A new Approach for Averting Jamming Invasion with Packet Hiding Methods

  • M. Ramabai, E. Komalavalli
  • Published 2014


Wireless networks dependent on the active nodes which are reciprocally connected to uninterrupted availability of the wireless environment. Any person with a device which transmits and receives radio signals can secretly read those transmitted lines on wireless transmissions and put some bogus information, or stop legitimate ones. The surroundings of… (More)


7 Figures and Tables

Slides referencing similar topics