Packet-Hiding Methods for Preventing Selective Jamming Attacks Dependable and Secure Computing - 2012 ABSTRACT: The open nature of the wireless medium leaves it susceptible to intentional interference attacks, sometimes referred to as jamming. This intentional interference with wireless transmissions will be used as a launchpad for mounting Denial-of-Service attacks on wireless networks. Sometimes, jamming has been addressed under an external threat model. However, adversaries with internal data of protocol specifications and network secrets will launch low-effort jamming attacks that are difficult to detect and counter. In this work, we tend to address the matter of selective jamming attacks in wireless networks. In these attacks, the adversary is active only for a brief period of time, selectively targeting messages of high importance. We tend to illustrate the advantages of selective jamming in terms of network performance degradation and adversary effort by presenting two case studies; a selective attack on TCP and one on routing. We tend to show that selective jamming attacks can be launched by performing real-time packet classification at the physical layer. To mitigate these attacks, we develop 3 schemes that forestall real-time packet classification by combining cryptographic primitives with physical-layer attributes. We have a tendency to analyze the security of our strategies and evaluate their computational and Communication overhead. Did you like this research project? To get this research project Guidelines, Training and Code... Click Here facebook twitter google+ linkedin stumble pinterest pCloud: A Distributed System for Practical PIR Dependable and Secure Computing - 2012 Supporting Efficient and Scalable Multicasting over Mobile Ad Hoc Networks - 2011