Article,

Jamming Attack Detection and Evaluating Using Wireless Application

, , , and .
International Journal on Recent and Innovation Trends in Computing and Communication, 3 (3): 1290--1293 (March 2015)
DOI: 10.17762/ijritcc2321-8169.150386

Abstract

When data is transferred from one host to another host,attacker may try to attack the packet or data which is in transit.Inorder to avoid such kind of attack in time critical wireless application and delivery message securely in wireless application. In this paper, we aim at modeling and detecting jamming attacks against time-critical wireless networks.To measure network performance ,packet loss and throughput metrics are used . To quantify the performance of time-critical applications,message invalidation ratio metric are used. This approach is inspired by the similarity between the behavior of a jammer who attempts to disrupt the delivery of a message and the behavior of a gambler who intends to win a gambling game. By gambling-based modeling and real-time modules, we can successful delivery time-critical message under a variety of jamming attacks

Tags

Users

  • @ijritcc

Comments and Reviews