SlideShare a Scribd company logo
1 of 6
Defeating Jamming With the Power of Silence: A Game-
Theoretic Analysis
ABSTRACT:
The timing channel is a logical communication channel in which information is
encoded in the timing between events. Recently, the use of the timing channel has
been proposed as a countermeasure to reactive jamming attacks performed by an
energy- constrained malicious node. In fact, while a jammer is able to disrupt the
information contained in the attacked packets, timing information cannot be
jammed, and therefore, timing channels can be exploited to deliver information to
the receiver even on a jammed channel. Since the nodes under attack and the
jammer have conflicting interests, their interactions can be modeled by means of
game theory. Accordingly, in this paper, a game-theoretic model of the interactions
between nodes exploiting the timing channel to achieve resilience to jamming
attacks and a jammer is derived and analyzed. More specifically, the Nash
equilibrium is studied in terms of existence, uniqueness, and convergence under
best response dynamics. Furthermore, the case in which the communication nodes
set their strategy and the jammer reacts accordingly is modeled and analyzed as a
Stackelberg game, by considering both perfect and imperfect knowledge of the
jammer’s utility function. Extensive numerical results are presented, showing the
impact of network parameters on the system performance.
EXISTING SYSTEM:
 Recently, use of timing channels has been proposed in the wireless domain
to support low rate, energy efficient communications as well as covert and
resilient communications.
 In existing system methodologies to detect jamming attacks are illustrated; it
is also shown that it is possible to identify which kind of jamming attack is
ongoing by looking at the signal strength and other relevant network
parameters, such as bit and packet errors.
 Several solutions against reactive jamming have been proposed that exploit
different techniques, such as frequency hopping, power control and
unjammed bits.
DISADVANTAGES OF EXISTING SYSTEM:
 Continuous jamming is very costly in terms of energy consumption for the
jammer
 Existing solutions usually rely on users’ cooperation and coordination,
which might not be guaranteed in a jammed environment. In fact, the
reactive jammer can totally disrupt each transmitted packet and,
consequently, no information can be decoded and then used to this purpose.
PROPOSED SYSTEM:
 In this paper we focus on the resilience of timing channels to jamming
attacks. In general, these attacks can completely disrupt communications
when the jammer continuously emits a high power disturbing signal, i.e.,
when continuous jamming is performed.
 In this paper we analyze the interactions between the jammer and the node
whose transmissions are under attack, which we call target node.
Specifically, we assume that the target node wants to maximize the amount
of information that can be transmitted per unit of time by means of the
timing channel, whereas, the jammer wants to minimize such amount of
information while reducing the energy expenditure.
 As the target node and the jammer have conflicting interests, we develop a
game theoretical framework that models their interactions. We investigate
both the case in which these two adversaries play their strategies
simultaneously, and the situation when the target node (the leader)
anticipates the actions of the jammer (the follower). To this purpose, we
study both the Nash Equilibria (NEs) and Stackelberg Equilibria (SEs) of
our proposed games.
ADVANTAGES OF PROPOSED SYSTEM:
 We model the interactions between a jammer and a target node as a jamming
game
 We prove the existence, uniqueness and convergence to the Nash
equilibrium (NE) under best responsedynamics
 We prove the existence and uniqueness of the equilibrium of the Stackelberg
game where the target node plays as a leader and the jammer reacts
consequently
 We investigate in this latter Stackelberg scenario the impact on the
achievable performance of imperfect knowledge of the jammer’s utility
function;
 We conduct an extensive numerical analysis which shows that our proposed
models well capture the main factors behind the utilization of timing
channels, thus representing a promising framework for the design and
understanding of such systems.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7.
 Coding Language : C#.net
 Tool : Visual Studio 2010
 Database : SQL SERVER 2008
REFERENCE:
Salvatore D’Oro, Student Member, IEEE, Laura Galluccio, Member, IEEE, iacomo
Morabito, Sergio Palazzo, Senior Member, IEEE, Lin Chen, Member, IEEE, and
Fabio Martignon, Member, IEEE, “Defeating Jamming With the Power of Silence:
A Game-Theoretic Analysis”, IEEE TRANSACTIONS ON WIRELESS
COMMUNICATIONS,VOL. 14, NO. 5, MAY 2015.

More Related Content

Similar to Defeating jamming with the power of silence

Defeating jamming with the power of silence a game theoretic analysis
Defeating jamming with the power of silence a game theoretic analysisDefeating jamming with the power of silence a game theoretic analysis
Defeating jamming with the power of silence a game theoretic analysisShakas Technologies
 
Defeating jamming with the power of silence
Defeating jamming with the power of silenceDefeating jamming with the power of silence
Defeating jamming with the power of silenceranjith kumar
 
Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis
Defeating Jamming With the Power of Silence: A Game-Theoretic AnalysisDefeating Jamming With the Power of Silence: A Game-Theoretic Analysis
Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis1crore projects
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topologyIAEME Publication
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topologyprjpublications
 
APPROXIMATING NASH EQUILIBRIUM UNIQUENESS OF POWER CONTROL IN PRACTICAL WSNS
APPROXIMATING NASH EQUILIBRIUM UNIQUENESS OF POWER CONTROL IN PRACTICAL WSNSAPPROXIMATING NASH EQUILIBRIUM UNIQUENESS OF POWER CONTROL IN PRACTICAL WSNS
APPROXIMATING NASH EQUILIBRIUM UNIQUENESS OF POWER CONTROL IN PRACTICAL WSNSIJCNCJournal
 
Erca energy efficient routing and reclustering
Erca energy efficient routing and reclusteringErca energy efficient routing and reclustering
Erca energy efficient routing and reclusteringaciijournal
 
IEEE Wireless communication 2016 Title and Abstract
IEEE Wireless communication 2016 Title and AbstractIEEE Wireless communication 2016 Title and Abstract
IEEE Wireless communication 2016 Title and Abstracttsysglobalsolutions
 
Distributed throughput maximization in wireless networks using the stability ...
Distributed throughput maximization in wireless networks using the stability ...Distributed throughput maximization in wireless networks using the stability ...
Distributed throughput maximization in wireless networks using the stability ...Nexgen Technology
 
Cluster head election using imperialist competitive algorithm (chei) for wire...
Cluster head election using imperialist competitive algorithm (chei) for wire...Cluster head election using imperialist competitive algorithm (chei) for wire...
Cluster head election using imperialist competitive algorithm (chei) for wire...ijmnct
 
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...IJCNCJournal
 
A Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control ManetA Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control Manetgraphhoc
 
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based ApproachEnergy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based ApproachIJRES Journal
 
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORKAN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORKijceronline
 

Similar to Defeating jamming with the power of silence (20)

Defeating jamming with the power of silence a game theoretic analysis
Defeating jamming with the power of silence a game theoretic analysisDefeating jamming with the power of silence a game theoretic analysis
Defeating jamming with the power of silence a game theoretic analysis
 
Defeating jamming with the power of silence
Defeating jamming with the power of silenceDefeating jamming with the power of silence
Defeating jamming with the power of silence
 
Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis
Defeating Jamming With the Power of Silence: A Game-Theoretic AnalysisDefeating Jamming With the Power of Silence: A Game-Theoretic Analysis
Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis
 
Antijam ipsn09
Antijam ipsn09Antijam ipsn09
Antijam ipsn09
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topology
 
3 3 energy efficient topology
3 3 energy efficient topology3 3 energy efficient topology
3 3 energy efficient topology
 
APPROXIMATING NASH EQUILIBRIUM UNIQUENESS OF POWER CONTROL IN PRACTICAL WSNS
APPROXIMATING NASH EQUILIBRIUM UNIQUENESS OF POWER CONTROL IN PRACTICAL WSNSAPPROXIMATING NASH EQUILIBRIUM UNIQUENESS OF POWER CONTROL IN PRACTICAL WSNS
APPROXIMATING NASH EQUILIBRIUM UNIQUENESS OF POWER CONTROL IN PRACTICAL WSNS
 
Erca energy efficient routing and reclustering
Erca energy efficient routing and reclusteringErca energy efficient routing and reclustering
Erca energy efficient routing and reclustering
 
A1803060110
A1803060110A1803060110
A1803060110
 
Ns2 2015 2016 titles abstract
Ns2 2015 2016 titles abstractNs2 2015 2016 titles abstract
Ns2 2015 2016 titles abstract
 
Ns2 2015 2016 titles abstract
Ns2 2015 2016 titles abstractNs2 2015 2016 titles abstract
Ns2 2015 2016 titles abstract
 
IEEE Wireless communication 2016 Title and Abstract
IEEE Wireless communication 2016 Title and AbstractIEEE Wireless communication 2016 Title and Abstract
IEEE Wireless communication 2016 Title and Abstract
 
1104.0355
1104.03551104.0355
1104.0355
 
Distributed throughput maximization in wireless networks using the stability ...
Distributed throughput maximization in wireless networks using the stability ...Distributed throughput maximization in wireless networks using the stability ...
Distributed throughput maximization in wireless networks using the stability ...
 
Cluster head election using imperialist competitive algorithm (chei) for wire...
Cluster head election using imperialist competitive algorithm (chei) for wire...Cluster head election using imperialist competitive algorithm (chei) for wire...
Cluster head election using imperialist competitive algorithm (chei) for wire...
 
Jammers in wsn
Jammers in wsnJammers in wsn
Jammers in wsn
 
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
NODE FAILURE TIME AND COVERAGE LOSS TIME ANALYSIS FOR MAXIMUM STABILITY VS MI...
 
A Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control ManetA Transmission Range Based Clustering Algorithm for Topology Control Manet
A Transmission Range Based Clustering Algorithm for Topology Control Manet
 
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based ApproachEnergy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
Energy Conservation in Wireless Sensor Networks Using Cluster-Based Approach
 
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORKAN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
AN EFFICIENT SLEEP SCHEDULING STRATEGY FOR WIRELESS SENSOR NETWORK
 

More from jpstudcorner

Variable length signature for near-duplicate
Variable length signature for near-duplicateVariable length signature for near-duplicate
Variable length signature for near-duplicatejpstudcorner
 
Robust representation and recognition of facial
Robust representation and recognition of facialRobust representation and recognition of facial
Robust representation and recognition of facialjpstudcorner
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpegjpstudcorner
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpegjpstudcorner
 
Pareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrievalPareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrievaljpstudcorner
 
Multifocus image fusion based on nsct
Multifocus image fusion based on nsctMultifocus image fusion based on nsct
Multifocus image fusion based on nsctjpstudcorner
 
Image super resolution based on
Image super resolution based onImage super resolution based on
Image super resolution based onjpstudcorner
 
Fractal analysis for reduced reference
Fractal analysis for reduced referenceFractal analysis for reduced reference
Fractal analysis for reduced referencejpstudcorner
 
Face sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy searchFace sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy searchjpstudcorner
 
Face recognition across non uniform motion
Face recognition across non uniform motionFace recognition across non uniform motion
Face recognition across non uniform motionjpstudcorner
 
Combining left and right palmprint images for
Combining left and right palmprint images forCombining left and right palmprint images for
Combining left and right palmprint images forjpstudcorner
 
A probabilistic approach for color correction
A probabilistic approach for color correctionA probabilistic approach for color correction
A probabilistic approach for color correctionjpstudcorner
 
A no reference texture regularity metric
A no reference texture regularity metricA no reference texture regularity metric
A no reference texture regularity metricjpstudcorner
 
A feature enriched completely blind image
A feature enriched completely blind imageA feature enriched completely blind image
A feature enriched completely blind imagejpstudcorner
 
Sel csp a framework to facilitate
Sel csp a framework to facilitateSel csp a framework to facilitate
Sel csp a framework to facilitatejpstudcorner
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertainjpstudcorner
 
Psmpa patient self controllable
Psmpa patient self controllablePsmpa patient self controllable
Psmpa patient self controllablejpstudcorner
 
Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detectionjpstudcorner
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploadedjpstudcorner
 
Page a partition aware engine
Page a partition aware enginePage a partition aware engine
Page a partition aware enginejpstudcorner
 

More from jpstudcorner (20)

Variable length signature for near-duplicate
Variable length signature for near-duplicateVariable length signature for near-duplicate
Variable length signature for near-duplicate
 
Robust representation and recognition of facial
Robust representation and recognition of facialRobust representation and recognition of facial
Robust representation and recognition of facial
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
 
Pareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrievalPareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrieval
 
Multifocus image fusion based on nsct
Multifocus image fusion based on nsctMultifocus image fusion based on nsct
Multifocus image fusion based on nsct
 
Image super resolution based on
Image super resolution based onImage super resolution based on
Image super resolution based on
 
Fractal analysis for reduced reference
Fractal analysis for reduced referenceFractal analysis for reduced reference
Fractal analysis for reduced reference
 
Face sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy searchFace sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy search
 
Face recognition across non uniform motion
Face recognition across non uniform motionFace recognition across non uniform motion
Face recognition across non uniform motion
 
Combining left and right palmprint images for
Combining left and right palmprint images forCombining left and right palmprint images for
Combining left and right palmprint images for
 
A probabilistic approach for color correction
A probabilistic approach for color correctionA probabilistic approach for color correction
A probabilistic approach for color correction
 
A no reference texture regularity metric
A no reference texture regularity metricA no reference texture regularity metric
A no reference texture regularity metric
 
A feature enriched completely blind image
A feature enriched completely blind imageA feature enriched completely blind image
A feature enriched completely blind image
 
Sel csp a framework to facilitate
Sel csp a framework to facilitateSel csp a framework to facilitate
Sel csp a framework to facilitate
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertain
 
Psmpa patient self controllable
Psmpa patient self controllablePsmpa patient self controllable
Psmpa patient self controllable
 
Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detection
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploaded
 
Page a partition aware engine
Page a partition aware enginePage a partition aware engine
Page a partition aware engine
 

Recently uploaded

Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsvanyagupta248
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEselvakumar948
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdfKamal Acharya
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxNadaHaitham1
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 

Recently uploaded (20)

Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLEGEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
GEAR TRAIN- BASIC CONCEPTS AND WORKING PRINCIPLE
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 

Defeating jamming with the power of silence

  • 1. Defeating Jamming With the Power of Silence: A Game- Theoretic Analysis ABSTRACT: The timing channel is a logical communication channel in which information is encoded in the timing between events. Recently, the use of the timing channel has been proposed as a countermeasure to reactive jamming attacks performed by an energy- constrained malicious node. In fact, while a jammer is able to disrupt the information contained in the attacked packets, timing information cannot be jammed, and therefore, timing channels can be exploited to deliver information to the receiver even on a jammed channel. Since the nodes under attack and the jammer have conflicting interests, their interactions can be modeled by means of game theory. Accordingly, in this paper, a game-theoretic model of the interactions between nodes exploiting the timing channel to achieve resilience to jamming attacks and a jammer is derived and analyzed. More specifically, the Nash equilibrium is studied in terms of existence, uniqueness, and convergence under best response dynamics. Furthermore, the case in which the communication nodes set their strategy and the jammer reacts accordingly is modeled and analyzed as a Stackelberg game, by considering both perfect and imperfect knowledge of the jammer’s utility function. Extensive numerical results are presented, showing the impact of network parameters on the system performance.
  • 2. EXISTING SYSTEM:  Recently, use of timing channels has been proposed in the wireless domain to support low rate, energy efficient communications as well as covert and resilient communications.  In existing system methodologies to detect jamming attacks are illustrated; it is also shown that it is possible to identify which kind of jamming attack is ongoing by looking at the signal strength and other relevant network parameters, such as bit and packet errors.  Several solutions against reactive jamming have been proposed that exploit different techniques, such as frequency hopping, power control and unjammed bits. DISADVANTAGES OF EXISTING SYSTEM:  Continuous jamming is very costly in terms of energy consumption for the jammer  Existing solutions usually rely on users’ cooperation and coordination, which might not be guaranteed in a jammed environment. In fact, the reactive jammer can totally disrupt each transmitted packet and, consequently, no information can be decoded and then used to this purpose. PROPOSED SYSTEM:
  • 3.  In this paper we focus on the resilience of timing channels to jamming attacks. In general, these attacks can completely disrupt communications when the jammer continuously emits a high power disturbing signal, i.e., when continuous jamming is performed.  In this paper we analyze the interactions between the jammer and the node whose transmissions are under attack, which we call target node. Specifically, we assume that the target node wants to maximize the amount of information that can be transmitted per unit of time by means of the timing channel, whereas, the jammer wants to minimize such amount of information while reducing the energy expenditure.  As the target node and the jammer have conflicting interests, we develop a game theoretical framework that models their interactions. We investigate both the case in which these two adversaries play their strategies simultaneously, and the situation when the target node (the leader) anticipates the actions of the jammer (the follower). To this purpose, we study both the Nash Equilibria (NEs) and Stackelberg Equilibria (SEs) of our proposed games. ADVANTAGES OF PROPOSED SYSTEM:
  • 4.  We model the interactions between a jammer and a target node as a jamming game  We prove the existence, uniqueness and convergence to the Nash equilibrium (NE) under best responsedynamics  We prove the existence and uniqueness of the equilibrium of the Stackelberg game where the target node plays as a leader and the jammer reacts consequently  We investigate in this latter Stackelberg scenario the impact on the achievable performance of imperfect knowledge of the jammer’s utility function;  We conduct an extensive numerical analysis which shows that our proposed models well capture the main factors behind the utilization of timing channels, thus representing a promising framework for the design and understanding of such systems. SYSTEM ARCHITECTURE:
  • 5. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:
  • 6.  Operating system : Windows XP/7.  Coding Language : C#.net  Tool : Visual Studio 2010  Database : SQL SERVER 2008 REFERENCE: Salvatore D’Oro, Student Member, IEEE, Laura Galluccio, Member, IEEE, iacomo Morabito, Sergio Palazzo, Senior Member, IEEE, Lin Chen, Member, IEEE, and Fabio Martignon, Member, IEEE, “Defeating Jamming With the Power of Silence: A Game-Theoretic Analysis”, IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS,VOL. 14, NO. 5, MAY 2015.