaseelan, C.N. Ravi, Performance analysis of voltage profile, power, angle of injection using combined FACTS device. Int. J. Appl. Eng. 9(21), 10303–10316 (2014)
P. Visu, L. Lakshmanan, V. Murugananthan, M.V. Cruz, Software-defined forensic framework for malware disaster management in Internet of Thing devices for extreme surveillance. Comput. Commun. 147, 14–20 (2019)
S.A. Sheela, Efficient data linkage using one class decision tree. Res. J. Pharm. Biolog. Chem. Sci. 6(5), 655–660 (2015)
M. Wilhelm, I. Martinovic, J.B. Schmitt, V. Lenders, Short paper: reactive jamming in wireless networks: how realistic is the threat? in Proceedings of the Fourth ACM Conference on Wireless Network Security (2011), pp. 47–52
M. Bellare, A. Boldyreva, S. Micali, Public-key encryption in a multi-user setting: security proofs and improvements, in International Conference on the Theory and Applications of Cryptographic Techniques (Springer, Berlin, Heidelberg, 2000), pp. 259–274
Y.W. Law, M. Palaniswami, L.V. Hoesel, J. Doumen, P. Hartel, P. Havinga, Energy-efficient link-layer jamming attacks against WSN MAC protocols. ACM Trans. Sens. Netw. 5(1), 1–38 (2010)
T. Dempsey, G. Sahin, Y.T. Morton, C.M. Hopper, Intelligent sensing and classification in ad hoc networks: a case study. IEEE Aeros. Electron. Syst. Mag. 24(8), 23–30 (2009)
T.X. Brown, J.E. James, A. Sethi, Jamming and sensing of encrypted wireless ad hoc networks, in Proceeding ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) (2012), pp. 120–130
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Reddy, A.U.M., Hareesh, A.S., Ankayarkanni, B. (2021). An Internal Adversary Model to Prevent Selective Jamming Attacks. In: Priyadarshi, N., Padmanaban, S., Ghadai, R.K., Panda, A.R., Patel, R. (eds) Advances in Power Systems and Energy Management. ETAEERE ETAEERE 2020 2020. Lecture Notes in Electrical Engineering, vol 690. Springer, Singapore. https://doi.org/10.1007/978-981-15-7504-4_59
Download citation
DOI: https://doi.org/10.1007/978-981-15-7504-4_59
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-7503-7
Online ISBN: 978-981-15-7504-4
eBook Packages: EnergyEnergy (R0)