SlideShare a Scribd company logo
1 of 15
Wiretapping, wireless
jamming
By Tsedey Shewakena
Id DBUE/809/11
Wiretapping
• is a technique of observing and analyzing the flow of data in a network in an active or
passive mode. The attack can perform denial of service attack by executing wiretapping.
• Wiretapping is the surreptitious electronic monitoring of telephone, telegraph, cellular, fax
or Internet-based communications.
• Wiretapping is achieved either through the placement of a monitoring device informally
known as a bug on the wire in question or through built in mechanisms in other
communication technologies. Enforcement officials may tap into either for live monitoring
or recording
• Commonly used modern day wiretapping tool. A variety of other tools, such as wiretap
Trojans, are used for different applications.
Types of wiretapping
There are 4 types of wiretap; such as
• Hardwired wiretap-a set of wires attached to an ‘isolation’ or ‘slave’ device is
attached to an existing wire that a signal travels on .The signal can then be
intercepted or bridged bank to a secure location.
• Soft wiretap-this requires a modification to the phone system software through the
telephone company a business PBX.
• Recording wiretap-this is quite simplistic and is simply a tape recorder hard wired
into the phone line and the tapes must be switched out regularity.
• Transmitting wiretap-this type of bug is an RF (radio frequency) transmitter typically
containing a mini microphone that is connected to a carrier current wire.
• For example, to secretly listen to people by connecting a listening device
to their telephone, or to attach a listening device to a telephone for this
purpose: The police chief was accused of illegally wiretapping
politicians, government officials, and journalists. We have laws to
protect us from people wiretapping our phones.
Wireless jamming
• Jamming is an effective way for the enemy to disrupt our command, control,
and communications on the battlefield. All the enemy needs to jam us is a
transmitter tuned to our frequency with enough power to override friendly
signals at our receivers. Jammers operate against receivers not transmitters.
• Wireless jamming aims at blocking wireless communication by keeping the
medium busy or by corrupting received signal using radio interference.
Attack strategies
• Scanning: Attack radio keeps hopping until it finds a channel that has legitimate
activity. It will stay until it detects lack of activity.
• Sweeping: Attackers periodically and simultaneously switch channels irrespective of
channel activity, and jam until the next period.
modesof jamming
Spot jamming
• Spot jamming is concentrated power directed toward one channel or
frequency.
Barrage jamming
• Barrage jamming is power spread over several frequencies or channels at the
same time. Jamming can be difficult, if not impossible to detect. For this reason,
we must always be aware of the possibility of jamming and be able to recognize
it.
Types of Jamming
• The two types of jamming most commonly encountered are obvious and subtle
jamming.
Obvious jamming. This is normally very simple to detect. The more commonly
used jamming signals of this type are described below. Do not try to memorize
them; just be aware that these and others exist. When experiencing a jamming
incident, it is more important to recognize and overcome the incident than to
identify it formally.
• Random noise -This is synthetic radio noise. It is random in amplitude and frequency.
It is similar to normal background noise and can be used to degrade all types of
signals. Operators often mistake it for receiver or atmospheric noise and fail to take
appropriate ECCM actions.
• Stepped tones -These are tones transmitted in increasing and decreasing pitch. They
resemble the sound of bagpipes. Stepped tones are normally used against single-
channel AM or FM voice circuits.
• Spark -The spark signal is easily produced and is one of the most effective for
jamming. Bursts are of short duration and high intensity. They are repeated at a rapid
rate. This signal is effective in disrupting all types of radio communications.
• Preamble jamming -This type of jamming occurs when a tone resembling the
synchronization preamble of the speech security equipment is broadcast over the
operating frequency of secure radio sets. Preamble jamming results in all radios being
locked in the receive mode. It is especially effective when employed against radio nets
using speech security devices.
• Gulls. The gull signal is generated by a quick rise and slow fall of a variable radio
frequency and is similar to the cry of a sea gull. It produces a nuisance effect
and is very effective against voice radio communications.
• Random pulse. In this type of interference, pulses of varying amplitude,
duration, and rate are generated and transmitted. They are used to disrupt
teletypewriter, radar, and all types of data transmission systems.
• Wobbler. The wobbler signal is a single frequency which is modulated by a low
and slowly varying tone. The result is a howling sound that causes a nuisance
effect on voice radio communications.
• Recorded sounds. Any audible sound, especially of a variable nature, can be
used to distract radio operators and disrupt communications. Music, screams,
applause, whistles, machinery noise, and laughter are examples.
Subtle jamming. Subtle jamming is not obvious; no sound is heard from our
receivers. They cannot receive an incoming friendly signal, even though
everything appears normal to the radio operator.
Techniques For Preventing Jamming
Attacks
• A. Steganography In Cryptography, It’s a practice of concealing messages or
information within another non-secret file, message, image, or video. it makes
the sender and receiver invisible. Thus, steganography provides not only
security but also anonymity.
• B. Cryptographic Puzzle Hiding Scheme In packet hiding scheme based on
cryptographic puzzles. Puzzles force the recipient of a puzzle to execute a pre-
defined set of computations before he is able to extract a secret of interest. The
time required for cracking the solution of a puzzle depends on its hardness and
the computational ability of the solver. It has higher computation and
communication overhead .
• C. All-Or-Nothing Transformation -The packets are pre-processed by an AONT
before transmission but remain unencrypted. The jammer cannot perform packet
classification until all pseudo-messages corresponding to the original packet have
been received and the inverse transformation has been applied.
• D. Triple DES - uses a key bundle which comprises 3 DES keys K1, K2, K3, each of
which 56 bits excluding parity bits. An Encryption algorithm is: Cipher text =
EK3(DK2(EK1(plaintext))) In encryption process, the plaintext is encrypted with K1,
decrypted with K2 and again encrypted with K3. Decryption algorithm is: Plaintext =
DK1(EK2(DK3(cipher text))). In decryption process, cipher text is decrypted with K3,
encrypted with K2, and again decrypted with K1. Each triple DES encryption encrypts
one block of 64 bits of data. In each case, the middle operation is reverse of first and
last .
REFERENCE
• http://www.spamlaws.com
• Neha Thakur , ArunaSankaralingam “Introduction to Jamming Attacks and Prevention
Techniques using Honeypots in Wireless Networks” in IRACST April 2013
• A. Charns , Cloak and Gavel; FBI Wiretaps, Bugs, Informers, and the Supreme Cour
Univ. of Illinois Press, 1992.
• http://www.ijlera.com
Thank you

More Related Content

Similar to Wiretapping, wireless jamming.pptx

ETE405-lec3.pdf
ETE405-lec3.pdfETE405-lec3.pdf
ETE405-lec3.pdfmashiur
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrummpsrekha83
 
Risk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic EavesdroppingRisk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic EavesdroppingRisk Crew
 
Communication systems v4
Communication systems v4Communication systems v4
Communication systems v4babak danyal
 
LoRa online training for utility guys
LoRa online training for utility guysLoRa online training for utility guys
LoRa online training for utility guysNikolay Milovanov
 
UNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdfUNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdfvadasairaju143
 
Basic radio communication & operation
Basic radio communication & operationBasic radio communication & operation
Basic radio communication & operationTB Tatayeric Buhawi
 
Unit-1_Analog Communication_PPT (1).pptx
Unit-1_Analog Communication_PPT (1).pptxUnit-1_Analog Communication_PPT (1).pptx
Unit-1_Analog Communication_PPT (1).pptxVairaPrakash2
 
Satellite communication analog and digital signals
Satellite communication analog and digital signalsSatellite communication analog and digital signals
Satellite communication analog and digital signalsAjay Kumar
 
Introduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMAIntroduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMABidhan Ghimire
 
Characteristics of radio waves
Characteristics of radio wavesCharacteristics of radio waves
Characteristics of radio wavesKundan Kumar
 
1 Introduction upto em.pptx
1 Introduction upto em.pptx1 Introduction upto em.pptx
1 Introduction upto em.pptxpriya rana
 
Communication systems v3
Communication systems v3Communication systems v3
Communication systems v3babak danyal
 
Communication systems week 3
Communication systems week 3Communication systems week 3
Communication systems week 3babak danyal
 

Similar to Wiretapping, wireless jamming.pptx (20)

Cell phone jammers
Cell phone jammersCell phone jammers
Cell phone jammers
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
ETE405-lec3.pdf
ETE405-lec3.pdfETE405-lec3.pdf
ETE405-lec3.pdf
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Risk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic EavesdroppingRisk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic Eavesdropping
 
rmp
rmprmp
rmp
 
Bse 3106 wifi
Bse 3106 wifiBse 3106 wifi
Bse 3106 wifi
 
Communication systems v4
Communication systems v4Communication systems v4
Communication systems v4
 
Introduction to telephony
Introduction to telephonyIntroduction to telephony
Introduction to telephony
 
LoRa online training for utility guys
LoRa online training for utility guysLoRa online training for utility guys
LoRa online training for utility guys
 
UNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdfUNIT-V Wireless Communication.pdf
UNIT-V Wireless Communication.pdf
 
Basic radio communication & operation
Basic radio communication & operationBasic radio communication & operation
Basic radio communication & operation
 
Unit-1_Analog Communication_PPT (1).pptx
Unit-1_Analog Communication_PPT (1).pptxUnit-1_Analog Communication_PPT (1).pptx
Unit-1_Analog Communication_PPT (1).pptx
 
Satellite communication analog and digital signals
Satellite communication analog and digital signalsSatellite communication analog and digital signals
Satellite communication analog and digital signals
 
Introduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMAIntroduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMA
 
Characteristics of radio waves
Characteristics of radio wavesCharacteristics of radio waves
Characteristics of radio waves
 
1 Introduction upto em.pptx
1 Introduction upto em.pptx1 Introduction upto em.pptx
1 Introduction upto em.pptx
 
Communication systems v3
Communication systems v3Communication systems v3
Communication systems v3
 
Communication systems week 3
Communication systems week 3Communication systems week 3
Communication systems week 3
 
Cdmaconcepts
CdmaconceptsCdmaconcepts
Cdmaconcepts
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Wiretapping, wireless jamming.pptx

  • 1. Wiretapping, wireless jamming By Tsedey Shewakena Id DBUE/809/11
  • 2. Wiretapping • is a technique of observing and analyzing the flow of data in a network in an active or passive mode. The attack can perform denial of service attack by executing wiretapping. • Wiretapping is the surreptitious electronic monitoring of telephone, telegraph, cellular, fax or Internet-based communications. • Wiretapping is achieved either through the placement of a monitoring device informally known as a bug on the wire in question or through built in mechanisms in other communication technologies. Enforcement officials may tap into either for live monitoring or recording • Commonly used modern day wiretapping tool. A variety of other tools, such as wiretap Trojans, are used for different applications.
  • 3. Types of wiretapping There are 4 types of wiretap; such as • Hardwired wiretap-a set of wires attached to an ‘isolation’ or ‘slave’ device is attached to an existing wire that a signal travels on .The signal can then be intercepted or bridged bank to a secure location. • Soft wiretap-this requires a modification to the phone system software through the telephone company a business PBX. • Recording wiretap-this is quite simplistic and is simply a tape recorder hard wired into the phone line and the tapes must be switched out regularity. • Transmitting wiretap-this type of bug is an RF (radio frequency) transmitter typically containing a mini microphone that is connected to a carrier current wire.
  • 4. • For example, to secretly listen to people by connecting a listening device to their telephone, or to attach a listening device to a telephone for this purpose: The police chief was accused of illegally wiretapping politicians, government officials, and journalists. We have laws to protect us from people wiretapping our phones.
  • 5.
  • 6. Wireless jamming • Jamming is an effective way for the enemy to disrupt our command, control, and communications on the battlefield. All the enemy needs to jam us is a transmitter tuned to our frequency with enough power to override friendly signals at our receivers. Jammers operate against receivers not transmitters. • Wireless jamming aims at blocking wireless communication by keeping the medium busy or by corrupting received signal using radio interference.
  • 7. Attack strategies • Scanning: Attack radio keeps hopping until it finds a channel that has legitimate activity. It will stay until it detects lack of activity. • Sweeping: Attackers periodically and simultaneously switch channels irrespective of channel activity, and jam until the next period.
  • 8. modesof jamming Spot jamming • Spot jamming is concentrated power directed toward one channel or frequency. Barrage jamming • Barrage jamming is power spread over several frequencies or channels at the same time. Jamming can be difficult, if not impossible to detect. For this reason, we must always be aware of the possibility of jamming and be able to recognize it.
  • 9. Types of Jamming • The two types of jamming most commonly encountered are obvious and subtle jamming. Obvious jamming. This is normally very simple to detect. The more commonly used jamming signals of this type are described below. Do not try to memorize them; just be aware that these and others exist. When experiencing a jamming incident, it is more important to recognize and overcome the incident than to identify it formally.
  • 10. • Random noise -This is synthetic radio noise. It is random in amplitude and frequency. It is similar to normal background noise and can be used to degrade all types of signals. Operators often mistake it for receiver or atmospheric noise and fail to take appropriate ECCM actions. • Stepped tones -These are tones transmitted in increasing and decreasing pitch. They resemble the sound of bagpipes. Stepped tones are normally used against single- channel AM or FM voice circuits. • Spark -The spark signal is easily produced and is one of the most effective for jamming. Bursts are of short duration and high intensity. They are repeated at a rapid rate. This signal is effective in disrupting all types of radio communications. • Preamble jamming -This type of jamming occurs when a tone resembling the synchronization preamble of the speech security equipment is broadcast over the operating frequency of secure radio sets. Preamble jamming results in all radios being locked in the receive mode. It is especially effective when employed against radio nets using speech security devices.
  • 11. • Gulls. The gull signal is generated by a quick rise and slow fall of a variable radio frequency and is similar to the cry of a sea gull. It produces a nuisance effect and is very effective against voice radio communications. • Random pulse. In this type of interference, pulses of varying amplitude, duration, and rate are generated and transmitted. They are used to disrupt teletypewriter, radar, and all types of data transmission systems. • Wobbler. The wobbler signal is a single frequency which is modulated by a low and slowly varying tone. The result is a howling sound that causes a nuisance effect on voice radio communications. • Recorded sounds. Any audible sound, especially of a variable nature, can be used to distract radio operators and disrupt communications. Music, screams, applause, whistles, machinery noise, and laughter are examples. Subtle jamming. Subtle jamming is not obvious; no sound is heard from our receivers. They cannot receive an incoming friendly signal, even though everything appears normal to the radio operator.
  • 12. Techniques For Preventing Jamming Attacks • A. Steganography In Cryptography, It’s a practice of concealing messages or information within another non-secret file, message, image, or video. it makes the sender and receiver invisible. Thus, steganography provides not only security but also anonymity. • B. Cryptographic Puzzle Hiding Scheme In packet hiding scheme based on cryptographic puzzles. Puzzles force the recipient of a puzzle to execute a pre- defined set of computations before he is able to extract a secret of interest. The time required for cracking the solution of a puzzle depends on its hardness and the computational ability of the solver. It has higher computation and communication overhead .
  • 13. • C. All-Or-Nothing Transformation -The packets are pre-processed by an AONT before transmission but remain unencrypted. The jammer cannot perform packet classification until all pseudo-messages corresponding to the original packet have been received and the inverse transformation has been applied. • D. Triple DES - uses a key bundle which comprises 3 DES keys K1, K2, K3, each of which 56 bits excluding parity bits. An Encryption algorithm is: Cipher text = EK3(DK2(EK1(plaintext))) In encryption process, the plaintext is encrypted with K1, decrypted with K2 and again encrypted with K3. Decryption algorithm is: Plaintext = DK1(EK2(DK3(cipher text))). In decryption process, cipher text is decrypted with K3, encrypted with K2, and again decrypted with K1. Each triple DES encryption encrypts one block of 64 bits of data. In each case, the middle operation is reverse of first and last .
  • 14. REFERENCE • http://www.spamlaws.com • Neha Thakur , ArunaSankaralingam “Introduction to Jamming Attacks and Prevention Techniques using Honeypots in Wireless Networks” in IRACST April 2013 • A. Charns , Cloak and Gavel; FBI Wiretaps, Bugs, Informers, and the Supreme Cour Univ. of Illinois Press, 1992. • http://www.ijlera.com