• DocumentCode
    3121817
  • Title

    Packet hiding using cryptography with advanced key management against counter jamming attacks in wireless sensor networks

  • Author

    Swaminathan, Sridhar ; Suganya, S. ; Ambika, K.

  • Author_Institution
    ECE Dept., SASTRA Univ., Thanjavur, India
  • fYear
    2013
  • fDate
    4-6 July 2013
  • Firstpage
    1
  • Lastpage
    4
  • Abstract
    In a wireless network, when the adversary is being part of the network, they are well known about the protocol being used and other network secrets. A transceiver is enough to get the key and decrypt the message. Hence, simple cryptographic mechanism is not enough to protect the message. Moreover, jamming can be easily performed by modifying the packet header. Hence we have to go for advanced mechanism to protect our message. At the message level permutation and padding are used to protect the message and at the communication level puzzle is used to hide the key. A puzzle solver module in the client system can solve the puzzle and get the key.
  • Keywords
    cryptographic protocols; data encapsulation; jamming; private key cryptography; radio transceivers; wireless sensor networks; advanced key management; client system; counter jamming attacks; cryptographic protocols; packet header; packet hiding; padding; permutation; puzzle solver module; wireless sensor networks; Ad hoc networks; Encryption; Jamming; Protocols; Receivers; Wireless sensor networks; Attacks; Wireless sensor network; cryptography; jamming; key management;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on
  • Conference_Location
    Tiruchengode
  • Print_ISBN
    978-1-4799-3925-1
  • Type

    conf

  • DOI
    10.1109/ICCCNT.2013.6726540
  • Filename
    6726540