CFP last date
20 January 2025
Reseach Article

Analysing the Efficiency of the Packet Hiding Methods based on the Strong Hiding Commitment Scheme (SHCS)

by K. J Eldho
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 82 - Number 2
Year of Publication: 2013
Authors: K. J Eldho
10.5120/14088-1603

K. J Eldho . Analysing the Efficiency of the Packet Hiding Methods based on the Strong Hiding Commitment Scheme (SHCS). International Journal of Computer Applications. 82, 2 ( November 2013), 20-27. DOI=10.5120/14088-1603

@article{ 10.5120/14088-1603,
author = { K. J Eldho },
title = { Analysing the Efficiency of the Packet Hiding Methods based on the Strong Hiding Commitment Scheme (SHCS) },
journal = { International Journal of Computer Applications },
issue_date = { November 2013 },
volume = { 82 },
number = { 2 },
month = { November },
year = { 2013 },
issn = { 0975-8887 },
pages = { 20-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume82/number2/14088-1603/ },
doi = { 10.5120/14088-1603 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:56:44.279479+05:30
%A K. J Eldho
%T Analysing the Efficiency of the Packet Hiding Methods based on the Strong Hiding Commitment Scheme (SHCS)
%J International Journal of Computer Applications
%@ 0975-8887
%V 82
%N 2
%P 20-27
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This research describes about analyze the packet hiding methods. These methods are efficiently hiding the data packets while transferring in the network Medias. To protect the system from the unauthorized users, unauthorized programs, threaten the confidential matters and confirm the system availability to the legal users. Our need of network security has broken into two needs. One is the need of information security and other is the need of computer security. On internet or any network of an organization, thousands of important information is exchanged daily. This information can be misused by attackers. The information security is needed for the following given reasons. In my project, a single text file is the input of the system. In this project analysis of packet hiding methods, there are three types of transferring data are performed. In this I have analysis of the result manually. I have taken different sizes of file. This file is included in packet hiding methods. I calculate encryption times of the different files and different methods. Here different outputs are obtained.

References
  1. T. X. Brown, J. E. James, and A. Sethi. Jamming and sensing of encrypted wireless ad hoc networks. In Proceedings of MobiHoc, pages 120–130, 2006.
  2. B. Thapa, G. Noubir, R. Rajaramanand, and B. Sheng. On the robustness of IEEE802. 11 rate adaptation algorithms against smart jamming. In Proceedings of WiSec, 2011.
  3. M. Wilhelm, I. Martinovic, J. Schmitt, and V. Lenders. Reactive jamming in wireless networks: How realistic is the threat? In Proceedings of WiSec, 2011. B. Thapa, G. Noubir, R. Rajaramanand, and B. Sheng. On the robustness of IEEE802. 11 rate adaptation algorithms against smart jamming. In Proceedings of WiSec, 2011.
  4. Capkun, and J. -P. Hubaux. Wormhole-based anti jamming techniques in sensor networks. IEEE Transactions on Mobile Computing, 6(1):100–114, 2007.
  5. A. Chan, X. Liu, G. Noubir, and B. Thapa. Control channel jamming: Resilience and identification of traitors. In Proceedings of ISIT, 2007.
  6. T. Dempsey, G. Sahin, Y. Morton, and C. Hopper. Intelligent sensing and lassification in ad hoc networks: a case study. Aerospace and Electronic Systems Magazine, IEEE, 24(8):23–30, August 2009.
  7. Y. Desmedt. Broadcast anti-jamming systems. Computer Networks, 35(2-3):223–236, February 2001.
  8. K. Gaj and P. Chodowiec. FPGA and ASIC implementations of AES. Cryptographic Engineering, pages 235–294, 2009.
  9. O. Goldreich. Foundations of cryptography: Basic applications. Cambridge University Press, 2004.
  10. B. Greenstein, D. Mccoy, J. Pang, T. Kohno, S. Seshan, and D. Wetherall. Improving wireless privacy with an identifier-free link layer protocol. In Proceedings of MobiSys, 2008.
  11. IEEE. IEEE 802. 11 standard. http://standards. ieee. org/getieee802/
  12. download/802. 11-2007. pdf, 2007.
  13. Y. W. Law, M. Palaniswami, L. V. Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy-efficient link-layer jamming attacks against WSN MAC protocols. ACMTransactions on Sensors Networks, 5(1):1–38, 2009.
  14. L. Lazos, S. Liu, and M. Krunz. Mitigating control-channel jamming attacks in multi-channel ad hoc networks. In Proceedings of the 2nd ACM conference on wireless network security, pages 169–180, 2009.
  15. G. Lin and G. Noubir. On link layer denial of service in data wireless LANs. Wireless Communications and Mobile Computing, 5(3):273–284, May 2004.
  16. X. Liu, G. Noubir, and R. Sundaram. Spread: Foiling smart jammers using multi-layer agility. In Proceedings of INFOCOM, pages 2536–2540, 2007.
  17. Y. Liu, P. Ning, H. Dai, and A. Liu. Randomized differential DSSS: Jamming-resistant wireless broadcast communication. In Proceedings of INFOCOM, San Diego, 2010.
  18. D. Thuente and M. Acharya. Intelligent jamming in wireless networks with applications to 802. 11 b and other networks. In Proceedings of the IEEE Military Communications Conference MILCOM, 2006.
  19. M. Wilhelm, I. Martinovic, J. Schmitt, and V. Lenders. Reactive jamming in wireless networks: H ow realistic is the threat? In Proceedings of WiSec, 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Efficiency Packet