secrets and techniques and the specifics of how
community protocols are applied at any layer in the
community stack. In order to launch selective
jamming assaults that target only particular
communications of "high value," the enemy uses his
insider information. A jammer may, for example,
target TCP acknowledgments to severely limit an
end-to-end flow's throughput or Routing layer route-
request/route-reply messages to thwart route
discovery. The enemy must be able to deploy specific
jamming attacks in order to able to execute a
"classify-then-jam" technique prior to the end of an
electronic gearbox. Such a technique can put into
practice by decoding packets as they are sent or by
utilizing protocol semantics to categories transmitted
packets. Selective jamming necessitates a thorough
understanding both the specifics of the physical
(PHY) layer and those of higher levels. We created
three strategies that, by obstructing real-time packet
classification, turn an intentional jammer becomes an
accidental one. Our structures combine physical-layer
houses with cryptographic primitives like dedication
schemes, cryptographic riddles, and transformations
that are all-or-nothing (Alejandro and Loukas 2022).
In the first series of experiments, we used a
multihop route to connect a client and a server for a
single file transfer. The client asked the server for a
5KB file. We measured the actual throughput of the
TCP connection in the following situations to
investigate the impacts of packet concealment: There
is no message encryption or packet concealment
(N.H. (M.E.), transmission time (T.T.), and file
transfer (F.T.). Because there is no cross-traffic, the
relatively little communication justifies the overhead
of each concealing technique as well as the minimal
queuing delay at intermediate routers. Cryptographic
challenges are sometimes exploited in hiding
methods. Figure.2 shows a destination node that
receives the file via inter-node communication from
the server and that node that solves the puzzle
5 CONCLUSIONS
In wireless networks, the issue of targeted jamming
assaults has been solved. Because the jammer is a
member of the community being attacked, it is
informed of the protocol requirements and shared
community secrets and practices. This is a paradigm
of internal opponents. We proved the jammer's
capability categorize sent real-time packets by
deciphering the initial scant signs of a continuous
transmission. We investigated how targeted Jamming
attacks had an impact on routing and TCP, among
other network protocols. (Alejandro and Loukas
2022). Our research demonstrates that a specific
jammer can have a significant detrimental impact on
performance with little effort. We devised three ways
for converting a targeted jammer into an arbitrary one
by impeding instant packet categorization. Physical-
layer features are mixed with cryptographic
fundamentals like all-or-nothing transformations,
cryptographic riddles, and commitment schemes in
our systems. We assessed the safety of our techniques
and calculated the overhead for computation and
communication.
REFERENCES
T. X. Brown, J. E. James, and A. Sethi, “Jamming and
Sensing of Encrypted Wireless Ad Hoc Networks,”
Proc. ACM Int’l Symp. Mobile Ad Hoc Networking
and Computing (MobiHoc), pp. 120-130, 2006.
Alejandro Proan˜o and Loukas Lazos “Packet-Hiding
Methods for Preventing Selective Jamming Attacks”
IEEE transactions on dependable and secure
computing, vol. 9, no. 1, january/february 2022.
L. Lazos, S. Liu, and M. Krunz, “Mitigating Control-
Channel Jamming Attacks in Multi-Channel Ad Hoc
Networks,” Proc. Second ACM Conf. Wireless
Network Security, pp. 169-180, 2009.
X. Liu, G. Noubir, and R. Sundaram, “Spread: Foiling
Smart Jammers Using Multi-Layer Agility,” Proc.
IEEE INFOCOM, pp. 2536-2540, 2007.
Y. Liu, P. Ning, H. Dai, and A. Liu, “Randomized
Differential DSSS: Jamming-Resistant Wireless
Broadcast Communication,” Proc. IEEE INFOCOM,
2010.
R. C. Merkle, “Secure Communications over Insecure
Channels,” Comm. ACM, vol. 21, no. 4, pp. 294-299,
1978.
AI4IoT 2023 - First International Conference on Artificial Intelligence for Internet of things (AI4IOT): Accelerating Innovation in Industry
and Consumer Electronics
220