DocumentCode
3121817
Title
Packet hiding using cryptography with advanced key management against counter jamming attacks in wireless sensor networks
Author
Swaminathan, Sridhar ; Suganya, S. ; Ambika, K.
Author_Institution
ECE Dept., SASTRA Univ., Thanjavur, India
fYear
2013
fDate
4-6 July 2013
Firstpage
1
Lastpage
4
Abstract
In a wireless network, when the adversary is being part of the network, they are well known about the protocol being used and other network secrets. A transceiver is enough to get the key and decrypt the message. Hence, simple cryptographic mechanism is not enough to protect the message. Moreover, jamming can be easily performed by modifying the packet header. Hence we have to go for advanced mechanism to protect our message. At the message level permutation and padding are used to protect the message and at the communication level puzzle is used to hide the key. A puzzle solver module in the client system can solve the puzzle and get the key.
Keywords
cryptographic protocols; data encapsulation; jamming; private key cryptography; radio transceivers; wireless sensor networks; advanced key management; client system; counter jamming attacks; cryptographic protocols; packet header; packet hiding; padding; permutation; puzzle solver module; wireless sensor networks; Ad hoc networks; Encryption; Jamming; Protocols; Receivers; Wireless sensor networks; Attacks; Wireless sensor network; cryptography; jamming; key management;
fLanguage
English
Publisher
ieee
Conference_Titel
Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on
Conference_Location
Tiruchengode
Print_ISBN
978-1-4799-3925-1
Type
conf
DOI
10.1109/ICCCNT.2013.6726540
Filename
6726540
Link To Document