SlideShare a Scribd company logo
1 of 8
Combining Cryptographic Primitives to Prevent Jamming
Attacks in Wireless Networks
ABSTRACT:
The Open Nature of wireless medium leaves an intentional interference attack,
typically referred to as jamming. This intentional interference with wireless
transmission launch pad for mounting Denial-Of- Service attack on wireless
networks. Typically, jamming has been addresses under an external threat model.
However, adversaries with internal knowledge of protocol specification and
network secrets can launch low-effort jamming attacks that are difficult to detect
and counter. In this work we address the problem of jamming attacks and
adversary is active for short period of time, selectively targeting the messages of
high importance. We show that the selective jamming attacks can be launched by
performing real-time packet classification at the physical layer. To mitigate these
attacks, we develop three schemes that prevent real time packet classification by
combining cryptographic primitives with physical-layer attributes. They are Strong
Hiding Commitment Schemes (SHCS), Cryptographic Puzzles Hiding Schemes
(CPHS), and All- Or-Nothing Transformation Hiding Schemes (AONTSHS).
Random key distribution methods are done along with three schemes to give more
secured packet transmission in wireless networks.
EXISTING SYSTEM:
Conventional ant-jamming techniques extensively on spread-spectrum
communications, or some form of jamming evasion (e.g., slow frequency hopping
or spatial retreats). SS techniques provide bit-level protection by spreading bits
according to a secret pseudo noise (PN) code, Known only to the communicating
parties. These methods can only protect wireless transmissions under the external
threat model. Potential disclosure of secrets due to node compromise neutralizes
the gains of SS. Broadcast communications are particularly vulnerable under an
internal threat model because all intended receivers must be aware of the secrets
used to protect transmissions. Hence, the compromise of a single receiver is
sufficient to reveal relevant cryptographic information.
DISADVANTAGES OF EXISTING SYSTEM:
Under this model, jamming strategies include the continuous or random
transmission of high power interference signals. However, adopting an “always-
on” strategy has several disadvantages.
 First, the adversary has to expend a significant amount of energy to jam
frequency bands of interest.
 Second, the continuous presence of unusually high interference levels makes
this type of attacks easy to detect.
PROPOSED SYSTEM:
In this paper, we address the problem of jamming under an internal threat model.
We consider a sophisticated adversary who is aware of network secrets and the
implementation details of network protocols at any layer in the network stack. The
adversary exploits his internal knowledge for launching selective jamming attacks
in which specific messages of “high importance” are targeted. For example, a
jammer can target route-request/route-reply messages at the routing layer to
prevent route discovery, or target TCP acknowledgments in a TCP session to
severely degrade the throughput of an end-to end flow.
ADVANTAGES OF PROPOSED SYSTEM:
Evaluated the impact of selective jamming attacks on network protocols such as
TCP and routing and show that a selective jammer can significantly impact
performance with very low effort and developed three schemes that transform a
selective jammer to a random one by preventing real-time packet classification.
Schemes combine cryptographic primitives such as commitment schemes,
cryptographic puzzles, and all-or-nothing transformations with physical layer
characteristics and analyzed the security of our schemes and quantified their
computational and communication overhead. With these schemes a random key
distribution has been implemented to more secure the packet transmission in the
wireless networks.
AIM:
To show that selective jamming attacks can be launched by performing real time
packet classification at the physical layer. To mitigate these attacks develop a
schemes that prevent real-time packet classification by combining cryptographic
primitives with physical layer attributes.
SYNOPSIS:
To address the problem of jamming under an internal threat model and consider a
sophisticated adversary who is aware of network secrets and the implementation
details of network protocols at any layer in the network stack. The adversary
exploits his internal knowledge for launching selective jamming attacks in which
specific messages of high importance are targeted. For example, a jammer can
target route-request/route-reply messages at the routing layer to prevent route
discovery, or target TCP acknowledgments in a TCP session to severely degrade
the throughput of an end-to-end flow.
The jammer may decode the first few bits of a packet for recovering useful packet
identifiers such as packet type, source and destination address. After classification,
the adversary must induce a sufficient number of bit errors so that the packet
cannot be recovered at the receiver.
MODULES:
 Real Time Packet Classification
 A Strong Hiding Commitment Scheme
 Cryptographic Puzzle Hiding Scheme
 Hiding based on All-Or-Nothing Transformations
MODULES DESCRIPTION:
RealTime PacketClassification:
At the Physical layer, a packet m is encoded, interleaved, and modulated before it
is transmitted over the wireless channel. At the receiver, the signal is demodulated,
de-interleaved and decoded to recover the original packet m. Nodes A and B
communicate via a wireless link. Within the communication range of both A and B
there is a jamming node J. When A transmits a packet m to B, node J classifies m
by receiving only the first few bytes of m. J then corrupts m beyond recovery by
interfering with its reception at B.
A Strong Hiding Commitment Scheme
A strong hiding commitment scheme (SHCS), which is based on symmetric
cryptography. Assume that the sender has a packet for Receiver. First, S constructs
commit( message ) the commitment function is an off-the-shelf symmetric
encryption algorithm is a publicly known permutation, and k is a randomly
selected key of some desired key length s (the length of k is a security parameter).
Upon reception of d, any receiver R computes.
Cryptographic Puzzle Hiding Scheme
A sender S has a packet m for transmission. The sender selects a random key k , of
a desired length. S generates a puzzle (key, time), where puzzle() denotes the
puzzle generator function, and tp denotes the time required for the solution of the
puzzle. Parameter is measured in units of time, and it is directly dependent on the
assumed computational capability of the adversary, denoted by N and measured in
computational operations per second. After generating the puzzle P, the sender
broadcasts (C, P). At the receiver side, any receiver R solves the received puzzle to
recover key and then computes.
Hiding basedon All-Or-Nothing Transformations
The packets are pre-processed by an AONT before transmission but remain
unencrypted. The jammer cannot perform packet classification until all pseudo-
messages corresponding to the original packet have been received and the inverse
transformation has been applied. Packet m is partitioned to a set of x input blocks
m = {m1, m2, m3….}, which serve as an input to an The set of pseudo-messages
m = {m1, m2, m3,…..} is transmitted over the wireless medium.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
PROCESSOR : PENTIUM IV 2.6 GHz
RAM : 512 MB
MONITOR : 15”
HARD DISK : 20 GB
CDDRIVE : 52X
KEYBOARD : STANDARD 102 KEYS
MOUSE : 3 BUTTONS
SOFTWARE REQUIREMENTS:
FRONT END : JAVA, SWING
TOOLS USED : JFRAME BUILDER
OPERATING SYSTEM: WINDOWS XP
REFERENCE:
Ngangbam Herojit Singh and, A.Kayalvizhi, M.Tech. “Combining Cryptographic
Primitives to Prevent Jamming Attacks in Wireless Networks” IEEE
CONFERENCE 2013.

More Related Content

What's hot

Packet hiding methods for preventing selective
Packet hiding methods for preventing selectivePacket hiding methods for preventing selective
Packet hiding methods for preventing selectiveveenasraj
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksnagibtech
 
Minimum cost blocking problem in multi path wireless routing protocols
Minimum cost blocking problem in multi path wireless routing protocolsMinimum cost blocking problem in multi path wireless routing protocols
Minimum cost blocking problem in multi path wireless routing protocolsJPINFOTECH JAYAPRAKASH
 
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet  Hiding MethodsJamming Attacks Prevention in Wireless Networks Using Packet  Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding MethodsIOSR Journals
 
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksIJMER
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attackseSAT Publishing House
 
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...ijiert bestjournal
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) inventionjournals
 
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...IOSR Journals
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackIJCERT
 
Hiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesHiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesPriyangaRajaram
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...ijfcstjournal
 
muti path encrypted data security architecture for mobile adhoc networks
muti path encrypted data security architecture for mobile adhoc networksmuti path encrypted data security architecture for mobile adhoc networks
muti path encrypted data security architecture for mobile adhoc networksPraveen Yadav
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...IJMER
 
A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...Mumbai Academisc
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...IJCNCJournal
 

What's hot (20)

Ppt
PptPpt
Ppt
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Packet hiding methods for preventing selective
Packet hiding methods for preventing selectivePacket hiding methods for preventing selective
Packet hiding methods for preventing selective
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Minimum cost blocking problem in multi path wireless routing protocols
Minimum cost blocking problem in multi path wireless routing protocolsMinimum cost blocking problem in multi path wireless routing protocols
Minimum cost blocking problem in multi path wireless routing protocols
 
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet  Hiding MethodsJamming Attacks Prevention in Wireless Networks Using Packet  Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
 
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming Attack
 
Hiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesHiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniques
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
 
muti path encrypted data security architecture for mobile adhoc networks
muti path encrypted data security architecture for mobile adhoc networksmuti path encrypted data security architecture for mobile adhoc networks
muti path encrypted data security architecture for mobile adhoc networks
 
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...A Neighbor Coverage-Based Probabilistic Rebroadcast for  Reducing Routing Ove...
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
 
A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...A precise termination condition of the probabilistic packet marking algorithm...
A precise termination condition of the probabilistic packet marking algorithm...
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...
 
Grayhole
GrayholeGrayhole
Grayhole
 

Viewers also liked

Understanding the external links of video sharing sites measurement and analysis
Understanding the external links of video sharing sites measurement and analysisUnderstanding the external links of video sharing sites measurement and analysis
Understanding the external links of video sharing sites measurement and analysisJPINFOTECH JAYAPRAKASH
 
A proxy based approach to continuous location-based spatial queries in mobile...
A proxy based approach to continuous location-based spatial queries in mobile...A proxy based approach to continuous location-based spatial queries in mobile...
A proxy based approach to continuous location-based spatial queries in mobile...JPINFOTECH JAYAPRAKASH
 
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...JPINFOTECH JAYAPRAKASH
 
Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...JPINFOTECH JAYAPRAKASH
 
Incentive compatible privacy preserving data analysis
Incentive compatible privacy preserving data analysisIncentive compatible privacy preserving data analysis
Incentive compatible privacy preserving data analysisJPINFOTECH JAYAPRAKASH
 
Multicast capacity in manet with infrastructure support
Multicast capacity in manet with infrastructure supportMulticast capacity in manet with infrastructure support
Multicast capacity in manet with infrastructure supportJPINFOTECH JAYAPRAKASH
 
Content sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networksContent sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networksJPINFOTECH JAYAPRAKASH
 
On the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networksOn the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networksJPINFOTECH JAYAPRAKASH
 
Security threats to mobile multimedia applications camera based attacks on mo...
Security threats to mobile multimedia applications camera based attacks on mo...Security threats to mobile multimedia applications camera based attacks on mo...
Security threats to mobile multimedia applications camera based attacks on mo...JPINFOTECH JAYAPRAKASH
 
Review of behavior malware analysis for android
Review of behavior malware analysis for androidReview of behavior malware analysis for android
Review of behavior malware analysis for androidJPINFOTECH JAYAPRAKASH
 
Warningbird a near real time detection system for suspicious urls in twitter ...
Warningbird a near real time detection system for suspicious urls in twitter ...Warningbird a near real time detection system for suspicious urls in twitter ...
Warningbird a near real time detection system for suspicious urls in twitter ...JPINFOTECH JAYAPRAKASH
 
Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...JPINFOTECH JAYAPRAKASH
 
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsBahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsJPINFOTECH JAYAPRAKASH
 
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...JPINFOTECH JAYAPRAKASH
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksJPINFOTECH JAYAPRAKASH
 
Attribute based access to scalable media in cloud-assisted content sharing ne...
Attribute based access to scalable media in cloud-assisted content sharing ne...Attribute based access to scalable media in cloud-assisted content sharing ne...
Attribute based access to scalable media in cloud-assisted content sharing ne...JPINFOTECH JAYAPRAKASH
 
A log based approach to make digital forensics easier on cloud computing
A log based approach to make digital forensics easier on cloud computingA log based approach to make digital forensics easier on cloud computing
A log based approach to make digital forensics easier on cloud computingJPINFOTECH JAYAPRAKASH
 
Ip geolocation mapping for moderately connected internet regions
Ip geolocation mapping for moderately connected internet regionsIp geolocation mapping for moderately connected internet regions
Ip geolocation mapping for moderately connected internet regionsJPINFOTECH JAYAPRAKASH
 

Viewers also liked (20)

Understanding the external links of video sharing sites measurement and analysis
Understanding the external links of video sharing sites measurement and analysisUnderstanding the external links of video sharing sites measurement and analysis
Understanding the external links of video sharing sites measurement and analysis
 
A proxy based approach to continuous location-based spatial queries in mobile...
A proxy based approach to continuous location-based spatial queries in mobile...A proxy based approach to continuous location-based spatial queries in mobile...
A proxy based approach to continuous location-based spatial queries in mobile...
 
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
 
Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...
 
Incentive compatible privacy preserving data analysis
Incentive compatible privacy preserving data analysisIncentive compatible privacy preserving data analysis
Incentive compatible privacy preserving data analysis
 
Multicast capacity in manet with infrastructure support
Multicast capacity in manet with infrastructure supportMulticast capacity in manet with infrastructure support
Multicast capacity in manet with infrastructure support
 
Content sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networksContent sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networks
 
On the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networksOn the node clone detection in wireless sensor networks
On the node clone detection in wireless sensor networks
 
Security threats to mobile multimedia applications camera based attacks on mo...
Security threats to mobile multimedia applications camera based attacks on mo...Security threats to mobile multimedia applications camera based attacks on mo...
Security threats to mobile multimedia applications camera based attacks on mo...
 
Review of behavior malware analysis for android
Review of behavior malware analysis for androidReview of behavior malware analysis for android
Review of behavior malware analysis for android
 
Warningbird a near real time detection system for suspicious urls in twitter ...
Warningbird a near real time detection system for suspicious urls in twitter ...Warningbird a near real time detection system for suspicious urls in twitter ...
Warningbird a near real time detection system for suspicious urls in twitter ...
 
Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...
 
Bahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environmentsBahg back bone-assisted hop greedy routing for vanet’s city environments
Bahg back bone-assisted hop greedy routing for vanet’s city environments
 
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
Accuracy-Constrained Privacy-Preserving Access Control Mechanism for Relation...
 
Detection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networksDetection and localization of multiple spoofing attackers in wireless networks
Detection and localization of multiple spoofing attackers in wireless networks
 
Attribute based access to scalable media in cloud-assisted content sharing ne...
Attribute based access to scalable media in cloud-assisted content sharing ne...Attribute based access to scalable media in cloud-assisted content sharing ne...
Attribute based access to scalable media in cloud-assisted content sharing ne...
 
A log based approach to make digital forensics easier on cloud computing
A log based approach to make digital forensics easier on cloud computingA log based approach to make digital forensics easier on cloud computing
A log based approach to make digital forensics easier on cloud computing
 
Ip geolocation mapping for moderately connected internet regions
Ip geolocation mapping for moderately connected internet regionsIp geolocation mapping for moderately connected internet regions
Ip geolocation mapping for moderately connected internet regions
 
Dia do Consumidor
Dia do ConsumidorDia do Consumidor
Dia do Consumidor
 
Semântica e léxico
Semântica e léxicoSemântica e léxico
Semântica e léxico
 

Similar to Combining cryptographic primitives to prevent jamming attacks in wireless networks

Info mimi-hop-by-hop authentication
Info mimi-hop-by-hop authenticationInfo mimi-hop-by-hop authentication
Info mimi-hop-by-hop authenticationSelva Raj
 
Info mimi-hop-by-hop authentication-copy
Info mimi-hop-by-hop authentication-copyInfo mimi-hop-by-hop authentication-copy
Info mimi-hop-by-hop authentication-copySelva Raj
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...cscpconf
 
I030102056063
I030102056063I030102056063
I030102056063theijes
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)Mumbai Academisc
 
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLESSELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLESIJNSA Journal
 
Selective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesSelective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesIJNSA Journal
 
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...ijasuc
 
A Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetA Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetIJSRD
 
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...IRJET Journal
 
An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...
An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...
An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...paperpublications3
 
A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE ADHOC NETWORKS
A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE ADHOC NETWORKSA NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE ADHOC NETWORKS
A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE ADHOC NETWORKScscpconf
 
A novel cluster based wormhole avoidance algorithm for mobile adhoc networks
A novel cluster based wormhole avoidance algorithm for mobile adhoc networksA novel cluster based wormhole avoidance algorithm for mobile adhoc networks
A novel cluster based wormhole avoidance algorithm for mobile adhoc networkscsandit
 

Similar to Combining cryptographic primitives to prevent jamming attacks in wireless networks (19)

Info mimi-hop-by-hop authentication
Info mimi-hop-by-hop authenticationInfo mimi-hop-by-hop authentication
Info mimi-hop-by-hop authentication
 
Info mimi-hop-by-hop authentication-copy
Info mimi-hop-by-hop authentication-copyInfo mimi-hop-by-hop authentication-copy
Info mimi-hop-by-hop authentication-copy
 
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
 
I030102056063
I030102056063I030102056063
I030102056063
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
 
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLESSELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
 
Selective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesSelective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholes
 
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
Container-Beating Approaches for Avoiding Discriminative Cramming AssaultsContainer-Beating Approaches for Avoiding Discriminative Cramming Assaults
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
 
Ar03302620266
Ar03302620266Ar03302620266
Ar03302620266
 
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...
 
Ijcatr04051010
Ijcatr04051010Ijcatr04051010
Ijcatr04051010
 
A Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetA Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manet
 
Paper copy
Paper   copyPaper   copy
Paper copy
 
Am03402220229
Am03402220229Am03402220229
Am03402220229
 
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENTINTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
INTRUSION IDENTIFICATION IN MANET USING ENHANCED ADAPTIVE ACKNOWLEDGEMENT
 
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
IRJET-A Reliable Strategy Against Power Dissipating Attacks in Hierarchical W...
 
An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...
An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...
An Energy Efficient Scheme against Power Exhausting Attacks in Wireless Senso...
 
A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE ADHOC NETWORKS
A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE ADHOC NETWORKSA NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE ADHOC NETWORKS
A NOVEL CLUSTER BASED WORMHOLE AVOIDANCE ALGORITHM FOR MOBILE ADHOC NETWORKS
 
A novel cluster based wormhole avoidance algorithm for mobile adhoc networks
A novel cluster based wormhole avoidance algorithm for mobile adhoc networksA novel cluster based wormhole avoidance algorithm for mobile adhoc networks
A novel cluster based wormhole avoidance algorithm for mobile adhoc networks
 

Recently uploaded

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 

Recently uploaded (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

Combining cryptographic primitives to prevent jamming attacks in wireless networks

  • 1. Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks ABSTRACT: The Open Nature of wireless medium leaves an intentional interference attack, typically referred to as jamming. This intentional interference with wireless transmission launch pad for mounting Denial-Of- Service attack on wireless networks. Typically, jamming has been addresses under an external threat model. However, adversaries with internal knowledge of protocol specification and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In this work we address the problem of jamming attacks and adversary is active for short period of time, selectively targeting the messages of high importance. We show that the selective jamming attacks can be launched by performing real-time packet classification at the physical layer. To mitigate these attacks, we develop three schemes that prevent real time packet classification by combining cryptographic primitives with physical-layer attributes. They are Strong Hiding Commitment Schemes (SHCS), Cryptographic Puzzles Hiding Schemes (CPHS), and All- Or-Nothing Transformation Hiding Schemes (AONTSHS). Random key distribution methods are done along with three schemes to give more secured packet transmission in wireless networks.
  • 2. EXISTING SYSTEM: Conventional ant-jamming techniques extensively on spread-spectrum communications, or some form of jamming evasion (e.g., slow frequency hopping or spatial retreats). SS techniques provide bit-level protection by spreading bits according to a secret pseudo noise (PN) code, Known only to the communicating parties. These methods can only protect wireless transmissions under the external threat model. Potential disclosure of secrets due to node compromise neutralizes the gains of SS. Broadcast communications are particularly vulnerable under an internal threat model because all intended receivers must be aware of the secrets used to protect transmissions. Hence, the compromise of a single receiver is sufficient to reveal relevant cryptographic information. DISADVANTAGES OF EXISTING SYSTEM: Under this model, jamming strategies include the continuous or random transmission of high power interference signals. However, adopting an “always- on” strategy has several disadvantages.  First, the adversary has to expend a significant amount of energy to jam frequency bands of interest.  Second, the continuous presence of unusually high interference levels makes this type of attacks easy to detect.
  • 3. PROPOSED SYSTEM: In this paper, we address the problem of jamming under an internal threat model. We consider a sophisticated adversary who is aware of network secrets and the implementation details of network protocols at any layer in the network stack. The adversary exploits his internal knowledge for launching selective jamming attacks in which specific messages of “high importance” are targeted. For example, a jammer can target route-request/route-reply messages at the routing layer to prevent route discovery, or target TCP acknowledgments in a TCP session to severely degrade the throughput of an end-to end flow. ADVANTAGES OF PROPOSED SYSTEM: Evaluated the impact of selective jamming attacks on network protocols such as TCP and routing and show that a selective jammer can significantly impact performance with very low effort and developed three schemes that transform a selective jammer to a random one by preventing real-time packet classification. Schemes combine cryptographic primitives such as commitment schemes, cryptographic puzzles, and all-or-nothing transformations with physical layer characteristics and analyzed the security of our schemes and quantified their computational and communication overhead. With these schemes a random key
  • 4. distribution has been implemented to more secure the packet transmission in the wireless networks. AIM: To show that selective jamming attacks can be launched by performing real time packet classification at the physical layer. To mitigate these attacks develop a schemes that prevent real-time packet classification by combining cryptographic primitives with physical layer attributes. SYNOPSIS: To address the problem of jamming under an internal threat model and consider a sophisticated adversary who is aware of network secrets and the implementation details of network protocols at any layer in the network stack. The adversary exploits his internal knowledge for launching selective jamming attacks in which specific messages of high importance are targeted. For example, a jammer can target route-request/route-reply messages at the routing layer to prevent route discovery, or target TCP acknowledgments in a TCP session to severely degrade the throughput of an end-to-end flow. The jammer may decode the first few bits of a packet for recovering useful packet identifiers such as packet type, source and destination address. After classification,
  • 5. the adversary must induce a sufficient number of bit errors so that the packet cannot be recovered at the receiver. MODULES:  Real Time Packet Classification  A Strong Hiding Commitment Scheme  Cryptographic Puzzle Hiding Scheme  Hiding based on All-Or-Nothing Transformations MODULES DESCRIPTION: RealTime PacketClassification: At the Physical layer, a packet m is encoded, interleaved, and modulated before it is transmitted over the wireless channel. At the receiver, the signal is demodulated, de-interleaved and decoded to recover the original packet m. Nodes A and B communicate via a wireless link. Within the communication range of both A and B there is a jamming node J. When A transmits a packet m to B, node J classifies m by receiving only the first few bytes of m. J then corrupts m beyond recovery by interfering with its reception at B.
  • 6. A Strong Hiding Commitment Scheme A strong hiding commitment scheme (SHCS), which is based on symmetric cryptography. Assume that the sender has a packet for Receiver. First, S constructs commit( message ) the commitment function is an off-the-shelf symmetric encryption algorithm is a publicly known permutation, and k is a randomly selected key of some desired key length s (the length of k is a security parameter). Upon reception of d, any receiver R computes. Cryptographic Puzzle Hiding Scheme A sender S has a packet m for transmission. The sender selects a random key k , of a desired length. S generates a puzzle (key, time), where puzzle() denotes the puzzle generator function, and tp denotes the time required for the solution of the puzzle. Parameter is measured in units of time, and it is directly dependent on the assumed computational capability of the adversary, denoted by N and measured in computational operations per second. After generating the puzzle P, the sender broadcasts (C, P). At the receiver side, any receiver R solves the received puzzle to recover key and then computes.
  • 7. Hiding basedon All-Or-Nothing Transformations The packets are pre-processed by an AONT before transmission but remain unencrypted. The jammer cannot perform packet classification until all pseudo- messages corresponding to the original packet have been received and the inverse transformation has been applied. Packet m is partitioned to a set of x input blocks m = {m1, m2, m3….}, which serve as an input to an The set of pseudo-messages m = {m1, m2, m3,…..} is transmitted over the wireless medium. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: PROCESSOR : PENTIUM IV 2.6 GHz RAM : 512 MB MONITOR : 15” HARD DISK : 20 GB CDDRIVE : 52X
  • 8. KEYBOARD : STANDARD 102 KEYS MOUSE : 3 BUTTONS SOFTWARE REQUIREMENTS: FRONT END : JAVA, SWING TOOLS USED : JFRAME BUILDER OPERATING SYSTEM: WINDOWS XP REFERENCE: Ngangbam Herojit Singh and, A.Kayalvizhi, M.Tech. “Combining Cryptographic Primitives to Prevent Jamming Attacks in Wireless Networks” IEEE CONFERENCE 2013.