Packet Hiding a New Model for Launching and Preventing Selective Jamming Attack over Wireless Network

Author(s):  
Sonali Gavali ◽  
Ashwini Gavali ◽  
Suresh Limkar ◽  
Dnyanashwar Patil
2019 ◽  
Vol 7 (5) ◽  
pp. 1384-1388
Author(s):  
T. Aruna ◽  
R. Anandha Jothi ◽  
V. Palanisamy

2015 ◽  
Vol 77 (22) ◽  
Author(s):  
Nur Cahyono Kushardianto ◽  
Yudhi Kusnanto ◽  
Elvian Syafrurizal ◽  
Ahmad Hamim Tohari

Quality of Service for data traffic is an important facet of a network, which in the case of a wireless network can easily be disrupted by applying a device to broadcast signals.  The authors believe that the increased of the energy consumption, when a jamming attack occurs, can be used as a guiding indicator in order to mitigate the attack. The authors show that when a reactive jamming attack occurs on a wireless network unmitigated, it can easily block the entire data traffic to the point there is no data can be delivered. The authors also show that, using NS3 simulation, in an event where a reactive jamming attack to the network happened, the source of the attack can be identified through the increased of energy consumption , and successfully mitigated by avoiding sending data traffic through the same channel used by the attacker, by executing channel hopping.  


Author(s):  
H. Akabori ◽  
K. Nishiwaki ◽  
K. Yoneta

By improving the predecessor Model HS- 7 electron microscope for the purpose of easier operation, we have recently completed new Model HS-8 electron microscope featuring higher performance and ease of operation.


2005 ◽  
Vol 173 (4S) ◽  
pp. 140-141
Author(s):  
Mariana Lima ◽  
Celso D. Ramos ◽  
Sérgio Q. Brunetto ◽  
Marcelo Lopes de Lima ◽  
Carla R.M. Sansana ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document