Secure Protocol for Jamming Attacks and Time-Delayed Broadcast in Wireless Communications
Keywords:
Jammers, Triple Data Encryption Standard (3DES), Network Scheduling Algorithm (NSA), Time-Delayed Broadcast Scheme (TDBS), Network TrafficAbstract
The main aim of this research is to transmit/convey the information from transmitter to the receiver even if there is jammer or a malicious node placed between them. Jammer is a device which emits high power and high bandwidth signal which blocks the low power communication signals. Jammer is designed in such a way to block specific frequency spectrum. The Jammer can block only the signal so this paper which transfers data in the form of time intervals which cannot be blocked. This paper proposes a TDBS, which implements the broadcast operation as a sequence of unicast transmissions scattered in frequency and time. 3DES(Triple Data Encryption Standard) Algorithm which is based on DES, it has been proven reliability and a longer key length that excludes many of the attacks that can be used to lessen the amount of time it takes to break DES. Network Scheduling Algorithm (NSA), which implements the time several network scheduling algorithms have been developed. Network Traffic Analysis is the process of identifying the malicious packets within the traffic. The traffic statistic which is used for understanding and evaluating the network operations.
References
- M. Abdel Rahman, H. Rahbari, and M. Krunz. “Adaptive frequency hopping algorithms for multicast rendezvous in DSA networks”.
- C.Popper, M. Strasser, and S. Capkun. “Jamming-resistant communication without shared keys”, in symposium on Security and Privacy, 2009.
- L. Lazos, S. Liu, and M. Krunz. “Mitigating jamming attacks in multi-channel ad hoc networks”.
- M. Strasser, S. Capkun, C. Popper, M.Cagalj, “Jamming resistant key establishment using uncoordinated frequency hopping ,”in Proc. IEEE Symp . Security and Privacy, Washington, USA, May 2008, pp. 64-78.
- K. Bian, J. Park, and R. Chen. “A quorum-based framework for establishing control channels in dynamic spectrum access networks”.
- Sivagami.S, Poornima Mohapatra.B, Priya darshini.G.R, Charukeerthy.V.S: ’’Jamming Attack Detection and Evaluating Using Wireless Application”.
- Y. Zhang, G. Yu, Q. Li, H. Wang, X. Zhu, and B. Wang. “Channel-hopping based communication rendezvous in cognitive radio networks”.
- S. Gollakota and D. Katabi. “Zigzag decoding: Combating hidden terminals in wireless networks”.
- Sisi Liu, Loukas Lazos, Marwan Krunz, "Time-Delayed Broadcasting for Defeating Inside Jammers", IEEE Transactions on Dependable and Secure Computing, vol. 12, no. , pp. 351-365, May-June, 2015.
- Y. Liu, P. Ning, H. Dai, and A. Liu. “Randomized differential DSSS: Jamming- resistant wireless broadcast communication.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.