Wireless networks introduce potential security vulnerabilities due to the shared nature of wireless channels. In wireless sensor network we have so many issues under jamming attacks. A wireless network that uses multiple frequency and code channels to provide jamming attacks resilience for smart grid applications (group of system connected in source provider). A synergistic combination of multipath relay transmissions, K-out-of N message encoding, packet encryption, heteromorphy packet relay and dynamically assignable IP addresses. The characteristics of the virtual network topology and protocols together impede the attacker's ability to analyze traffic patterns, limit the visibility of real IP addresses to those cooperating hosts that are topologically adjacent to a host whose traffic is being monitored, and allow hosts to spread their IP identities and to modify the IPs associated with a host. By defining a generic overcrowding process that characterizes a wide range of existing jamming models, we show that the worst-case message delay is a U-shaped function of network traffic load. This indicates that, interestingly, increasing a fair amount of redundant traffic, called camouflage, can improve the worst-case delay performance.
No. of Downloads :