Jamming Attack Prevention in Wireless Network using Packet Hiding Methods

Authors

  • K.Navaneedhan, M.N.Dharanidharan, G.Kamalesh, K.Mohanapriyan Muthayammal Engineering College, Rasipuram, Tamil Nadu, India Author

DOI:

https://doi.org/10.15662/IJEETR.2026.0802318

Keywords:

Selective jamming, Packetclassification, Wirelessnetworks, Denial-of-Service

Abstract

Modern society is heavily dependent on wireless network for data Transmission. While data transmission in wireless medium, the jamming attacks occur.That selective jamming attacks can be launched by performing real-time packet classification at the physical layer.In All-Or-Nothing Transformation methods introduce a modest communication and computation overhead.In this method Block encryption algorithm is used to hiding the massages.But this algorithm not considered the Timing limits and Parameters length.To overcome this problem the Smart code generator algorithm is used.This techniques provide the strong security level in wireless Medium.

References

1. T. X. Brown, J. E. James, and A. Sethi. Jamming and sensing ofencrypted wireless ad hoc networks. In Proceedings of MobiHoc, pages120–130, 2006.

2. M. Cagalj, S. Capkun, and J.-P.Hubaux.Wormhole-based anti-jammingtechniques in sensor networks.IEEE Transactions on MobileComputing, 6(1):100–114, 2007.

3. Y. Desmedt. Broadcast anti-jamming systems. Computer Networks,35(2-3):223–236, February 2001.

4. R. Rivest. All-or-nothing encryption and the package transform.Lecture Notes in Computer Science, pages 210–218, 1997.

5. Chan, X. Liu, G. Noubir, and B. Thapa. Control channel jamming:Resilience and identification of traitors. In Proceedings of ISIT, 2007.

6. [6] K. Gaj and P. Chodowiec.FPGA and ASIC implementations of AES.

7. Cryptographic Engineering, pages 235–294, 2009.

8. O. Goldreich. Foundations of cryptography: Basic applications. CambridgeUniversity Press, 2004.

9. B. Greenstein, D. Mccoy, J. Pang, T. Kohno, S. Seshan, and D. Thetherall.Improving wireless privacy with an identifier-free link layerprotocol.In Proceedings of MobiSys, 2008.

10. IEEE. IEEE 802.11 standard.http://standards.ieee.org/getieee802/download/802.11-2007.pdf, 2007.

11. Juels and J. Brainard. Client puzzles: A cryptographic countermeasureagainst connection depletion attacks. In Proceedings of NDSS,pages 151–165, 1999.

12. Y. W. Law, M. Palaniswami, L. V. Hoesel, J. Doumen, P. Hartel, andP. Havinga. Energy-efficient link-layer jamming attacks against WSNMAC protocols. ACMTransactions on Sensors Networks, 5(1):1–38, 2009.

13. C.Nagarajan and M.Madheswaran - ‘Stability Analysis of Series Parallel Resonant Converter with Fuzzy Logic Controller Using State Space Techniques’- Taylor &Francis, Electric Power Components and Systems, Vol.39 (8), pp.780-793, May 2011. DOI: 10.1080/15325008.2010.541746

14. C.Nagarajan and M.Madheswaran - ‘Experimental verification and stability state space analysis of CLL-T Series Parallel Resonant Converter’ - Journal of Electrical Engineering, Vol.63 (6), pp.365-372, Dec.2012. DOI: 10.2478/v10187-012-0054-2

15. C.Nagarajan and M.Madheswaran - ‘Performance Analysis of LCL-T Resonant Converter with Fuzzy/PID Using State Space Analysis’- Springer, Electrical Engineering, Vol.93 (3), pp.167-178, September 2011. DOI 10.1007/s00202-011-0203-9

16. S.Tamilselvi, R.Prakash, C.Nagarajan,“Solar System Integrated Smart Grid Utilizing Hybrid Coot-Genetic Algorithm Optimized ANN Controller” Iranian Journal Of Science And Technology-Transactions Of Electrical Engineering, DOI10.1007/s40998-025-00917-z,2025

17. S.Tamilselvi, R.Prakash, C.Nagarajan,“ Adaptive sliding mode control of multilevel grid-connected inverters using reinforcement learning for enhanced LVRT performance” Electric Power Systems Research 253 (2026) 112428, doi.org/10.1016/j.epsr.2025.112428

18. S.Thirunavukkarasu, C. Nagarajan, 2024, “Performance Investigation on OCF and SCF study in BLDC machine using FTANN Controller," Journal of Electrical Engineering And Technology, Volume 20, pages 2675–2688, (2025), doi.org/10.1007/s42835-024-02126-w

19. C. Nagarajan, M.Madheswaran and D.Ramasubramanian- ‘Development of DSP based Robust Control Method for General Resonant Converter Topologies using Transfer Function Model’- Acta Electrotechnica et Informatica Journal , Vol.13 (2), pp.18-31,April-June.2013, DOI: 10.2478/aeei-2013-0025.

20. C.Nagarajan and M.Madheswaran - ‘DSP Based Fuzzy Controller for Series Parallel Resonant converter’- Springer, Frontiers of Electrical and Electronic Engineering, Vol. 7(4), pp. 438-446, Dec.12. DOI 10.1007/s11460-012-0212-0.

21. C.Nagarajan and M.Madheswaran - ‘Experimental Study and steady state stability analysis of CLL-T Series Parallel Resonant Converter with Fuzzy controller using State Space Analysis’- Iranian Journal of Electrical & Electronic Engineering, Vol.8 (3), pp.259-267, September 2012.

22. C.Nagarajan and M.Madheswaran, “Analysis and Simulation of LCL Series Resonant Full Bridge Converter Using PWM Technique with Load Independent Operation” has been presented in ICTES’08, a IEEE / IET International Conference organized by M.G.R.University, Chennai.Vol.no.1, pp.190-195, Dec.2007

23. Suganthi Mullainathan, Ramesh Natarajan, “An SPSS and CNN modelling based quality assessment using ceramic materials and membrane filtration techniques”, Revista Materia (Rio J.) Vol. 30, 2025, DOI: https://doi.org/10.1590/1517-7076-RMAT-2024-0721

24. M Suganthi, N Ramesh, “Treatment of water using natural zeolite as membrane filter”, Journal of Environmental Protection and Ecology, Volume 23, Issue 2, pp: 520-530,2022

25. L. Lazos, S. Liu, and M. Krunz.Mitigating control-channel jammingattacks in multi-channel ad hoc networks. In Proceedings of the 2ndACM conference on wireless network security, pages 169–180, 2009.

26. G. Lin and G. Noubir. On link layer denial of service in data wirelessLANs. Wireless Communications and Mobile Computing, 5(3):273–284,May 2004.

27. X. Liu, G. Noubir, and R. Sundaram. Spread: Foiling smart jammersusing multi-layer agility. In Proceedings of INFOCOM, pages 2536–2540, 2007.

28. Y. Liu, P. Ning, H. Dai, and A. Liu. Randomized differential DSSS:Jamming-resistant wireless broadcast communication. In Proceedingsof INFOCOM, San Diego, 2010.

29. R. C. Merkle. Secure communications over insecure channels. Com-munications of the ACM, 21(4):294–299, 1978.

30. G. Noubir and G. Lin. Low-poTherDoS attacks in data wireless lansand countermeasures. Mobile Computing and Communications Review,7(3):29–30, 2003.

31. OPNET. OPNETtmmodeler 14.5. http://www.opnet.com/.

32. C. Perkins, E. Belding-Royer, and S. Das. RFC 3561: Ad hoc ondemanddistance vector (AODV) routing. Internet RFCs, 2003.

33. S.Tamilselvi, R.Prakash, C.Nagarajan,“Solar System Integrated Smart Grid Utilizing Hybrid Coot-Genetic Algorithm Optimized ANN Controller” Iranian Journal Of Science And Technology-Transactions Of Electrical Engineering, DOI10.1007/s40998-025-00917-z,2025

34. S.Tamilselvi, R.Prakash, C.Nagarajan,“ Adaptive sliding mode control of multilevel grid-connected inverters using reinforcement learning for enhanced LVRT performance” Electric Power Systems Research 253 (2026) 112428, doi.org/10.1016/j.epsr.2025.112428

35. S.Thirunavukkarasu, C. Nagarajan, 2024, “Performance Investigation on OCF and SCF study in BLDC machine using FTANN Controller," Journal of Electrical Engineering And Technology, Volume 20, pages 2675–2688, (2025), doi.org/10.1007/s42835-024-02126-w

36. C. Nagarajan, M.Madheswaran and D.Ramasubramanian- ‘Development of DSP based Robust Control Method for General Resonant Converter Topologies using Transfer Function Model’- Acta Electrotechnica et Informatica Journal , Vol.13 (2), pp.18-31,April-June.2013, DOI: 10.2478/aeei-2013-0025.

37. C.Nagarajan and M.Madheswaran - ‘DSP Based Fuzzy Controller for Series Parallel Resonant converter’- Springer, Frontiers of Electrical and Electronic Engineering, Vol. 7(4), pp. 438-446, Dec.12. DOI 10.1007/s11460-012-0212-0.

38. C.Nagarajan and M.Madheswaran - ‘Experimental Study and steady state stability analysis of CLL-T Series Parallel Resonant Converter with Fuzzy controller using State Space Analysis’- Iranian Journal of Electrical & Electronic Engineering, Vol.8 (3), pp.259-267, September 2012.

39. C.Nagarajan and M.Madheswaran, “Analysis and Simulation of LCL Series Resonant Full Bridge Converter Using PWM Technique with Load Independent Operation” has been presented in ICTES’08, a IEEE / IET International Conference organized by M.G.R.University, Chennai.Vol.no.1, pp.190-195, Dec.2007

40. Suganthi Mullainathan, Ramesh Natarajan, “An SPSS and CNN modelling based quality assessment using ceramic materials and membrane filtration techniques”, Revista Materia (Rio J.) Vol. 30, 2025, DOI: https://doi.org/10.1590/1517-7076-RMAT-2024-0721

41. M Suganthi, N Ramesh, “Treatment of water using natural zeolite as membrane filter”, Journal of Environmental Protection and Ecology, Volume 23, Issue 2, pp: 520-530,2022

42. Yoong Choon Chang, Sze Wei Lee and Ryoichi Komiya, Members, IEEE “A Low-Complexity Unequal Error Protection of H.264/AVC Video Using Adaptive Hierarchical QAM” IEEE Transactions on Consumer Electronics, Vol. 52, No. 4, NOVEMBER 2006.

43. Y. Pei and J.W. Modestino “Cross-Layer Design for Video Transmission over Wireless Rician Slow-Fading Channels Using an Adaptive Multiresolution Modulation and Coding Scheme” Hindawi Publishing Corporation EURASIP Journal on Advances in Signal Processing Volume 2007, Article ID 86915, 12 pages doi:10.1155/2007/86915.

Downloads

Published

2026-03-28

How to Cite

Jamming Attack Prevention in Wireless Network using Packet Hiding Methods. (2026). International Journal of Engineering & Extended Technologies Research (IJEETR), 8(2), 3162-3167. https://doi.org/10.15662/IJEETR.2026.0802318