This document presents a project on preventing selective jamming attacks on wireless networks. It discusses existing jamming attacks, proposes a system to address selective jamming by an insider, and outlines the advantages of preventing real-time packet classification. The document contains sections on aim, existing system, proposed system, advantages, software and hardware specifications, conclusions, and references.
3. The open nature of the wireless medium leaves it vulnerable to
interference attacks, typically referred to as jamming.
This interference attacks can be used for performing Eavesdropping &
Denial-of-Service attacks on wireless networks.
While eavesdropping can be prevented using cryptographic methods,
jamming attacks are much harder to counter. They have been shown to
actualize Denial-of-Service (DoS) attacks against wireless networks.
Typically, jamming has been addressed under an external threat model. in
which the jammer is not part of the network. Under this model, the
adversary interferes with the reception of messages by transmitting a
continuous jamming signal.
In this Work, we address the problem of jamming under an internal threat
model. We consider a sophisticated adversary who is aware of network
secrets and the implementation details of network & exploits his
knowledge for launching selective jamming attacks in which specific
messages of “high importance” are targeted.
3
4. To Show that Selective Jamming Attacks can be
Launched By Performing Real-Time Packet
Classification at Physical layer.
To Prevent these attacks develop schemes that
prevent Real-Time packet classification by
combining Cryptographic Primitives with Physical
layers attributes.
4
5. Jamming attacks are much harder to counter and
has more security problems.
In the simplest form of jamming, the adversary
interferes with the reception of messages by
transmitting a continuous jamming signal , or
several short jamming pulses.
jamming attacks have been considered under an
external threat model, in which the jammer is not
part of the network. Under this model, jamming
strategies include the continuous or random
transmission of highpower interference signals.
5
6. In the proposed system, we address the problem of
jamming under an internal threat model.
We consider a sophisticated adversary who is aware of
network secrets and the implementation details of
network protocols.
The adversary exploits his internal knowledge for
launching selective jamming attacks in which specific
messages of “high importance” are targeted.
For example, a jammer can target route-request/route-
reply messages at the routing layer to prevent route
discovery, or target TCP acknowledgments in a TCP
session to severely degrade the throughput.
6
7. Relatively Easy to Actualize by Exploiting
Knowledge of the Network Protocol and
Cryptographic Primitives , extracted from
Compromised nodes.
Achieving strong security and prevention of
Network performance Degradation.
Jamming Attacks can be more easily Encountered
and treated.
7
8. Operating system :- Windows XP Professional
Front End :- JAVA, Swing(JFC),RMI
Tool :- Eclipse 3.3
8
9. Processor : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Monitor : 15 VGA Colour.
Ram : 256 Mb.
9
10. We evaluated the impact of selective Jamming
Attacks on network protocols such as TCP and
Routing.
Our findings show that a selective Jammer can
significantly impact performance with very low
effort.
We develop three schemes that transform a
selective jammer to a random one by preventing
real-time packet classification , by combining
cryptographic primitives with physical-layer
attributes.
10
11. Alejandro Proan`o and Loukas Lazos, “Packet
Hiding Methods for Preventing selective Jamming
Attacks” IEEE TRANSACTIONS ON DEPENDABLE AND
SECURE COMPUTING,
VOL.9,NO.1,JANUARY/FEBRUARY 2012.
11