You are on page 1of 8

PROVIDING NETWORK SECURITY BY PREVENTING

SELECTIVE JAMMING ATTACK


Submitted by
G. SATHISH KUMAR
( 11MCS1027 )
in partial fulfillment for the award of the degree
of
MASTER OF ENGINEERING
in
COMPUTER SCIENCE AND ENGINEERING

NOVEMBER 2012
DEPARTMENT OF
COMPUTER SCIENCE AND ENGINEERING

M.KUMARASAMY COLLEGE OF ENGINEERING


(An Autonomous Institution Affiliated to Anna University, Chennai)

KARUR-639 113
M.KUMARASAMY COLLEGE OF ENGINEERING
i

(An Autonomous Institution)


KARUR-639 113
Department of Computer Science and Engineering
PROJECT WORK
PHASE I

PROVIDING NETWORK SECURITY BY PREVENTING


SELECTIVE JAMMING ATTACK
Bonafide record of work done by

G. SATHISH KUMAR
( 11MCS1027 )
Dissertation submitted in partial fulfilment for the award of the degree
of

MASTER OF ENGINEERING
in
COMPUTER SCIENCE AND ENGINEERING

NOVEMBER 2012
Supervisor
Mrs.V.Durgadevi M.Tech.
Assistant professor/CSE

Head of the Department


Dr.P.Sudhakar M.Tech.,Ph.D.
HOD/CSE

Certified that the candidate was examined in the viva-voce examination held on 05.11.2012

(Internal Examiner)

(External Examiner)

ii

DECLARATION

I affirm that the project work titled PROVIDING NETWORK SECURITY BY


PREVENTING SELECTIVE JAMMING ATTACK being submitted in partial
fulfillment for the award of M.E (COMPUTER SCIENCE AND
ENGINEERING) is the original work carried out by me. It has not formed the
part of any other project work submitted for award of any degree or diploma, either
in this or any other University.

G. SATHISH KUMAR
( 11MCS1027 )

I certify that the declaration made above by the candidate is true.

Mrs.V.Durgadevi M.Tech.
Assistant Professor,
Department of CSE,
M.Kumarasamy College of Engineering,
Karur 639 113.

ACKNOWLEDGEMENT
iii

My first an foremost, praises and thanks to the GOD the Almighty, for the
blessings. He had bestowed upon me to complete my project phase-I successfully.
I would like to express my profuse gratitude to Thiru.M.KUMARASAMY,
CHAIRMAN and Dr.K.RAMAKRISHNAN B.E., SECRETARY of our college
for providing extra ordinary infrastructure, which helped me in the completion of
the project phase I in time.
I would like to express my sincere thanks to Dr.D.VALAVAN M.Tech.,
Ph.D., PRINCIPAL, for providing facilities to successfully carry the project phase
I.
I sincerely thank Dr.P.SUDHAKAR M.Tech., Ph.D., HEAD OF THE
DEPARTMENT for his valuable guidance and constant encouragement, valuable
suggestions and support rendered in making my project a success.
I thank my guide Mrs.V.DURGADEVI M.Tech., Assistant professor,
Department of CSE for her constant encouragement, kind co-operation, valuable
suggestion and support rendered in making my project phase-I a success.
I thank all the FACULTY MEMBERS of the department of Computer
Science and Engineering who gave me many suggestions from time-time that made
my project work better and well furnished.
I take this beautiful opportunity to thank my PARENTS and FRIENDS for
giving me so much confidence and strength to work on my project.

ABSTRACT
iv

Wireless networks are susceptible to numerous security threats due to the open nature of
the wireless medium. Anyone with a transceiver can eavesdrop on ongoing transmissions, inject
spurious messages, or block the transmission of legitimate ones. The open nature of the wireless
medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming.
Jamming can interrupt wireless transmission and occur by mistake in form of interference, noise
or as collision at the receiver or in the circumstance of an attack. This intentional interference
with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks
on wireless networks. Typically, jamming has been addressed under an external threat model.
However, adversaries with internal knowledge of protocol specifications and network secrets can
launch low-effort jamming attacks that are difficult to detect and counter. In selective jamming
attacks, an active jammer turns on and off the jamming signals periodically or randomly, so the
energy consumption will be less and the identification of such a node will be harder. In the
selective jamming attacks, the adversary is active only for a short period of time, selectively
targeting messages of high importance. Those selective jamming attacks can be launched by
performing real-time packet classification at the physical layer. In this paper, multiple-path
source routing protocols is proposed to allow a data source node to distribute the total traffic
among available paths. Jamming-aware source routing is proposed, in which the source node
performs traffic allocation based on empirical jamming statistics at individual nodes and flow
optimization problem using portfolio selection theory. Here, in multi-source networks, the
centralized optimization problem can be solved using a distributed algorithm based on
decomposition in Network Utility Maximization (NUM). To mitigate the selective jamming
attack, three methods were proposed to prevent real-time packet classification by combining
cryptographic primitive measures with physical layer attributes.

CONTENTS

CHAPTER

TITLE

NO

PAGE
NO

INTRODUCTION

LITERATURE SURVEY

EXISTING SYSTEM

PROBLEM DESCRIPTION

10

EXECUTION OF PHASE-II

12

REFERENCES

14

LIST OF FIGURES

FIGURE

TITLE

NO
vi

PAGE NO

REALIZATION OF A SELECTIVE JAMMING ATTACK

LIST OF ABBREVATIONS

AODV

Ad Hoc On-Demand Distance Vector

CSS

Chirp Spread Spectrum

DoS

Denial-of-Service

DSSS

Direct Sequence Spread Spectrum

FER

Frame Error Rate


vii

FHSS

Frequency Hopping Spread Spectrum

MAC

Medium Access Control

NUM

Network Utility Maximization

PN

Pseudo-Noise

RD-DSSS

Randomized Differential DSSS

RF

Radio Frequency

RREQ

Route Request

SS

Spread-Spectrum

viii

You might also like