Jamming Attack Detection using Key Exchange in Wireless Network

S.Rajes wari, R.Mahes wari
2016 International Journal of Computer Trends and Technology  
The effort of this article is regarding to detect jamming attacks in wireless networks. The Jamming detection and techniques have been proposed in the journalism. They established results by the authors are often CA and JADE as most of the jamming regions are closely marked, and they do not help to clearly differentiate jamming mechanisms. We explore a different jamming attack by discovering the relationship between five parameters. Packet delivery ratio, Total-message-size, Probability
more » ... n, Energy, End-To-End Delay and we are using JADE Method for indentifying malicious node. This proposed system used to find out the jamming attack by JADE Method and we used to protect our data by using Multi Key Generation algorithm. Jamming Attack Detection based on Estimation (JADE) scheme and establishes the hacker. Multi Key Generation techniques have been proposed in the journalism and it will be explained using through the encryption and decryption multiple key pairs.
doi:10.14445/22312803/ijctt-v32p101 fatcat:toyndm5ofrac5h6nvulit5kgxa