• Corpus ID: 6077983

Packet-Hiding Methods for Preventing Selective Jamming Attacks

  title={Packet-Hiding Methods for Preventing Selective Jamming Attacks},
  author={Ashish Kumar and Sachin Kumar Gupta and Shubham Singh},
The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficu lt… 

Data Encapsulation To Prevent Jamming Attacks In Wireless Networks

This work addresses the problem of selective jamming attacks in wireless networks in terms of network performance degradation and adversary effort by presenting two case studies; a selective attack on TCP and one on routing.

Secure Packet Transmission for Preventing Selective Jamming Attacks

The impact of selective jamming on the network performance is illustrated by illustrating various selective attacks against the TCP protocol and a swarm based vulnerable prevention mechanism based on swarm intelligence is proposed against jamming attacks in wsn.

Selected Approach for Hiding the Packets from Jamming Attacks

Three schemes are built up that broadcast a selective jammer to a random one by avoiding real-time packet categorization and can considerably impact performance with extremely low effort.

Enhanced Packet Delivery Techniques Using CryptoLogic on Jamming Attacks for Wireless Communication Medium

This paper addresses the problem of jamming under an internal threat model, presenting a challenger model for selective jamming attacks, and develops three schemes that prevent real-time packet classification by combining cryptographic primitives with physicallayer attributes.

AONT- Based Packet Hiding Method for Preventing Jamming Attacks

A packet hiding method based on all- or- nothing transforms (AONT) is proposed to prevent jamming attacks in Denial of Service (DoS) attacks.

Encryption Techniques in Packet Hiding Methods to Prevent Jamming Attacks in Wireless Network

This paper is addressing the problem of jamming attacks under internal threat model and two schemes are proposed that prevent real-time packet classification of packets by combining hiding scheme based on cryptographic primitives.

Encryption of Data to Prevent Jamming Attacks

To mitigate selective jamming attacks in wireless networks, three schemes that prevent real-time packet classificatio n by combining cryptographic primitives with physical-la yer attributes are developed.


Combination of cryptographic primitives with physical layer attributes to prevent packet classification and a SWARM intelligence algorithm to prevent selective jamming attacks over wireless networks.

Hide and Seek: Mitigating the Jammers by Hiding Packets to Seek Secure Transmission

This paper addresses the problem of selective jamming by making it random one, which is prevented by combining cryptographic methods with strong hide commitment scheme, cryptographic puzzle, all or nothing transformation and hash based hiding scheme along with PHY layer attributes that is addressed using TCP protocol.


The Strong Hiding Commitment Scheme with Piggybacking Technique that localize the jammer presence in physical-layer attributes is proposed and schemes that prevent real-time packet classification by combining cryptographic primitives are developed.



The feasibility of launching and detecting jamming attacks in wireless networks

This paper proposes four different jamming attack models that can be used by an adversary to disable the operation of a wireless network, and evaluates their effectiveness in terms of how each method affects the ability of a Wireless node to send and receive packets.

Mitigation of Control Channel Jamming under Node Capture Attacks

An algorithm called GUIDE is proposed for the identification of compromised users in the system based on the set of control channels that are jammed and the estimation error is evaluated in terms of the false alarm and miss rates in the identification problem.

Short paper: reactive jamming in wireless networks: how realistic is the threat?

This work demonstrates that flexible and reliable software-defined reactive jamming is feasible by designing and implementing a reactive jammer against IEEE 802.15.4 networks and identifies the causes of loss at the physical layer of 802.

Jamming and sensing of encrypted wireless ad hoc networks

This paper focuses on jamming at the Transport/Network layer, which exploits AODV and TCP protocols and is shown to be very effective in simulated and real networks when it can sense victim packet types.

Wireless mesh networks: a survey

Cryptography - theory and practice

  • D. Stinson
  • Computer Science, Mathematics
    Discrete mathematics and its applications series
  • 1995

Identifiability, separability, and uniqueness of linear ICA models

The conditions for identifiability, separability and uniqueness of linear real valued independent component analysis models are given and a theorem is formulated and a proof is provided.

Sch mitt, and V. Lenders. Reactive jamming in wireless networks: How realistic is the threat

  • Proceedings of WiSec
  • 2011


  • IEEE
  • 2007