ABSTRACT
The effort of this article is regarding to detect jamming attacks in wireless networks. The Jamming detection and
techniques have been proposed in the journalism. They established results by the authors are often CA and JADE
as most of the jamming regions are closely marked, and they do not help to clearly differentiate jamming
mechanisms. We explore a different jamming attack by discovering the relationship between five parameters.
Packet delivery ratio, Total-message-size, Probability detection, Energy, End-To-End Delay and we are using
JADE Method for indentifying malicious node. This proposed system used to find out the jamming attack by
JADE Method and we used to protect our data by using Multi Key Generation algorithm. Jamming Attack
Detection based on Estimation (JADE) scheme and establishes the hacker. Multi Key Generation techniques have
been proposed in the journalism and it will be explained using through the encryption and decryption multiple
key pairs.
Keywords: - Jamming attacks, Types of jamming attacks, CA, JADE, and Multi Key Generation algorithm.