International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 116 | Views: 260

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 6, June 2016 | Popularity: 6.8 / 10


     

Jamming Attacks Detection in Time-Critical Wireless Applications

Prajakta V. Pandhare, Jayant Adhikari


Abstract: Most recently development of digital physical frameworks has grown tremendously, because of the fact that, the wireless networking applications has been drawing expansive interest of studies. The various attacks that are found in the wireless networks are described in this paper, and how these attacks can be detected and prevented in wireless applications. The main objective of this system is finding Jamming attack and the Replay attack. Because of the shared and open nature of wireless networks, the Jamming attacks occurs, which shows the radio obstruction in influencing the system ability. The previous methods are partially successful in detecting these types of attacks. But the real problem in the existing system is to detect and prevent jamming and replay attack. Thus, we provide a novel method to detect and prevent the jamming attacks by use of time limit. It also helps for detecting and preventing of Replay attack and blocking IP address of actual attacker in the network. Prevention is done by filtering the replay packet which is responsible for time critical network Jamming and Delay


Keywords: Jamming attack detection, wireless network, replay packet attack detection


Edition: Volume 5 Issue 6, June 2016


Pages: 379 - 382


DOI: https://www.doi.org/10.21275/NOV164292



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Prajakta V. Pandhare, Jayant Adhikari, "Jamming Attacks Detection in Time-Critical Wireless Applications", International Journal of Science and Research (IJSR), Volume 5 Issue 6, June 2016, pp. 379-382, https://www.ijsr.net/getabstract.php?paperid=NOV164292, DOI: https://www.doi.org/10.21275/NOV164292



Similar Articles

Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017

Pages: 868 - 874

Study of Power Management in Adhoc Networks

Anandhi Giri, S. K. Srivatsa

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022

Pages: 695 - 698

A Complete Guide to 5G

Saad Shah, Mukesh Patel

Share this Article

Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 12 Issue 8, August 2023

Pages: 734 - 741

Enhanced Congestion Control in Wireless Networks: A Joint Random Early Detection and Drop Tail Mechanism

S. Mohanarangan, R. Kalaivani Sri, P. Nithya, M. Sowndharya, M. Hemamalini

Share this Article

Downloads: 2 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper, Computer Science & Engineering, United States of America, Volume 12 Issue 12, December 2023

Pages: 1010 - 1016

Enhancing Surveillance Capabilities: A Low-Cost, Mobile Phone-Based Solution with Moving Object Recognition

Dr. Bhargav Gangadhara

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article
Top