A Direct Discrimination Packet Flow Based Improving Security against Reactive Traffic Attacks in Wireless Communication
M. Vijayshanthi1, N. Kowsalya2

1M. Vijayshanthi, Sri Vijay Vidyalaya College of Arts and Sciences, Nallampalli, Dharmapuri, Tamil Nadu, India.
2Dr. N. Kowsalya, Assistant Professor, PG & Research Department of Computer Science, Nallampalli, Dharmapuri, Tamil Nadu, India.
Manuscript received on November 22, 2019. | Revised Manuscript received on December 15, 2019. | Manuscript published on December 30, 2019. | PP: 4616-4621 | Volume-9 Issue-2, December, 2019. | Retrieval Number: B3273129219/2019©BEIESP | DOI: 10.35940/ijeat.B3273.129219
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The wireless networks is most difficult of selective filling attacks. If jammer localizations and resistance routing are left alone, both are very promising, and the service overhead is still below the real-time requirements. To propose a new Direct Discriminant Packet Flow Exploration [DDPFE] algorithm based on network utility maximization (NUM) to resolve the centralized reaction disturbance optimization problem in multi-source network without any lose to send the data. The impact of the networks is estimated through interference and combine these estimates with the ability to assign problems in this type of attacks. To overcome this type of physical-layer characterization of cryptographic primitives attacks using a Cooperative Crypto Riddle Hiding Algorithm (CCRHA) for the control channel jamming problem in-network, which takes advantage of the transfer the data using the Ad-hoc network. The resolution to detect the schema attacks and isolate the nodes for the threshold. CCRHA Presenting to find selectively invasive attackers in wireless networks. Multiple metrics are measured to detect areas of interference of the wireless network. Multi-measurement method considered Packet Delivery Ratio (PDR) and signals strength variation as parameters to detect the selective jamming attacks.
Keywords: Ad-hoc network, Cooperative Crypto Riddle Hiding Algorithm, Direct Discriminant Packet Flow Exploration, Network Utility Maximization, Reactive Jamming Attack.