Professional Documents
Culture Documents
Presented By,
Biruntha.T (50808104006) Keerthiga.T.S (50808104028) Lilly Sara.A (50808104037) Mahalakshmi.N (50808104038)
Guided By,
M.Nalini ,ME(CSE)
Agenda
Abstract Existing System Proposed System Algorithm System Architecture System Requirements Modules Screen shots Conclusion Future Enhancement Reference Papers
Abstract
The jammer controls the probability of jamming and the transmission range. The jammer action ceases when it is detected by the network, and a notification message is transferred out of the jammed region. The network defends itself by computing the channel access probability to minimize the jamming detection plus notification time.
Existing System
Need prompt response. Network Intrusion Detection Systems (NIDS) attempt to detect such behavior and flag these port scanners as malicious. The sooner a NIDS detects malice, the lower the resulting damage.
Disadvantage
Disturb wireless communications Smaller number of connection Outsider / Insider Time Delay
Proposed System
Jamming attacks that are easy to launch but are difficult to detect and confront, since they differ from brute force attacks. To cause maximal damage to the network in terms of corrupted communication links. jammer action ceases when it is detected by one or more monitoring nodes, and a notification message is transferred out of the jamming region
Advantage
Easy to launch Notification message is transferred Capture the attacker
Literature Survey
1.Jamming Sensor Networks Attack and Defense Strategies. 2.JAM: A Jammed-Area Mapping Service for Sensor Networks. 3.Denial Of Service in Sensor Networks. 4.Attacks and Network Defense Policies in Wireless Sensor Networks. 5.Denial Of Service in Wireless Sensor Networks:Attacks and Defences
Algorithm
1.INSERT(initial-node, FRINGE) 2.Repeat: If FRINGE is empty then return failure n REMOVE (FRINGE) S STATE(n) IF GOAL(s) then return path or goal state For every state s in SUCCESSOR(s)
Create a node n INSERT(n,FRINGE)
System Architecture
Server Client A Monitoring the traffic
Client B
Client C
Algorithm
System Requirements
HARDWARE REQUIREMENTS:
: 40 GB. : Pentium IV 2.4 GHz. : 1.44 Mb. : 15 VGA Colour. : Logitech. : 256 Mb.
SOFTWARE REQUIREMENTS:
Operating system : - Windows XP Professional. Coding Language: - Java. Tool Used : - Eclipse.
Modules
1. 2. 3. 4. 5.
Network module Channel Access module Control Message Access module Control Channel Jamming module Port Number Assignment
Modules Description
1. Network module
Partitions tasks or workloads between service providers (servers) and service requesters, called clients. Server machine is running one or more server programs which share its resources with clients
Nodes Monitoring
Raw data
Conclusion
Datas can be transmitted from Source to Destination successfully.(Client_Server communication) Congestion can be avoided based up on the Empirical Statistics method..
Future Enhancement
The network aims at alleviating the effect of the attack and exposing the attacker to detection. Jamming and defending strategies under these composite channel access protocols are left as a future research direction. Payoff functions will likely result in different optimal jamming and anti jamming strategies. Back-off and contention window adaptation are used to regulate the amount of transmitted traffic.
Reference Papers
M. Li, I. Koutsopoulos, and R. Poovendran, Optimal JammingAttacks and Defense Policies in Wireless Sensor Networks, Proc.IEEE INFOCOM, 2007. A.D. Wood and J.A. Stankovic, Denial of Service in Sensor Networks, Computer, vol. 35, no. 10, pp. 54-62, Oct 2002. W. Xu, K. Ma, W. Trappe, and Y. Zhang, Jamming sensor networks:Attack and defense strategies, IEEE Network, vol. 20, no. 3, pp. 4147,May/Jun. 2006. R. Negi and A. Perrig, Jamming Analysis of MAC Protocols,Carnegie Mellon Technical Memo, 2003.
Continued
J.M. McCune, E. Shi, A. Perrig, and M.K. Reiter, Detection ofDenial-of-Message Attacks on Sensor Network Broadcasts, Proc.IEEE Symp. Security and Privacy, 2005. R. Mallik, R. Scholtz, and G. Papavassilopoulos, Analysis of an On-Off Jamming Situation as a Dynamic Game, IEEE Trans.Comm., vol. 48, no. 8, pp. 1360-1373, Aug. 2000. G. Lin and G. Noubir, On Link-Layer Denial of Service in DataWireless LANs, Wiley J. Wireless Comm. and Mobile Computing,vol. 5, no. 3, pp. 273-284, May 2005.
Queries..?
&
Thank You!