Secure Protocol for Jamming Attacks and Time-Delayed Broadcast in Wireless Communications

Authors

  • E. Meena  Master of Philosophy, Department Of Computer Science, Jamal Mohamed College, Tiruchirappalli, Tamilnadu, India
  • Dr. G. Ravi  Associate Professor& Head, Department Of Computer Science, Jamal Mohamed College, Tiruchirappalli, Tamilnadu, India

Keywords:

Jammers, Triple Data Encryption Standard (3DES), Network Scheduling Algorithm (NSA), Time-Delayed Broadcast Scheme (TDBS), Network Traffic

Abstract

The main aim of this research is to transmit/convey the information from transmitter to the receiver even if there is jammer or a malicious node placed between them. Jammer is a device which emits high power and high bandwidth signal which blocks the low power communication signals. Jammer is designed in such a way to block specific frequency spectrum. The Jammer can block only the signal so this paper which transfers data in the form of time intervals which cannot be blocked. This paper proposes a TDBS, which implements the broadcast operation as a sequence of unicast transmissions scattered in frequency and time. 3DES(Triple Data Encryption Standard) Algorithm which is based on DES, it has been proven reliability and a longer key length that excludes many of the attacks that can be used to lessen the amount of time it takes to break DES. Network Scheduling Algorithm (NSA), which implements the time several network scheduling algorithms have been developed. Network Traffic Analysis is the process of identifying the malicious packets within the traffic. The traffic statistic which is used for understanding and evaluating the network operations.

References

  1. M. Abdel Rahman, H. Rahbari, and M. Krunz. “Adaptive frequency hopping algorithms for     multicast rendezvous in DSA networks”.
  2. C.Popper, M. Strasser, and S. Capkun. “Jamming-resistant communication without shared keys”, in symposium on Security and Privacy, 2009.
  3. L. Lazos, S. Liu, and M. Krunz. “Mitigating jamming attacks in multi-channel ad hoc networks”.
  4. M. Strasser, S. Capkun, C. Popper, M.Cagalj, “Jamming resistant key establishment using uncoordinated frequency hopping ,”in  Proc. IEEE Symp . Security and Privacy, Washington, USA, May 2008, pp. 64-78.
  5. K. Bian, J. Park, and R. Chen. “A quorum-based framework for establishing control channels in dynamic spectrum access networks”.
  6. Sivagami.S, Poornima Mohapatra.B, Priya darshini.G.R, Charukeerthy.V.S: ’’Jamming Attack Detection and Evaluating Using Wireless Application”.        
  7. Y. Zhang, G. Yu, Q. Li, H. Wang, X. Zhu, and B. Wang. “Channel-hopping based communication rendezvous in cognitive radio networks”.
  8. S. Gollakota and D. Katabi. “Zigzag decoding: Combating hidden terminals in wireless networks”.
  9. Sisi Liu, Loukas Lazos, Marwan Krunz, "Time-Delayed Broadcasting for Defeating Inside Jammers", IEEE Transactions on Dependable and Secure Computing, vol. 12, no. , pp. 351-365, May-June, 2015.
  10. Y. Liu, P. Ning, H. Dai, and A. Liu. “Randomized differential DSSS: Jamming-    resistant wireless broadcast communication.

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
E. Meena, Dr. G. Ravi, " Secure Protocol for Jamming Attacks and Time-Delayed Broadcast in Wireless Communications, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.863-868, July-August-2017.