SlideShare a Scribd company logo
1 of 5
Download to read offline
Hiding Message from Hacker Using Novel
Network Techniques
R.Subhulakshmi, MCA.,M.Phil*1
R.Priyanga ,M.Sc(CS)#2
Abstract-.In this s work, we address the trouble of
selective jamming attacks in wireless networks. In these
assaults, the adversary is energetic best for a brief
period of time, selectively concentrated on messages of
excessive significance. We illustrate the benefits of
selective jamming in phrases of network performance
degradation and adversary effort with the aid of
offering case research. A selective assault on TCP and
one on routing. We show that selective jamming attacks
can be launched with the aid of performing actual-time
packet classification at the physical layer. To mitigate
these attacks, we develop 3 schemes that prevent actual-
time packet class via combining cryptographic
primitives with physical-layer attributes. We analyze
the security of our strategies and examine their
computational and communication overhead.
Keyword—Selective Jamming, Denial-of-
Service, Wireless Network s, Packet Classification,
CPHS (Cryptography Puzzle Hiding Scheme).
I.INTRODUCTION
The open nature of the wireless medium leaves it
vulnerable to intentional interference attacks, typically
referred to as jamming. The timing channel is a
logical communication channel in which information
is encoded in the timing between events. Recently, the
use of the timing channel has been proposed as a
countermeasure to reactive jamming attacks
performed by an energy- constrained malicious node.
In fact, while a jammer is able to disrupt the
information contained in the attacked packets, timing
information cannot be jammed, and therefore, timing
channels can be exploited to deliver information to the
receiver even on a jammed channel. Since the nodes
under attack and the jammer have conflicting
interests, their interactions can be modeled by means
of game theory. Accordingly, in this paper, a game-
theoretic model of the interactions between nodes
exploiting the timing channel to achieve resilience to
jamming attacks and a jammer is derived and
analyzed. More specifically, the Nash equilibrium is
studied in terms of existence, uniqueness, and
convergence under best response dynamics.
Furthermore, the case in which the communication
nodes set their strategy and the jammer reacts
accordingly is modeled and analyzed as a Stackelberg
game, by considering both perfect and imperfect
knowledge of the jammer’s utility function. Extensive
numerical results are presented, showing the impact of
network parameters on the system
performance[9][10][11][15].
II.NETWORK TECHNIQUES
Networks can be private or public. Private
networks require the user to obtain permission to gain
access. Typically, this is granted either manually by a
network administrator or obtained directly by the user
via a password or with other credentials. Public
networks like the internet do not restrict access.
Network devices including switches and routers use a
variety of protocols and algorithms to exchange
information and to transport data to its
intended endpoint.
Every endpoint (sometimes called a host) in a
network has a unique identifier, often an IP address or
a Media Access Control address, that is used to
indicate the source or destination of the transmission.
Endpoints can include servers, personal computers,
phones and many types of network hardware.
Wired and wireless technologies Networks may use
a mix of wired and wireless technologies. Network
devices communicate through a wired or wireless
transmission medium. In wired networks, this may
consist of optical fiber, coaxial cable or copper wires
in the form of a twisted pair. Wireless network
pathways include computer networks that use wireless
data connections for connecting endpoints. These
endpoints include broadcast radio, cellular radio,
microwave and satellite [6][7][8].
Two very common types of networks include:
 Local Area Network (LAN)
 Wide Area Network (WAN)
1.3.1 LOCAL AREA NETWORK
A Local Area Network (LAN) is a network
that is confined to a relatively small area. It is
generally limited to a geographic area such as a
writing lab, school, or building.
Computers connected to a network are
broadly categorized as servers or workstations.
Servers are generally not used by humans directly, but
rather run continuously to provide "services" to the
other computers (and their human users) on the
network. Services provided can include printing and
faxing, software hosting, file storage and sharing,
messaging, data storage and retrieval, complete access
control (security) for the network's resources, and
many others[17][18][19][20].
1.3.2 WIDE AREA NETWORK
Wide Area Networks (WANs) connect
networks in larger geographic areas, such as Florida,
the United States, or the world. Dedicated
transoceanic cabling or satellite uplinks may be used
to connect this type of global network.
Using a WAN, schools in Florida can
communicate with places like Tokyo in a matter of
seconds, without paying enormous phone bills. Two
users a half-world apart with workstations
equipped.[12][13].
III. METHODOLOGY
 Sending The Source To Destination
Figure 1. Sending Data to Destination Node Diagram
 Retrieving The File
Figure 2. Receiving Data and Retrieving the File
Diagram
IV. PROPOSED METHOD
In the simplest form of jamming, the adversary
interferes with the reception of messages by
transmitting a continuous jamming signal, or several
short jamming pulses. Typically, jamming attacks
have been considered under an external threat model,
in which the jammer is not part of the network.
 Network Unit
 Real Time Packet Classification
 Selective Jamming Module
 Strong Hiding Commitment Scheme (SHCS)
 Cryptographic Puzzle Hiding Scheme
(CPHS).
 Network Unit
We address the problem of preventing the
jamming node from classifying m in real time, thus
mitigating J’s ability to perform selective jamming.
The network consists of a collection of nodes
connected via wireless links. Nodes may
communicate directly if they are within
communication range, or indirectly via multiple hops.
Nodes communicate both in uncast mode and
broadcast mode. Communications can be either
unencrypted or encrypted. For encrypted broadcast
Source
Select the File
to Send
Channel Encoding
& Interleaving
Send Packet
Destination
De-Interleaving the
Data
Channel
Decoding
Show Packets
communications, symmetric keys are shared among
all intended receivers. These keys are established
using pre shared pair wise keys or asymmetric
cryptography.
 Real Time Packet Classification
Consider the generic communication system
depicted. At the PHY layer, a packet m is encoded,
interleaved, and modulated before it is transmitted
over the wireless channel. At the receiver, the signal is
demodulated, de interleaved, and decoded, to recover
the original packet m. Moreover, even if the
encryption key of a hiding scheme were to remain
secret, the static portions of a transmitted packet could
potentially lead to packet classification. This is
because for computationally-efficient encryption
methods such as block encryption, the encryption of a
prefix plaintext with the same key yields a static
cipher text prefix. Hence, an adversary who is aware
of the underlying protocol specifics (structure of the
frame) can use the static cipher text portions of a
transmitted packet to classify it.
 Selective Jamming Component
The impact of selective jamming attacks on the
network performance. Implement selective jamming
attacks in two multi-hop wireless network scenarios.
In the first scenario, the attacker targeted a TCP
connection established over a multi-hop wireless
route. In the second scenario, the jammer targeted
network-layer control messages transmitted during the
route establishment process selective jamming would
be the encryption of transmitted packets (including
headers) with a static key
.
Figure 3. Selective Jamming Diagram
 Strong Hiding Commitment Scheme (Shcs)
Propose a strong hiding commitment scheme
(SHCS), which is based on symmetric cryptography.
Our main motivation is to satisfy the strong hiding
property while keeping the computation and
communication overhead to a minimum. The
computation overhead of SHCS is one symmetric
encryption at the sender and one symmetric
decryption at the receiver. Because the header
information is permuted as a trailer and encrypted, all
However, in wireless protocols such as 802.11, the
complete packet is received at the MAC layer before
it is decided if the packet must be discarded or be
further processed.
Figure. 4. Processing at the hiding sublayer.
 Cryptographic Puzzle Hiding Scheme
(CPHS)
Propose a solution based on All -Or- Nothing
Transformations (AONT) that introduces a modest
communication and computation overhead. Such
transformations were originally proposed by Rivest to
slow down brute force attacks against block
encryption algorithms. An AONT serves as a publicly
known and completely invertible pre-processing step
to a plaintext before it is passed to an ordinary block
encryption algorithm. Present a packet hiding scheme
based on cryptographic puzzles. The main idea behind
such puzzles is to force the recipient of a puzzle
execute a pre-defined set of computations before he is
able to extract a secret of interest. The time required
for obtaining the solution of a puzzle depends on its
hardness and the computational ability of the solver.
The advantage of the puzzle based scheme is that its
security does not rely on the PHY layer parameters.
However, it has higher computation and
communication overhead.
Fe
ld
1
Fi
el
d
2
Field
3
Fi
el
d
n
Random
Payload
m
} } } } }
. .
.
. .
.
. .
.
. .
.
. .
. . . .
π1(
m) . . .
. .
.
. .
.
Figure. 5. Application of permutation π1 on packet m.
VI.EXPERIMENTAL RESULT
Figure 6. Run the Source Page File
Figure 7 .Run The Destination File
Figure 8.Encoding the Selecting File
Figure 9. Interleaving the Selecting File
Figure 10.Choose the Destination Node
Figure 11.Receving the Selecting File
V. CONCLUSION
In previous research methodologies to detect
jamming attacks are illustrated it is also shown that it
is possible to identify which kind of jamming attack
is ongoing by looking at the signal strength and other
relevant network parameters. Such as bit and packet
error. We model the interactions between a jammer
and a target node as a jamming .We have suggested a
cryptography puzzle hiding scheme techniques of the
transactions within a jammer and interaction node
that a use a timing pathway to develop flexibility to
jamming attacks. We evaluated the impact of
selective jamming attacks on network protocols such
as TCP and routing. Our finding show that a selective
jammer can significantly impact performance with
very low effort. We developed our scheme combine
transform a selective jammer to a random one by
preventing real-time packet classification. Our
scheme combine cryptographic primitives such as
commitment schemes, cryptographic puzzles, and all-
or-nothing transformation (ANOTs) with physical
layer characteristics. We analyzed the security of our
schemes and qualified their computational and
communication overhead
REFERENCE
[1] T. X. Brown, J. E. James, and A. Sethi. Jamming and sensing
of encrypted wireless ad hoc networks. In Proceedings of
MobiHoc, pages 120–130, 2006.
[2] M. Cagalj, S. Capkun, and J.-P. Hubaux. Wormhole-based
anti-jamming techniques in sensor networks. IEEE
Transactions on Mobile Computing, 6(1):100–114, 2007.
[3] A. Chan, X. Liu, G. Noubir, and B. Thapa. Control channel
jamming: Resilience and identification of traitors. In
Proceedings of ISIT, 2007.
[4] T. Dempsey, G. Sahin, Y. Morton, and C. Hopper. Intelligent
sensing and classification in ad hoc networks: a case study.
Aerospace and Electronic Systems Magazine, IEEE,
24(8):23–30, August 2009.
[5] Y. Desmedt. Broadcast anti-jamming systems. Computer
Networks, 35(2-3):223–236, February 2001.
[6] K. Gaj and P. Chodowiec. FPGA and ASIC implementations
of AES.Cryptographic Engineering, pages 235–294, 2009.
[7] O. Goldreich. Foundations of cryptography: Basic
applications. Cam-bridge University Press, 2004.
[8] B. Greenstein, D. Mccoy, J. Pang, T. Kohno, S. Seshan, and
D. Wether-all. Improving wireless privacy with an identifier-
free link layer protocol. In Proceedings of MobiSys, 2008.
[9] http://www.networkimprovement.php.edu
[10] A. Juels and J. Brainard. Client puzzles: A cryptographic
counter-measure against connection depletion attacks. In
Proceedings of NDSS, pages 151–165, 1999.
[11] Y. W. Law, M. Palaniswami, L. V. Hoesel, J. Doumen, P.
Hartel, and P. Havinga. Energy-efficient link-layer jamming
attacks against WSN MAC protocols. ACM Transactions on
Sensors Networks, 5(1):1–38, 2009.
[12] L. Lazos, S. Liu, and M. Krunz. Mitigating control-channel
jamming attacks in multi-channel ad hoc networks. In
Proceedings of the 2nd ACM conference on wireless network
security, pages 169–180, 2009.
[13] G. Lin and G. Noubir. On link layer denial of service in data
wireless LANs. Wireless Communications and Mobile
Computing, 5(3):273–284, May 2004.
[14] X. Liu, G. Noubir, and R. Sundaram. Spread: Foiling smart
jammers using multi-layer agility. In Proceedings of
INFOCOM, pages 2536– 2540, 2007.
[15] Y. Liu, P. Ning, H. Dai, and A. Liu. Randomized differential
DSSS: Jamming-resistant wireless broadcast communication.
In Proceedings of INFOCOM, San Diego, 2010.
[16] R. C. Merkle. Secure communications over insecure
channels. Com-munications of the ACM, 21(4):294–299,
1978.
[17] G. Noubir and G. Lin. Low-power DoS attacks in data
wireless lans and countermeasures. Mobile Computing and
Communications Review, 7(3):29–30, 2003.
[18] OPNET. OPNET
tm
modeler 14.5. http://www.opnet.com/.
[19] C. Perkins, E. Belding-Royer, and S. Das. RFC 3561: Ad
hoc on-demand distance vector (AODV) routing. Internet
RFCs, 2003. ˇ
[20] C. Popper,¨ M. Strasser, and S. Capkun. Jamming-resistant
broadcast communication without shared keys. In
Proceedings of the USENIX Security Symposium, 2009.

More Related Content

What's hot

Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
 
SECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETSSECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETSAnkur Singhal
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
3 packet-hiding methods for preventing selective
3   packet-hiding methods for preventing selective3   packet-hiding methods for preventing selective
3 packet-hiding methods for preventing selective11W91D5809
 
TAM new report
TAM new reportTAM new report
TAM new reportSuzit Punk
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksnagibtech
 
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...IOSR Journals
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...IJCNCJournal
 
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming AttacksPacket-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming AttacksSwapnil Salunke
 
Behavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant networkBehavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant networkBittu Roy
 
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKS
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKSA NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKS
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKSIJNSA Journal
 
Delay Tolerant Network
Delay Tolerant NetworkDelay Tolerant Network
Delay Tolerant NetworkMichel Chamat
 
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLINGAN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLINGSreelekshmi S
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attackseSAT Publishing House
 
Packet hiding methods for preventing selective
Packet hiding methods for preventing selectivePacket hiding methods for preventing selective
Packet hiding methods for preventing selectiveveenasraj
 
Packet%20marking%20report
Packet%20marking%20reportPacket%20marking%20report
Packet%20marking%20reportAnmol Tikoo
 
Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...JPINFOTECH JAYAPRAKASH
 
Preventing jamming attack by combining cryptography
Preventing jamming attack by combining cryptographyPreventing jamming attack by combining cryptography
Preventing jamming attack by combining cryptographyRumana Firdose
 

What's hot (20)

Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
 
SECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETSSECURE LOCATION BASED ROUTING FOR MANETS
SECURE LOCATION BASED ROUTING FOR MANETS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
3 packet-hiding methods for preventing selective
3   packet-hiding methods for preventing selective3   packet-hiding methods for preventing selective
3 packet-hiding methods for preventing selective
 
TAM new report
TAM new reportTAM new report
TAM new report
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
 
Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...Network coding combined with onion routing for anonymous and secure communica...
Network coding combined with onion routing for anonymous and secure communica...
 
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming AttacksPacket-Hiding Methods: To Prevent Selective Jamming Attacks
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
 
Behavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant networkBehavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant network
 
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKS
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKSA NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKS
A NEW KEY ESTABLISHMENT SCHEME FOR WIRELESS SENSOR NETWORKS
 
Delay Tolerant Network
Delay Tolerant NetworkDelay Tolerant Network
Delay Tolerant Network
 
17 18
17 1817 18
17 18
 
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLINGAN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Packet hiding methods for preventing selective
Packet hiding methods for preventing selectivePacket hiding methods for preventing selective
Packet hiding methods for preventing selective
 
Packet%20marking%20report
Packet%20marking%20reportPacket%20marking%20report
Packet%20marking%20report
 
WLAN IP and Frame
WLAN IP and FrameWLAN IP and Frame
WLAN IP and Frame
 
Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...
 
Preventing jamming attack by combining cryptography
Preventing jamming attack by combining cryptographyPreventing jamming attack by combining cryptography
Preventing jamming attack by combining cryptography
 

Similar to Hiding message from hacker using novel network techniques

Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksShaik Irfan
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkIJCI JOURNAL
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkIJERD Editor
 
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...IJNSA Journal
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...IJTET Journal
 
Packet switching
Packet switchingPacket switching
Packet switchingVikash Dhal
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...IOSR Journals
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONEditor IJMTER
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network securityManish Tiwari
 
Behavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networksBehavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networksShakas Technologies
 
Behavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networksBehavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networksShakas Technologies
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop CommunicationIJCSIS Research Publications
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
Behavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networksBehavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networksShakas Technologies
 
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksIJMER
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksJPINFOTECH JAYAPRAKASH
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksJPINFOTECH JAYAPRAKASH
 

Similar to Hiding message from hacker using novel network techniques (20)

Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor Network
 
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor NetworkA Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
A Survey on Secure Hierarchical LEACH Protocol over Wireless Sensor Network
 
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
Packet switching
Packet switchingPacket switching
Packet switching
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
fundamental of network security
fundamental of network securityfundamental of network security
fundamental of network security
 
Behavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networksBehavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networks
 
Dn36682688
Dn36682688Dn36682688
Dn36682688
 
Mitm
MitmMitm
Mitm
 
Behavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networksBehavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networks
 
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 Implementation on Data Security Approach in Dynamic Multi Hop Communication Implementation on Data Security Approach in Dynamic Multi Hop Communication
Implementation on Data Security Approach in Dynamic Multi Hop Communication
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
Behavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networksBehavioral malware detection in delay tolerant networks
Behavioral malware detection in delay tolerant networks
 
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless NetworksA Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
 
Am03402220229
Am03402220229Am03402220229
Am03402220229
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 

Recently uploaded

Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxabhijeetpadhi001
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
MICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptxMICROBIOLOGY biochemical test detailed.pptx
MICROBIOLOGY biochemical test detailed.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

Hiding message from hacker using novel network techniques

  • 1. Hiding Message from Hacker Using Novel Network Techniques R.Subhulakshmi, MCA.,M.Phil*1 R.Priyanga ,M.Sc(CS)#2 Abstract-.In this s work, we address the trouble of selective jamming attacks in wireless networks. In these assaults, the adversary is energetic best for a brief period of time, selectively concentrated on messages of excessive significance. We illustrate the benefits of selective jamming in phrases of network performance degradation and adversary effort with the aid of offering case research. A selective assault on TCP and one on routing. We show that selective jamming attacks can be launched with the aid of performing actual-time packet classification at the physical layer. To mitigate these attacks, we develop 3 schemes that prevent actual- time packet class via combining cryptographic primitives with physical-layer attributes. We analyze the security of our strategies and examine their computational and communication overhead. Keyword—Selective Jamming, Denial-of- Service, Wireless Network s, Packet Classification, CPHS (Cryptography Puzzle Hiding Scheme). I.INTRODUCTION The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. The timing channel is a logical communication channel in which information is encoded in the timing between events. Recently, the use of the timing channel has been proposed as a countermeasure to reactive jamming attacks performed by an energy- constrained malicious node. In fact, while a jammer is able to disrupt the information contained in the attacked packets, timing information cannot be jammed, and therefore, timing channels can be exploited to deliver information to the receiver even on a jammed channel. Since the nodes under attack and the jammer have conflicting interests, their interactions can be modeled by means of game theory. Accordingly, in this paper, a game- theoretic model of the interactions between nodes exploiting the timing channel to achieve resilience to jamming attacks and a jammer is derived and analyzed. More specifically, the Nash equilibrium is studied in terms of existence, uniqueness, and convergence under best response dynamics. Furthermore, the case in which the communication nodes set their strategy and the jammer reacts accordingly is modeled and analyzed as a Stackelberg game, by considering both perfect and imperfect knowledge of the jammer’s utility function. Extensive numerical results are presented, showing the impact of network parameters on the system performance[9][10][11][15]. II.NETWORK TECHNIQUES Networks can be private or public. Private networks require the user to obtain permission to gain access. Typically, this is granted either manually by a network administrator or obtained directly by the user via a password or with other credentials. Public networks like the internet do not restrict access. Network devices including switches and routers use a variety of protocols and algorithms to exchange information and to transport data to its intended endpoint. Every endpoint (sometimes called a host) in a network has a unique identifier, often an IP address or a Media Access Control address, that is used to indicate the source or destination of the transmission. Endpoints can include servers, personal computers, phones and many types of network hardware. Wired and wireless technologies Networks may use a mix of wired and wireless technologies. Network devices communicate through a wired or wireless transmission medium. In wired networks, this may consist of optical fiber, coaxial cable or copper wires in the form of a twisted pair. Wireless network pathways include computer networks that use wireless data connections for connecting endpoints. These endpoints include broadcast radio, cellular radio, microwave and satellite [6][7][8]. Two very common types of networks include:  Local Area Network (LAN)  Wide Area Network (WAN)
  • 2. 1.3.1 LOCAL AREA NETWORK A Local Area Network (LAN) is a network that is confined to a relatively small area. It is generally limited to a geographic area such as a writing lab, school, or building. Computers connected to a network are broadly categorized as servers or workstations. Servers are generally not used by humans directly, but rather run continuously to provide "services" to the other computers (and their human users) on the network. Services provided can include printing and faxing, software hosting, file storage and sharing, messaging, data storage and retrieval, complete access control (security) for the network's resources, and many others[17][18][19][20]. 1.3.2 WIDE AREA NETWORK Wide Area Networks (WANs) connect networks in larger geographic areas, such as Florida, the United States, or the world. Dedicated transoceanic cabling or satellite uplinks may be used to connect this type of global network. Using a WAN, schools in Florida can communicate with places like Tokyo in a matter of seconds, without paying enormous phone bills. Two users a half-world apart with workstations equipped.[12][13]. III. METHODOLOGY  Sending The Source To Destination Figure 1. Sending Data to Destination Node Diagram  Retrieving The File Figure 2. Receiving Data and Retrieving the File Diagram IV. PROPOSED METHOD In the simplest form of jamming, the adversary interferes with the reception of messages by transmitting a continuous jamming signal, or several short jamming pulses. Typically, jamming attacks have been considered under an external threat model, in which the jammer is not part of the network.  Network Unit  Real Time Packet Classification  Selective Jamming Module  Strong Hiding Commitment Scheme (SHCS)  Cryptographic Puzzle Hiding Scheme (CPHS).  Network Unit We address the problem of preventing the jamming node from classifying m in real time, thus mitigating J’s ability to perform selective jamming. The network consists of a collection of nodes connected via wireless links. Nodes may communicate directly if they are within communication range, or indirectly via multiple hops. Nodes communicate both in uncast mode and broadcast mode. Communications can be either unencrypted or encrypted. For encrypted broadcast Source Select the File to Send Channel Encoding & Interleaving Send Packet Destination De-Interleaving the Data Channel Decoding Show Packets
  • 3. communications, symmetric keys are shared among all intended receivers. These keys are established using pre shared pair wise keys or asymmetric cryptography.  Real Time Packet Classification Consider the generic communication system depicted. At the PHY layer, a packet m is encoded, interleaved, and modulated before it is transmitted over the wireless channel. At the receiver, the signal is demodulated, de interleaved, and decoded, to recover the original packet m. Moreover, even if the encryption key of a hiding scheme were to remain secret, the static portions of a transmitted packet could potentially lead to packet classification. This is because for computationally-efficient encryption methods such as block encryption, the encryption of a prefix plaintext with the same key yields a static cipher text prefix. Hence, an adversary who is aware of the underlying protocol specifics (structure of the frame) can use the static cipher text portions of a transmitted packet to classify it.  Selective Jamming Component The impact of selective jamming attacks on the network performance. Implement selective jamming attacks in two multi-hop wireless network scenarios. In the first scenario, the attacker targeted a TCP connection established over a multi-hop wireless route. In the second scenario, the jammer targeted network-layer control messages transmitted during the route establishment process selective jamming would be the encryption of transmitted packets (including headers) with a static key . Figure 3. Selective Jamming Diagram  Strong Hiding Commitment Scheme (Shcs) Propose a strong hiding commitment scheme (SHCS), which is based on symmetric cryptography. Our main motivation is to satisfy the strong hiding property while keeping the computation and communication overhead to a minimum. The computation overhead of SHCS is one symmetric encryption at the sender and one symmetric decryption at the receiver. Because the header information is permuted as a trailer and encrypted, all However, in wireless protocols such as 802.11, the complete packet is received at the MAC layer before it is decided if the packet must be discarded or be further processed. Figure. 4. Processing at the hiding sublayer.  Cryptographic Puzzle Hiding Scheme (CPHS) Propose a solution based on All -Or- Nothing Transformations (AONT) that introduces a modest communication and computation overhead. Such transformations were originally proposed by Rivest to slow down brute force attacks against block encryption algorithms. An AONT serves as a publicly known and completely invertible pre-processing step to a plaintext before it is passed to an ordinary block encryption algorithm. Present a packet hiding scheme based on cryptographic puzzles. The main idea behind such puzzles is to force the recipient of a puzzle execute a pre-defined set of computations before he is able to extract a secret of interest. The time required for obtaining the solution of a puzzle depends on its hardness and the computational ability of the solver. The advantage of the puzzle based scheme is that its security does not rely on the PHY layer parameters. However, it has higher computation and communication overhead. Fe ld 1 Fi el d 2 Field 3 Fi el d n Random Payload m } } } } } . . . . . . . . . . . . . . . . . . π1( m) . . . . . . . . . Figure. 5. Application of permutation π1 on packet m.
  • 4. VI.EXPERIMENTAL RESULT Figure 6. Run the Source Page File Figure 7 .Run The Destination File Figure 8.Encoding the Selecting File Figure 9. Interleaving the Selecting File Figure 10.Choose the Destination Node Figure 11.Receving the Selecting File
  • 5. V. CONCLUSION In previous research methodologies to detect jamming attacks are illustrated it is also shown that it is possible to identify which kind of jamming attack is ongoing by looking at the signal strength and other relevant network parameters. Such as bit and packet error. We model the interactions between a jammer and a target node as a jamming .We have suggested a cryptography puzzle hiding scheme techniques of the transactions within a jammer and interaction node that a use a timing pathway to develop flexibility to jamming attacks. We evaluated the impact of selective jamming attacks on network protocols such as TCP and routing. Our finding show that a selective jammer can significantly impact performance with very low effort. We developed our scheme combine transform a selective jammer to a random one by preventing real-time packet classification. Our scheme combine cryptographic primitives such as commitment schemes, cryptographic puzzles, and all- or-nothing transformation (ANOTs) with physical layer characteristics. We analyzed the security of our schemes and qualified their computational and communication overhead REFERENCE [1] T. X. Brown, J. E. James, and A. Sethi. Jamming and sensing of encrypted wireless ad hoc networks. In Proceedings of MobiHoc, pages 120–130, 2006. [2] M. Cagalj, S. Capkun, and J.-P. Hubaux. Wormhole-based anti-jamming techniques in sensor networks. IEEE Transactions on Mobile Computing, 6(1):100–114, 2007. [3] A. Chan, X. Liu, G. Noubir, and B. Thapa. Control channel jamming: Resilience and identification of traitors. In Proceedings of ISIT, 2007. [4] T. Dempsey, G. Sahin, Y. Morton, and C. Hopper. Intelligent sensing and classification in ad hoc networks: a case study. Aerospace and Electronic Systems Magazine, IEEE, 24(8):23–30, August 2009. [5] Y. Desmedt. Broadcast anti-jamming systems. Computer Networks, 35(2-3):223–236, February 2001. [6] K. Gaj and P. Chodowiec. FPGA and ASIC implementations of AES.Cryptographic Engineering, pages 235–294, 2009. [7] O. Goldreich. Foundations of cryptography: Basic applications. Cam-bridge University Press, 2004. [8] B. Greenstein, D. Mccoy, J. Pang, T. Kohno, S. Seshan, and D. Wether-all. Improving wireless privacy with an identifier- free link layer protocol. In Proceedings of MobiSys, 2008. [9] http://www.networkimprovement.php.edu [10] A. Juels and J. Brainard. Client puzzles: A cryptographic counter-measure against connection depletion attacks. In Proceedings of NDSS, pages 151–165, 1999. [11] Y. W. Law, M. Palaniswami, L. V. Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy-efficient link-layer jamming attacks against WSN MAC protocols. ACM Transactions on Sensors Networks, 5(1):1–38, 2009. [12] L. Lazos, S. Liu, and M. Krunz. Mitigating control-channel jamming attacks in multi-channel ad hoc networks. In Proceedings of the 2nd ACM conference on wireless network security, pages 169–180, 2009. [13] G. Lin and G. Noubir. On link layer denial of service in data wireless LANs. Wireless Communications and Mobile Computing, 5(3):273–284, May 2004. [14] X. Liu, G. Noubir, and R. Sundaram. Spread: Foiling smart jammers using multi-layer agility. In Proceedings of INFOCOM, pages 2536– 2540, 2007. [15] Y. Liu, P. Ning, H. Dai, and A. Liu. Randomized differential DSSS: Jamming-resistant wireless broadcast communication. In Proceedings of INFOCOM, San Diego, 2010. [16] R. C. Merkle. Secure communications over insecure channels. Com-munications of the ACM, 21(4):294–299, 1978. [17] G. Noubir and G. Lin. Low-power DoS attacks in data wireless lans and countermeasures. Mobile Computing and Communications Review, 7(3):29–30, 2003. [18] OPNET. OPNET tm modeler 14.5. http://www.opnet.com/. [19] C. Perkins, E. Belding-Royer, and S. Das. RFC 3561: Ad hoc on-demand distance vector (AODV) routing. Internet RFCs, 2003. ˇ [20] C. Popper,¨ M. Strasser, and S. Capkun. Jamming-resistant broadcast communication without shared keys. In Proceedings of the USENIX Security Symposium, 2009.