Secure Protocol for Jamming Attacks and Time-Delayed Broadcast in Wireless Communications

Authors(2) :-E. Meena, Dr. G. Ravi

The main aim of this research is to transmit/convey the information from transmitter to the receiver even if there is jammer or a malicious node placed between them. Jammer is a device which emits high power and high bandwidth signal which blocks the low power communication signals. Jammer is designed in such a way to block specific frequency spectrum. The Jammer can block only the signal so this paper which transfers data in the form of time intervals which cannot be blocked. This paper proposes a TDBS, which implements the broadcast operation as a sequence of unicast transmissions scattered in frequency and time. 3DES(Triple Data Encryption Standard) Algorithm which is based on DES, it has been proven reliability and a longer key length that excludes many of the attacks that can be used to lessen the amount of time it takes to break DES. Network Scheduling Algorithm (NSA), which implements the time several network scheduling algorithms have been developed. Network Traffic Analysis is the process of identifying the malicious packets within the traffic. The traffic statistic which is used for understanding and evaluating the network operations.

Authors and Affiliations

E. Meena
Master of Philosophy, Department Of Computer Science, Jamal Mohamed College, Tiruchirappalli, Tamilnadu, India
Dr. G. Ravi
Associate Professor& Head, Department Of Computer Science, Jamal Mohamed College, Tiruchirappalli, Tamilnadu, India

Jammers, Triple Data Encryption Standard (3DES), Network Scheduling Algorithm (NSA), Time-Delayed Broadcast Scheme (TDBS), Network Traffic

  1. M. Abdel Rahman, H. Rahbari, and M. Krunz. “Adaptive frequency hopping algorithms for     multicast rendezvous in DSA networks”.
  2. C.Popper, M. Strasser, and S. Capkun. “Jamming-resistant communication without shared keys”, in symposium on Security and Privacy, 2009.
  3. L. Lazos, S. Liu, and M. Krunz. “Mitigating jamming attacks in multi-channel ad hoc networks”.
  4. M. Strasser, S. Capkun, C. Popper, M.Cagalj, “Jamming resistant key establishment using uncoordinated frequency hopping ,”in  Proc. IEEE Symp . Security and Privacy, Washington, USA, May 2008, pp. 64-78.
  5. K. Bian, J. Park, and R. Chen. “A quorum-based framework for establishing control channels in dynamic spectrum access networks”.
  6. Sivagami.S, Poornima Mohapatra.B, Priya darshini.G.R, Charukeerthy.V.S: ’’Jamming Attack Detection and Evaluating Using Wireless Application”.        
  7. Y. Zhang, G. Yu, Q. Li, H. Wang, X. Zhu, and B. Wang. “Channel-hopping based communication rendezvous in cognitive radio networks”.
  8. S. Gollakota and D. Katabi. “Zigzag decoding: Combating hidden terminals in wireless networks”.
  9. Sisi Liu, Loukas Lazos, Marwan Krunz, "Time-Delayed Broadcasting for Defeating Inside Jammers", IEEE Transactions on Dependable and Secure Computing, vol. 12, no. , pp. 351-365, May-June, 2015.
  10. Y. Liu, P. Ning, H. Dai, and A. Liu. “Randomized differential DSSS: Jamming-    resistant wireless broadcast communication.

Publication Details

Published in : Volume 2 | Issue 4 | July-August 2017
Date of Publication : 2017-08-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 863-868
Manuscript Number : CSEIT1724209
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

E. Meena, Dr. G. Ravi, "Secure Protocol for Jamming Attacks and Time-Delayed Broadcast in Wireless Communications", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.863-868, July-August-2017.
Journal URL :

Article Preview

Follow Us

Contact Us