Type of Material: | Thesis |
Title: | Real Time Security and Privacy Data Transmission for Preventing Jamming Attack |
Researcher: | Britto Raj, S |
Guide: | KHANAA, V |
Department: | Department of Engineering and Technology(Computer Science and Engineering) |
Publisher: | Bharath University, Chennai |
Place: | Chennai |
Year: | 2018 |
Language: | English |
Subject: | Computer Science | Computer Science Theory and Methods | Engineering and Technology | Computer Science and Information Technology | Engineering and Technology |
Dissertation/Thesis Note: | PhD; Department of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai; 2018; D12CS004 |
Fulltext: | Shodhganga |
000 | 00000ntm a2200000ua 4500 | |
001 | 454829 | |
003 | IN-AhILN | |
005 | 2024-09-19 12:10:28 | |
008 | __ | 240919t2018||||ii#||||g|m||||||||||eng|| |
035 | __ | |a(IN-AhILN)th_454829 |
040 | __ | |aBHAU_600073|dIN-AhILN |
041 | __ | |aeng |
100 | __ | |aBritto Raj, S|eResearcher |
110 | __ | |aDepartment of Engineering and Technology(Computer Science and Engineering)|bBharath University, Chennai|dChennai|ein|0U-0446 |
245 | __ | |aReal Time Security and Privacy Data Transmission for Preventing Jamming Attack |
260 | __ | |aChennai|bBharath University, Chennai|c2018 |
300 | __ | |dDVD |
502 | __ | |bPhD|cDepartment of Engineering and Technology(Computer Science and Engineering), Bharath University, Chennai, Chennai|d2018|oD12CS004 |
520 | __ | |aIn this paper, the jammer is part of the network under attack, thus being aware of the protocol specifications and shared network secrets. The adversary exploits his internal knowledge for launching jamming attacks in which specific messages of high importance are targeted. For example, a jammer can target route request/route-reply messages at the routing layer to prevent route discovery, or target TCP acknowledgments in a TCP session to severely degrade the throughput of an end-to-end flow. In the latter method, the jammer may decode the first few bits of a packet for recovering useful packet identifiers such as packet type, source and destination address. After classification, the adversary must induce a sufficient number of bit errors so that the packet cannot be recovered at the receiver. Selective jamming requires an intimate knowledge of the physical (PHY) layer, as well as of the specifics of upper layers. Strong Hiding Commitment Scheme (SHCS), Cryptographic Puzzle Hiding Scheme (Cphs) we present a |
650 | __ | |aComputer Science and Information Technology|2UGC |
650 | __ | |aEngineering and Technology|2AIU |
653 | __ | |aComputer Science |
653 | __ | |aComputer Science Theory and Methods |
653 | __ | |aEngineering and Technology |
700 | __ | |aKHANAA, V|eGuide |
856 | __ | |uhttp://shodhganga.inflibnet.ac.in/handle/10603/321481|yShodhganga |
905 | __ | |afromsg |
User Feedback Comes Under This section.