SlideShare a Scribd company logo
1 of 18
Download to read offline
Packet-Hiding Methods for
   Preventing Selective
    Jamming Attacks
        PRESENTED BY




CONTACT: (0) 9952649690
PRESENTED BY


        JP INFOTECH,

           BLOG:
WWW.JPINFOTECH.BLOGSPT.COM

          EMAIL:
JPIFNOTECHPROJECTS@GMAIL
           .COM

    CONTACT: (0) 9952649690
ABSTRACT

• In this work, we address the problem of selective jamming attacks in
  wireless networks. In these attacks, the adversary is active only for a short
  period of time, selectively targeting messages of high importance. We
  illustrate the advantages of selective jamming in terms of network
  performance degradation and adversary effort by presenting two case
  studies; a selective attack on TCP and one on routing.

• We show that selective jamming attacks can be launched by performing
  real-time packet classification at the physical layer. To mitigate these
  attacks, we develop three schemes that prevent real-time packet
  classification by combining cryptographic primitives with physical-layer
  attributes. We analyze the security of our methods and evaluate their
  computational and communication overhead.
AIM

• To show that selective jamming attacks can be
  launched by performing real time packet
  classification at the physical layer. To mitigate
  these attacks develop a schemes that prevent
  real-time packet classification by combining
  cryptographic primitives with physical layer
  attributes.
SYNOPSIS

• To address the problem of jamming under an internal threat
  model and consider a sophisticated adversary who is aware of
  network secrets and the implementation details of network
  protocols at any layer in the network stack. The adversary
  exploits his internal knowledge for launching selective
  jamming attacks in which specific messages of high
  importance are targeted. For example, a jammer can target
  route-request/route-reply messages at the routing layer to
  prevent route discovery, or target TCP acknowledgments in a
  TCP session to severely degrade the throughput of an end-to-
  end flow.
ARCHITECTURE
   Node                   Node               Cach
   A                      B                  e
                                             Node
              Node Path                           Encryption
                                    Node C        using 1 of
   Jam
   mer                                            3
   Node                                           schemes.


Blocks
Route
request and                                  Decryption
reply                                        of message.
                Intermediate
                Server
                (Checks the Inter
                Node’s)
                                             DB

                     Server
                 (webService
                 Request)


                           Webservice
                           req/rec
Application
EXISTING SYTEM

• Conventional anti-jamming techniques rely
  extensively     on    spread-spectrum      (SS)
  communications or some form of jamming
  evasion (e.g., slow frequency hopping, or
  spatial retreats). SS techniques provide bit-
  level protection by spreading bits according to
  a secret pseudo-noise (PN) code, known only
  to the communicating parties. These methods
  can only protect wireless transmissions under
  the external threat model.
DISADVANTAGES OF EXISTING
           SYSTEM
• Broadcast communications are particularly
  vulnerable under an internal threat model
  because all intended receivers must be aware
  of the secrets used to protect transmissions.
• Hence, the compromise of a single receiver is
  sufficient to reveal relevant cryptographic
  information.
PROPOSED SYSTEM

• An intuitive solution to selective jamming
  would be the encryption of transmitted
  packets (including headers) with a static key.
  However, for broadcast communications, this
  static decryption key must be known to all
  intended receivers and hence, is susceptible to
  compromise. Moreover, even if the encryption
  key of a hiding scheme were to remain secret,
  the static portions of a transmitted packet
  could potentially lead to packet classification.
ADVANTAGES OF PROPOSED
            SYSTEM
• Relatively easy to actualize by exploiting knowledge
  of network protocols and cryptographic primitives
  extracted from compromised nodes

• Our findings indicate that selective jamming attacks
  lead to a DoS with very low effort on behalf of the
  jammer.

• Achieve strong security properties
MODULES

•   Real Time Packet Classification
•   A Strong Hiding Commitment Scheme
•   Cryptographic Puzzle Hiding Scheme
•   Hiding based on All-Or-Nothing
    Transformations
Real Time Packet Classification:

• At the Physical layer, a packet m is encoded,
  interleaved, and modulated before it is transmitted
  over the wireless channel. At the receiver, the signal
  is demodulated, deinterleaved and decoded to
  recover the original packet m. Nodes A and B
  communicate via a wireless link. Within the
  communication range of both A and B there is a
  jamming node J. When A transmits a packet m to B,
  node J classifies m by receiving only the first few
  bytes of m. J then corrupts m beyond recovery by
  interfering with its reception at B.
A Strong Hiding Commitment
             Scheme
• A strong hiding commitment scheme (SHCS),
  which is based on symmetric cryptography.
  Assume that the sender has a packet for
  Receiver. First, S constructs commit( message )
  the commitment function is an off-the-shelf
  symmetric encryption algorithm is a publicly
  known permutation, and k is a randomly
  selected key of some desired key length s (the
  length of k is a security parameter). Upon
  reception of d, any receiver R computes.
Cryptographic Puzzle Hiding
               Scheme
• A sender S have a packet m for transmission. The sender
  selects a random key k , of a desired length. S generates a
  puzzle (key, time), where puzzle() denotes the puzzle
  generator function, and tp denotes the time required for the
  solution of the puzzle. Parameter is measured in units of time,
  and it is directly dependent on the assumed computational
  capability of the adversary, denoted by N and measured in
  computational operations per second. After generating the
  puzzle P, the sender broadcasts (C, P). At the receiver side, any
  receiver R solves the received puzzle to recover key and then
  computes.
Hiding based on All-Or-Nothing
         Transformations
• The packets are pre-processed by an AONT
  before transmission but remain unencrypted.
  The jammer cannot perform packet
  classification until all pseudo-messages
  corresponding to the original packet have
  been received and the inverse transformation
  has been applied.
CONCLUSION:

• We evaluated the impact of selective jamming
  attacks on network protocols such as TCP and
  routing. Our findings show that a selective
  jammer can significantly impact performance
  with very low effort. We developed three
  schemes that transform a selective jammer to
  a random one by preventing real-time packet
  classification.
REFERENCE:

• Alejandro Proan˜o and Loukas Lazos, “Packet-
  Hiding Methods for Preventing Selective
  Jamming Attacks” IEEE TRANSACTIONS ON
  DEPENDABLE AND SECURE COMPUTING,
  VOL. 9, NO. 1, JANUARY/FEBRUARY 2012.
WWW.JPINFOTECH.BLOGSPOT.COM



         PRESENTED BY




  CONTACT: (0) 9952649690

More Related Content

What's hot

Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksnagibtech
 
Packet hiding methods for preventing selective
Packet hiding methods for preventing selectivePacket hiding methods for preventing selective
Packet hiding methods for preventing selectiveveenasraj
 
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet  Hiding MethodsJamming Attacks Prevention in Wireless Networks Using Packet  Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding MethodsIOSR Journals
 
muti path encrypted data security architecture for mobile adhoc networks
muti path encrypted data security architecture for mobile adhoc networksmuti path encrypted data security architecture for mobile adhoc networks
muti path encrypted data security architecture for mobile adhoc networksPraveen Yadav
 
Hiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesHiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesPriyangaRajaram
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attackseSAT Publishing House
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackIJCERT
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...IJMER
 
Minimum cost blocking problem in multi path wireless routing protocols
Minimum cost blocking problem in multi path wireless routing protocolsMinimum cost blocking problem in multi path wireless routing protocols
Minimum cost blocking problem in multi path wireless routing protocolsJPINFOTECH JAYAPRAKASH
 
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...IOSR Journals
 
A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...Mumbai Academisc
 
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLINGAN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLINGSreelekshmi S
 
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...ijiert bestjournal
 
20080502 software verification_sharygina_lecture03
20080502 software verification_sharygina_lecture0320080502 software verification_sharygina_lecture03
20080502 software verification_sharygina_lecture03Computer Science Club
 
An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...IAEME Publication
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attackRaj Sikarwar
 

What's hot (20)

Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Packet hiding methods for preventing selective
Packet hiding methods for preventing selectivePacket hiding methods for preventing selective
Packet hiding methods for preventing selective
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet  Hiding MethodsJamming Attacks Prevention in Wireless Networks Using Packet  Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
 
muti path encrypted data security architecture for mobile adhoc networks
muti path encrypted data security architecture for mobile adhoc networksmuti path encrypted data security architecture for mobile adhoc networks
muti path encrypted data security architecture for mobile adhoc networks
 
Hiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesHiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniques
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming Attack
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
 
Minimum cost blocking problem in multi path wireless routing protocols
Minimum cost blocking problem in multi path wireless routing protocolsMinimum cost blocking problem in multi path wireless routing protocols
Minimum cost blocking problem in multi path wireless routing protocols
 
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
 
A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...
 
Ijnsa050211
Ijnsa050211Ijnsa050211
Ijnsa050211
 
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLINGAN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
 
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
 
20080502 software verification_sharygina_lecture03
20080502 software verification_sharygina_lecture0320080502 software verification_sharygina_lecture03
20080502 software verification_sharygina_lecture03
 
An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...An enhanced ip traceback mechanism for tracking the attack source using packe...
An enhanced ip traceback mechanism for tracking the attack source using packe...
 
Grayhole
GrayholeGrayhole
Grayhole
 
A43030104
A43030104A43030104
A43030104
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attack
 

Viewers also liked

Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperJPINFOTECH JAYAPRAKASH
 
2012 13 ieee dotnet titles- jp infotech
2012 13 ieee dotnet titles- jp infotech2012 13 ieee dotnet titles- jp infotech
2012 13 ieee dotnet titles- jp infotechJPINFOTECH JAYAPRAKASH
 
Generating summary risk scores for mobile applications
Generating summary risk scores for mobile applicationsGenerating summary risk scores for mobile applications
Generating summary risk scores for mobile applicationsJPINFOTECH JAYAPRAKASH
 
A secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwardingA secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwardingJPINFOTECH JAYAPRAKASH
 
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
Distributed, Concurrent, and Independent Access to Encrypted Cloud DatabasesDistributed, Concurrent, and Independent Access to Encrypted Cloud Databases
Distributed, Concurrent, and Independent Access to Encrypted Cloud DatabasesJPINFOTECH JAYAPRAKASH
 
Cloud mov cloud based mobile social tv
Cloud mov cloud based mobile social tvCloud mov cloud based mobile social tv
Cloud mov cloud based mobile social tvJPINFOTECH JAYAPRAKASH
 
A distributed control law for load balancing in content delivery networks
A distributed control law for load balancing in content delivery networksA distributed control law for load balancing in content delivery networks
A distributed control law for load balancing in content delivery networksJPINFOTECH JAYAPRAKASH
 
Social tube p2p assisted video sharing inonline social networks
Social tube p2p assisted video sharing inonline social networksSocial tube p2p assisted video sharing inonline social networks
Social tube p2p assisted video sharing inonline social networksJPINFOTECH JAYAPRAKASH
 
A novel data embedding method using adaptive pixel pair matching
A novel data embedding method using adaptive pixel pair matchingA novel data embedding method using adaptive pixel pair matching
A novel data embedding method using adaptive pixel pair matchingJPINFOTECH JAYAPRAKASH
 
Back pressure-based packet-by-packet adaptive routing in communication networks
Back pressure-based packet-by-packet adaptive routing in communication networksBack pressure-based packet-by-packet adaptive routing in communication networks
Back pressure-based packet-by-packet adaptive routing in communication networksJPINFOTECH JAYAPRAKASH
 
A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...JPINFOTECH JAYAPRAKASH
 
A low complexity congestion control and scheduling algorithm for multihop wir...
A low complexity congestion control and scheduling algorithm for multihop wir...A low complexity congestion control and scheduling algorithm for multihop wir...
A low complexity congestion control and scheduling algorithm for multihop wir...JPINFOTECH JAYAPRAKASH
 

Viewers also liked (16)

Twitsper tweeting privately
Twitsper tweeting privatelyTwitsper tweeting privately
Twitsper tweeting privately
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
2012 13 ieee dotnet titles- jp infotech
2012 13 ieee dotnet titles- jp infotech2012 13 ieee dotnet titles- jp infotech
2012 13 ieee dotnet titles- jp infotech
 
Generating summary risk scores for mobile applications
Generating summary risk scores for mobile applicationsGenerating summary risk scores for mobile applications
Generating summary risk scores for mobile applications
 
A secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwardingA secure erasure code based cloud storage system with secure data forwarding
A secure erasure code based cloud storage system with secure data forwarding
 
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
Distributed, Concurrent, and Independent Access to Encrypted Cloud DatabasesDistributed, Concurrent, and Independent Access to Encrypted Cloud Databases
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
 
Cloud mov cloud based mobile social tv
Cloud mov cloud based mobile social tvCloud mov cloud based mobile social tv
Cloud mov cloud based mobile social tv
 
A distributed control law for load balancing in content delivery networks
A distributed control law for load balancing in content delivery networksA distributed control law for load balancing in content delivery networks
A distributed control law for load balancing in content delivery networks
 
Social tube p2p assisted video sharing inonline social networks
Social tube p2p assisted video sharing inonline social networksSocial tube p2p assisted video sharing inonline social networks
Social tube p2p assisted video sharing inonline social networks
 
A novel data embedding method using adaptive pixel pair matching
A novel data embedding method using adaptive pixel pair matchingA novel data embedding method using adaptive pixel pair matching
A novel data embedding method using adaptive pixel pair matching
 
Whole test suite generation
Whole test suite generationWhole test suite generation
Whole test suite generation
 
Back pressure-based packet-by-packet adaptive routing in communication networks
Back pressure-based packet-by-packet adaptive routing in communication networksBack pressure-based packet-by-packet adaptive routing in communication networks
Back pressure-based packet-by-packet adaptive routing in communication networks
 
A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...A framework for routing performance analysis in delay tolerant networks with ...
A framework for routing performance analysis in delay tolerant networks with ...
 
2012-2013 IEEE JAVA PROJECT TITLES
2012-2013 IEEE JAVA PROJECT TITLES2012-2013 IEEE JAVA PROJECT TITLES
2012-2013 IEEE JAVA PROJECT TITLES
 
2015 2016 ieee java project titles
2015 2016 ieee java project titles2015 2016 ieee java project titles
2015 2016 ieee java project titles
 
A low complexity congestion control and scheduling algorithm for multihop wir...
A low complexity congestion control and scheduling algorithm for multihop wir...A low complexity congestion control and scheduling algorithm for multihop wir...
A low complexity congestion control and scheduling algorithm for multihop wir...
 

Similar to Packet hiding methods for preventing selective jamming attacks

A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksIJMER
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
A Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetA Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetIJSRD
 
Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsGiancarlo Romeo
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File MulticastYoss Cohen
 
Types Of Attacks In Comnputer Security
Types Of Attacks In Comnputer SecurityTypes Of Attacks In Comnputer Security
Types Of Attacks In Comnputer SecurityMegan Itoh
 
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLESSELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLESIJNSA Journal
 
Selective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesSelective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesIJNSA Journal
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
 
Ij a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communicationIj a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communicationshobanavsm
 
TAM new report
TAM new reportTAM new report
TAM new reportSuzit Punk
 

Similar to Packet hiding methods for preventing selective jamming attacks (20)

A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
Container-Beating Approaches for Avoiding Discriminative Cramming AssaultsContainer-Beating Approaches for Avoiding Discriminative Cramming Assaults
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
 
A Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetA Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manet
 
Paper copy
Paper   copyPaper   copy
Paper copy
 
Use of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing AlgorithmsUse of NS-2 to Simulate MANET Routing Algorithms
Use of NS-2 to Simulate MANET Routing Algorithms
 
Nt1310 Unit 5 Paper
Nt1310 Unit 5 PaperNt1310 Unit 5 Paper
Nt1310 Unit 5 Paper
 
Ar03302620266
Ar03302620266Ar03302620266
Ar03302620266
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File Multicast
 
Types Of Attacks In Comnputer Security
Types Of Attacks In Comnputer SecurityTypes Of Attacks In Comnputer Security
Types Of Attacks In Comnputer Security
 
D0961927
D0961927D0961927
D0961927
 
AD HOC.doc
AD HOC.docAD HOC.doc
AD HOC.doc
 
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLESSELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
 
Selective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesSelective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholes
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
Ij a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communicationIj a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communication
 
TAM new report
TAM new reportTAM new report
TAM new report
 
Bn25384390
Bn25384390Bn25384390
Bn25384390
 
Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
Pres_FORENSECURE
Pres_FORENSECUREPres_FORENSECURE
Pres_FORENSECURE
 

Recently uploaded

Philosophy of Education and Educational Philosophy
Philosophy of Education  and Educational PhilosophyPhilosophy of Education  and Educational Philosophy
Philosophy of Education and Educational PhilosophyShuvankar Madhu
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17Celine George
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxAditiChauhan701637
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?TechSoup
 
Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationMJDuyan
 
General views of Histopathology and step
General views of Histopathology and stepGeneral views of Histopathology and step
General views of Histopathology and stepobaje godwin sunday
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesMohammad Hassany
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapitolTechU
 
Patterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxPatterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxMYDA ANGELICA SUAN
 
UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.EnglishCEIPdeSigeiro
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17Celine George
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17Celine George
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesCeline George
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxEduSkills OECD
 
How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17Celine George
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICESayali Powar
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17Celine George
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17Celine George
 

Recently uploaded (20)

Philosophy of Education and Educational Philosophy
Philosophy of Education  and Educational PhilosophyPhilosophy of Education  and Educational Philosophy
Philosophy of Education and Educational Philosophy
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17
 
In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptx
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
Benefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive EducationBenefits & Challenges of Inclusive Education
Benefits & Challenges of Inclusive Education
 
General views of Histopathology and step
General views of Histopathology and stepGeneral views of Histopathology and step
General views of Histopathology and step
 
Human-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming ClassesHuman-AI Co-Creation of Worked Examples for Programming Classes
Human-AI Co-Creation of Worked Examples for Programming Classes
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptx
 
Prelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quizPrelims of Kant get Marx 2.0: a general politics quiz
Prelims of Kant get Marx 2.0: a general politics quiz
 
Patterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptxPatterns of Written Texts Across Disciplines.pptx
Patterns of Written Texts Across Disciplines.pptx
 
UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024UKCGE Parental Leave Discussion March 2024
UKCGE Parental Leave Discussion March 2024
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17
 
How to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 SalesHow to Manage Cross-Selling in Odoo 17 Sales
How to Manage Cross-Selling in Odoo 17 Sales
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
 
How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICE
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17
 
How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17How to Add Existing Field in One2Many Tree View in Odoo 17
How to Add Existing Field in One2Many Tree View in Odoo 17
 

Packet hiding methods for preventing selective jamming attacks

  • 1. Packet-Hiding Methods for Preventing Selective Jamming Attacks PRESENTED BY CONTACT: (0) 9952649690
  • 2. PRESENTED BY JP INFOTECH, BLOG: WWW.JPINFOTECH.BLOGSPT.COM EMAIL: JPIFNOTECHPROJECTS@GMAIL .COM CONTACT: (0) 9952649690
  • 3. ABSTRACT • In this work, we address the problem of selective jamming attacks in wireless networks. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. We illustrate the advantages of selective jamming in terms of network performance degradation and adversary effort by presenting two case studies; a selective attack on TCP and one on routing. • We show that selective jamming attacks can be launched by performing real-time packet classification at the physical layer. To mitigate these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication overhead.
  • 4. AIM • To show that selective jamming attacks can be launched by performing real time packet classification at the physical layer. To mitigate these attacks develop a schemes that prevent real-time packet classification by combining cryptographic primitives with physical layer attributes.
  • 5. SYNOPSIS • To address the problem of jamming under an internal threat model and consider a sophisticated adversary who is aware of network secrets and the implementation details of network protocols at any layer in the network stack. The adversary exploits his internal knowledge for launching selective jamming attacks in which specific messages of high importance are targeted. For example, a jammer can target route-request/route-reply messages at the routing layer to prevent route discovery, or target TCP acknowledgments in a TCP session to severely degrade the throughput of an end-to- end flow.
  • 6. ARCHITECTURE Node Node Cach A B e Node Node Path Encryption Node C using 1 of Jam mer 3 Node schemes. Blocks Route request and Decryption reply of message. Intermediate Server (Checks the Inter Node’s) DB Server (webService Request) Webservice req/rec Application
  • 7. EXISTING SYTEM • Conventional anti-jamming techniques rely extensively on spread-spectrum (SS) communications or some form of jamming evasion (e.g., slow frequency hopping, or spatial retreats). SS techniques provide bit- level protection by spreading bits according to a secret pseudo-noise (PN) code, known only to the communicating parties. These methods can only protect wireless transmissions under the external threat model.
  • 8. DISADVANTAGES OF EXISTING SYSTEM • Broadcast communications are particularly vulnerable under an internal threat model because all intended receivers must be aware of the secrets used to protect transmissions. • Hence, the compromise of a single receiver is sufficient to reveal relevant cryptographic information.
  • 9. PROPOSED SYSTEM • An intuitive solution to selective jamming would be the encryption of transmitted packets (including headers) with a static key. However, for broadcast communications, this static decryption key must be known to all intended receivers and hence, is susceptible to compromise. Moreover, even if the encryption key of a hiding scheme were to remain secret, the static portions of a transmitted packet could potentially lead to packet classification.
  • 10. ADVANTAGES OF PROPOSED SYSTEM • Relatively easy to actualize by exploiting knowledge of network protocols and cryptographic primitives extracted from compromised nodes • Our findings indicate that selective jamming attacks lead to a DoS with very low effort on behalf of the jammer. • Achieve strong security properties
  • 11. MODULES • Real Time Packet Classification • A Strong Hiding Commitment Scheme • Cryptographic Puzzle Hiding Scheme • Hiding based on All-Or-Nothing Transformations
  • 12. Real Time Packet Classification: • At the Physical layer, a packet m is encoded, interleaved, and modulated before it is transmitted over the wireless channel. At the receiver, the signal is demodulated, deinterleaved and decoded to recover the original packet m. Nodes A and B communicate via a wireless link. Within the communication range of both A and B there is a jamming node J. When A transmits a packet m to B, node J classifies m by receiving only the first few bytes of m. J then corrupts m beyond recovery by interfering with its reception at B.
  • 13. A Strong Hiding Commitment Scheme • A strong hiding commitment scheme (SHCS), which is based on symmetric cryptography. Assume that the sender has a packet for Receiver. First, S constructs commit( message ) the commitment function is an off-the-shelf symmetric encryption algorithm is a publicly known permutation, and k is a randomly selected key of some desired key length s (the length of k is a security parameter). Upon reception of d, any receiver R computes.
  • 14. Cryptographic Puzzle Hiding Scheme • A sender S have a packet m for transmission. The sender selects a random key k , of a desired length. S generates a puzzle (key, time), where puzzle() denotes the puzzle generator function, and tp denotes the time required for the solution of the puzzle. Parameter is measured in units of time, and it is directly dependent on the assumed computational capability of the adversary, denoted by N and measured in computational operations per second. After generating the puzzle P, the sender broadcasts (C, P). At the receiver side, any receiver R solves the received puzzle to recover key and then computes.
  • 15. Hiding based on All-Or-Nothing Transformations • The packets are pre-processed by an AONT before transmission but remain unencrypted. The jammer cannot perform packet classification until all pseudo-messages corresponding to the original packet have been received and the inverse transformation has been applied.
  • 16. CONCLUSION: • We evaluated the impact of selective jamming attacks on network protocols such as TCP and routing. Our findings show that a selective jammer can significantly impact performance with very low effort. We developed three schemes that transform a selective jammer to a random one by preventing real-time packet classification.
  • 17. REFERENCE: • Alejandro Proan˜o and Loukas Lazos, “Packet- Hiding Methods for Preventing Selective Jamming Attacks” IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 1, JANUARY/FEBRUARY 2012.
  • 18. WWW.JPINFOTECH.BLOGSPOT.COM PRESENTED BY CONTACT: (0) 9952649690