Title : Real Time Security and Privacy Data Transmission for Preventing Jamming Attack

Type of Material: Thesis
Title: Real Time Security and Privacy Data Transmission for Preventing Jamming Attack
Researcher: Britto Raj, S
Guide: KHANAA, V
Department: Department of Engineering and Technology(Computer Science and Engineering)
Publisher: Bharath University, Chennai
Place: Chennai
Year: 2018
Language: English
Subject: Computer Science
Computer Science Theory and Methods
Engineering and Technology
Computer Science and Information Technology
Engineering and Technology
Dissertation/Thesis Note: PhD; Department of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai; 2018; D12CS004
Fulltext: Shodhganga

00000000ntm a2200000ua 4500
001454829
003IN-AhILN
0052024-09-19 12:10:28
008__240919t2018||||ii#||||g|m||||||||||eng||
035__|a(IN-AhILN)th_454829
040__|aBHAU_600073|dIN-AhILN
041__|aeng
100__|aBritto Raj, S|eResearcher
110__|aDepartment of Engineering and Technology(Computer Science and Engineering)|bBharath University, Chennai|dChennai|ein|0U-0446
245__|aReal Time Security and Privacy Data Transmission for Preventing Jamming Attack
260__|aChennai|bBharath University, Chennai|c2018
300__|dDVD
502__|bPhD|cDepartment of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai|d2018|oD12CS004
520__|aIn this paper, the jammer is part of the network under attack, thus being aware of the protocol specifications and shared network secrets. The adversary exploits his internal knowledge for launching jamming attacks in which specific messages of high importance are targeted. For example, a jammer can target route request/route-reply messages at the routing layer to prevent route discovery, or target TCP acknowledgments in a TCP session to severely degrade the throughput of an end-to-end flow. In the latter method, the jammer may decode the first few bits of a packet for recovering useful packet identifiers such as packet type, source and destination address. After classification, the adversary must induce a sufficient number of bit errors so that the packet cannot be recovered at the receiver. Selective jamming requires an intimate knowledge of the physical (PHY) layer, as well as of the specifics of upper layers. Strong Hiding Commitment Scheme (SHCS), Cryptographic Puzzle Hiding Scheme (Cphs) we present a
650__|aComputer Science and Information Technology|2UGC
650__|aEngineering and Technology|2AIU
653__|aComputer Science
653__|aComputer Science Theory and Methods
653__|aEngineering and Technology
700__|aKHANAA, V|eGuide
856__|uhttp://shodhganga.inflibnet.ac.in/handle/10603/321481|yShodhganga
905__|afromsg

User Feedback Comes Under This section.