You are on page 1of 9

Packet-Hiding Methods for Preventing Selective Jamming Attacks

Submitted by

ABSTRACT
The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This Jamming in wireless transmissions cause mounting Denial-of-Service attacks on wireless networks. Jamming has been addressed under an external threat model. However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter.

INTRODUCTION
In this work, we address the problem of selective jamming attacks in wireless networks. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. The selective jamming attacks can be launched by performing real-time packet classification at the physical layer. To mitigate these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication overhead.

SYSTEM REQUIREMENTS
HARDWARE REQUIREMENTS CPU type :Intel Pentium 4 Clock speed :3.0 GHz RAM size :512 MB Hard disk capacity :40 GB Monitor type :15 Inch Color Monitor Keyboard type :Internet Keyboard CD -drive type :52xmax

SOFTWARE REQUIREMENTS Operating System :Windows XP Front End :C#.NET Back End :MS-SQLSERVER Documentation :MS-Office

EXISTING SYSTEM
Jamming attacks include the continuous or random transmission of high-power interference signals and the adversary has to jam frequency bands. Conventional anti jamming techniques rely extensively on spread-spectrum (SS) communications provide bit-level protection by spreading bits according to a secret pseudo noise (PN) code. We address the problem of jamming under an internal threat model. The implementation details of network protocols at any layer in the network stack provides specific messages of high importance are targeted. Drawbacks: It only protect wireless transmissions under the external threat model and Broadcast communications are particularly vulnerable under an internal threat

PROPOSED SYSTEM
The proposed SHCS requires the joint consideration of the MAC and PHY layers. To reduce the overhead of SHCS, the recommitments value d is carried in the same packet as the committed value C. To achieve the strong hiding property, a sub layer called the hiding sub layer is inserted between the MAC and the PHY layers. Using their model, the authors proposed selective jamming strategies for well-known sensor network MAC protocols Advantage:Selective hiding will avoid the jamming in network and Increase the security in all transmission

MODULE DESCRIPTION
Network Model. Communication Model. Adversary Model

Selective Jamming at the Transport Layer


Selective Jamming at the Network Layer Mapping to Commitment Schemes A Strong Hiding Commitment Scheme (SHCS) Implementation Details of SHCS

REFERANCES
Alejandro and Lazos, Packet-Hiding Methods for Preventing Selective Jamming Attacks, IEEE TRANS.Dependable and secure computing ,Vol. 9, No. 1, Jan-Feb 2012 P. Tague, M. Li, and R. Poovendran. Mitigation of control channel jamming under node capture attacks. IEEE Transactions on Mobile Computing, 8(9):12211234, 2009. W. Xu, W. Trappe, and Y. Zhang. Anti-jamming timing channels for wireless networks. In Proceedings of WiSec, pages 203213, 2008.

THANK YOU

You might also like