You are on page 1of 32

Multiple-Path Routing Using Portfolio Selection for Congestion Avoidance

Presented By,
Biruntha.T (50808104006) Keerthiga.T.S (50808104028) Lilly Sara.A (50808104037) Mahalakshmi.N (50808104038)

Guided By,
M.Nalini ,ME(CSE)

Agenda

Abstract Existing System Proposed System Algorithm System Architecture System Requirements Modules Screen shots Conclusion Future Enhancement Reference Papers

Abstract
The jammer controls the probability of jamming and the transmission range. The jammer action ceases when it is detected by the network, and a notification message is transferred out of the jammed region. The network defends itself by computing the channel access probability to minimize the jamming detection plus notification time.

Existing System
Need prompt response. Network Intrusion Detection Systems (NIDS) attempt to detect such behavior and flag these port scanners as malicious. The sooner a NIDS detects malice, the lower the resulting damage.

Disadvantage
Disturb wireless communications Smaller number of connection Outsider / Insider Time Delay

Proposed System
Jamming attacks that are easy to launch but are difficult to detect and confront, since they differ from brute force attacks. To cause maximal damage to the network in terms of corrupted communication links. jammer action ceases when it is detected by one or more monitoring nodes, and a notification message is transferred out of the jamming region

Advantage
Easy to launch Notification message is transferred Capture the attacker

Literature Survey
1.Jamming Sensor Networks Attack and Defense Strategies. 2.JAM: A Jammed-Area Mapping Service for Sensor Networks. 3.Denial Of Service in Sensor Networks. 4.Attacks and Network Defense Policies in Wireless Sensor Networks. 5.Denial Of Service in Wireless Sensor Networks:Attacks and Defences

Algorithm

Heuristic algorithm for an efficient jamming strategy.

1.INSERT(initial-node, FRINGE) 2.Repeat: If FRINGE is empty then return failure n REMOVE (FRINGE) S STATE(n) IF GOAL(s) then return path or goal state For every state s in SUCCESSOR(s)
Create a node n INSERT(n,FRINGE)

System Architecture
Server Client A Monitoring the traffic

Client B

Client C

Algorithm

Node capturing attack

Data communication processing

System Requirements
HARDWARE REQUIREMENTS:

Hard Disk System Floppy Drive Monitor Mouse RAM

: 40 GB. : Pentium IV 2.4 GHz. : 1.44 Mb. : 15 VGA Colour. : Logitech. : 256 Mb.

SOFTWARE REQUIREMENTS:

Operating system : - Windows XP Professional. Coding Language: - Java. Tool Used : - Eclipse.

Modules
1. 2. 3. 4. 5.

Network module Channel Access module Control Message Access module Control Channel Jamming module Port Number Assignment

Modules Description
1. Network module
Partitions tasks or workloads between service providers (servers) and service requesters, called clients. Server machine is running one or more server programs which share its resources with clients

2. Channel Access module


Maintaining a degree of independence between the hopping sequences held by different users. Designing schemes which are robust to control channel jamming attacks by malicious colluding insiders or compromised users.

3. Control Message Access module


Providing probabilistic availability of control messages using random key assignment. We develop a correspondence between the problems of key establishment and control channel access in wireless networks and develop a framework

4. Control Channel Jamming module


Channel access protocol can perform a DoS attack. Access protocol uses a fixed predetermined schedule for data and control messages A control channel jamming attack focusing only on the control channels

5. Port Number Assignment


The monitor checks if the node is having any process running or any attacker has attached the node. Monitor assigns a port number for the node which is connected and the transmission is done.

Snapshots: Giving Inputs

Nodes Monitoring

Sending Data From Node1 to Node2 in Normal mode

Showing Notification Message

Sending File from Node1 to Node2

Shows Received Data

Sending Data from node3 to node2 in Attacker Mode

Original Data is Received

Raw data

Conclusion

Datas can be transmitted from Source to Destination successfully.(Client_Server communication) Congestion can be avoided based up on the Empirical Statistics method..

Future Enhancement
The network aims at alleviating the effect of the attack and exposing the attacker to detection. Jamming and defending strategies under these composite channel access protocols are left as a future research direction. Payoff functions will likely result in different optimal jamming and anti jamming strategies. Back-off and contention window adaptation are used to regulate the amount of transmitted traffic.

Reference Papers
M. Li, I. Koutsopoulos, and R. Poovendran, Optimal JammingAttacks and Defense Policies in Wireless Sensor Networks, Proc.IEEE INFOCOM, 2007. A.D. Wood and J.A. Stankovic, Denial of Service in Sensor Networks, Computer, vol. 35, no. 10, pp. 54-62, Oct 2002. W. Xu, K. Ma, W. Trappe, and Y. Zhang, Jamming sensor networks:Attack and defense strategies, IEEE Network, vol. 20, no. 3, pp. 4147,May/Jun. 2006. R. Negi and A. Perrig, Jamming Analysis of MAC Protocols,Carnegie Mellon Technical Memo, 2003.

Continued

J.M. McCune, E. Shi, A. Perrig, and M.K. Reiter, Detection ofDenial-of-Message Attacks on Sensor Network Broadcasts, Proc.IEEE Symp. Security and Privacy, 2005. R. Mallik, R. Scholtz, and G. Papavassilopoulos, Analysis of an On-Off Jamming Situation as a Dynamic Game, IEEE Trans.Comm., vol. 48, no. 8, pp. 1360-1373, Aug. 2000. G. Lin and G. Noubir, On Link-Layer Denial of Service in DataWireless LANs, Wiley J. Wireless Comm. and Mobile Computing,vol. 5, no. 3, pp. 273-284, May 2005.

Queries..?
&

Thank You!

You might also like