CFP last date
20 January 2025
Reseach Article

DoS Attack Prevention using CPHS and SHCS Algorithms

by Lakshmi Narayan B.N., Mariyan Richard A., Prasad Naik Hamsavath
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 174 - Number 15
Year of Publication: 2021
Authors: Lakshmi Narayan B.N., Mariyan Richard A., Prasad Naik Hamsavath
10.5120/ijca2021921013

Lakshmi Narayan B.N., Mariyan Richard A., Prasad Naik Hamsavath . DoS Attack Prevention using CPHS and SHCS Algorithms. International Journal of Computer Applications. 174, 15 ( Jan 2021), 42-45. DOI=10.5120/ijca2021921013

@article{ 10.5120/ijca2021921013,
author = { Lakshmi Narayan B.N., Mariyan Richard A., Prasad Naik Hamsavath },
title = { DoS Attack Prevention using CPHS and SHCS Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2021 },
volume = { 174 },
number = { 15 },
month = { Jan },
year = { 2021 },
issn = { 0975-8887 },
pages = { 42-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume174/number15/31763-2021921013/ },
doi = { 10.5120/ijca2021921013 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:23:47.622059+05:30
%A Lakshmi Narayan B.N.
%A Mariyan Richard A.
%A Prasad Naik Hamsavath
%T DoS Attack Prevention using CPHS and SHCS Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 174
%N 15
%P 42-45
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In the present world, transmission of data through wireless networks is an upcoming trend. Since wireless networks are prone to intendedintrusion attacks, the transmission leads to congestion in the network. The familiar attack that is faced during the transmission of data is Denial-of-Service (DoS) attack. This kind of attack is intended to render a machine or resource in the network unavailable to the target users to momentarily or indefinitely disrupt or suspend services of a host that is connected to the Internet.Typically,the external threat model addresses jamming. Yet, opponentswho possess the network secrets and are aware of the protocols can deliver efficient and guarantedto. In this paper, we propose to implement a Cryptographic Puzzle Hiding Scheme (CPHS) and Strong Hiding Commitment Scheme (SHCS) to prevent DoS attacks.

References
  1. Alejandro Prono and LoukasLazos. Packet-Hiding Methods for Preventing Selective Jamming Attacks. In IEEE ICC Conference, 2010.
  2. T. X. Brown, J. E. James, and A. Sethi. Jamming and sensing ofencrypted wireless ad hoc networks. In Proceedings of MobiHoc, pages120–130, 2006.
  3. M. Cagalj, S. Capkun, and J.-P. Hubaux. Wormhole-based antijammingtechniques in sensor networks. IEEE Transactions on MobileComputing, 6(1):100–114, 2007.
  4. Y. W. Law, M. Palaniswami, L. V. Hoesel, J. Doumen, P. Hartel, andP. Havinga. Energy-efficient link-layer jamming attacks against WSN MAC protocols. ACMTransactions on Sensors Networks, 5(1):1–38, 2009.
  5. P. Tague, M. Li, and R. Poovendran. Mitigation of control channeljamming under node capture attacks. IEEE Transactions on MobileComputing, 8(9):1221–1234, 2009.
  6. W. Xu, W. Trappe, Y. Zhang, and T.Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In ProceedingsofMobiHoc, pages 46–57, 2005.
  7. Yongjun Zhao, Sherman S. M. Chow. "Updatable Block-Level Message-Locked Encryption". Published in: IEEE Transactions on Dependable and SecureComputing.DOI: 10.1109/TDSC.2019.2922403 Publisher: IEEE. Date of Publication: 12 June 2019.
  8. Xingyuan Wang, SuoGao."Image encryption algorithm based on the matrix semi-tensor product with a compound secret key produced by a Boolean network".Published in : ELSEVIER, Information Sciences. Volume 539, October 2020, Pages 195-214.
  9. Chin-Chen Chang, Guo-Dong Su, Chia-Chen Lin. "An improved Sudoku-based data hiding scheme using greedy method".Published online 22 September-2020. https://doi.org/10.1504/IJCSE.2020.110177.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptographic Puzzle Hiding Scheme (CPHS) Strong Hiding Commitment Scheme (SHCS) DoS Attack.