SlideShare a Scribd company logo
1 of 5
Time-Delayed Broadcasting for Defeating Inside Jammers
ABSTRACT:
We address the problem of jamming-resistant broadcast communications under an
internal threat model. We propose a time-delayed broadcast scheme (TDBS),
which implements the broadcast operation as a series of unicast transmissions
distributed in frequency and time. TDBS does not rely on commonly shared
secrets, or the existence of jamming-immune control channels for coordinating
broadcasts. Instead, each node follows a unique pseudo-noise (PN) frequency
hopping sequence. Contrary to conventional PN sequences designed for multi-
access systems, the PN sequences in TDBS exhibit correlation to enable broadcast.
Moreover, they are designed to limit the information leakage due to the exposure
of a subset of sequences by compromised nodes. We map the problem of
constructing such PN sequences to the 1-factorization problem for complete
graphs. We further accommodate dynamic broadcast groups by mapping the
problem of updating the assigned PN sequences to the problem of constructing
rainbow paths in proper edge-colored graphs.
EXISTING SYSTEM:
 Several researchers have studied the broadcasting problem in the presence of
inside jammers. Methods eliminate the dependencyof SS on shared secrets.
 Baird et al. proposed the encoding of “indelible marks” at specific locations
within each broadcasted message. Assuming that the jammer cannot flip a
bit ‘1’ to a bit ‘0’, it was shown that a jammer cannot erase packets from the
wireless channel.
 Popper et al. proposed a method called Uncoordinated DSSS (UDSSS), in
which broadcast transmissions are spread according to a PN code, randomly
selected from a public codebook. Receivers decode transmitted messages by
exhaustively applying every PN codein the public codebook.
DISADVANTAGES OF EXISTING SYSTEM:
 Dependency on shared secrets
 In most PHY-layer standards, frame detection is based on the signal cross-
correlation between the received signal and the known preamble and does
not require preamble decoding.
PROPOSED SYSTEM:
 We propose the Time-Delayed Broadcast Scheme (TDBS) as an emergency
mechanism for temporarily restoring broadcast communications until inside
jammers are physically removed from the network. TDBS differs from
classical FHSS designs in that two communicating nodes do not follow the
same FH sequence, but are assigned unique ones. Unlike the typical
broadcast in which all receivers tune to the same channel, TDBS propagates
broadcast messages as a series of unicast transmissions, spread both in
frequency and time.
 To ensure resilience to inside jammers, the locations of these unicast
transmissions, defined by a frequency band/slot pair, are only partially
known to any subset of receivers. Assuming that the jammer can only
interfere with a limited number of frequency bands, a subset of the unicast
transmissions are interference-free, thus propagating broadcastmessages.
ADVANTAGES OF PROPOSED SYSTEM:
 Prevents the sender(s) from communicating with all, or a subset of the
intended receivers.
 We mapped the problem of minimizing the number of FH sequence changes
required for node addition, to the problem of finding rainbow paths in proper
edge-colored complete graphs.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7/LINUX.
 Implementation : NS2
 NS2 Version : NS2.2.28
 Front End : OTCL (Object Oriented Tool Command
Language)
 Tool : Cygwin (To simulate in Windows OS)
REFERENCE:
Sisi Liu, Loukas Lazos, Member, IEEE, and Marwan Krunz, Fellow, IEEE, “Time-
Delayed Broadcasting for Defeating Inside Jammer”, IEEE TRANSACTIONS
ON DEPENDABLE AND SECURE COMPUTING, VOL. 12, NO. 3,
MAY/JUNE 2015.

More Related Content

What's hot

An introduction to spread spectrum communications
An introduction to spread spectrum communicationsAn introduction to spread spectrum communications
An introduction to spread spectrum communicationsFarzad Nuseeb
 
Deep Neural Networks for Automatic detection of Sreams and Shouted Speech in ...
Deep Neural Networks for Automatic detection of Sreams and Shouted Speech in ...Deep Neural Networks for Automatic detection of Sreams and Shouted Speech in ...
Deep Neural Networks for Automatic detection of Sreams and Shouted Speech in ...Pierre Laffitte
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computingZituSahu
 
Ch6 bandwidth utilisation multiplexing and spreading
Ch6 bandwidth utilisation multiplexing and spreadingCh6 bandwidth utilisation multiplexing and spreading
Ch6 bandwidth utilisation multiplexing and spreadingAlban Landry MOUNGALA
 
Data communication and networking ==> Multiplexing .
Data communication and networking ==> Multiplexing .Data communication and networking ==> Multiplexing .
Data communication and networking ==> Multiplexing .zaid hanif
 
03 time division-multiplexing
03 time division-multiplexing03 time division-multiplexing
03 time division-multiplexingRafeek Mohamed
 

What's hot (20)

An introduction to spread spectrum communications
An introduction to spread spectrum communicationsAn introduction to spread spectrum communications
An introduction to spread spectrum communications
 
multiplexing
multiplexingmultiplexing
multiplexing
 
Deep Neural Networks for Automatic detection of Sreams and Shouted Speech in ...
Deep Neural Networks for Automatic detection of Sreams and Shouted Speech in ...Deep Neural Networks for Automatic detection of Sreams and Shouted Speech in ...
Deep Neural Networks for Automatic detection of Sreams and Shouted Speech in ...
 
Ssma
SsmaSsma
Ssma
 
Manmohan 15% PLAGIARISM REPORT M.TECH ( M S WORD FILE )
Manmohan 15% PLAGIARISM REPORT M.TECH ( M S WORD  FILE )Manmohan 15% PLAGIARISM REPORT M.TECH ( M S WORD  FILE )
Manmohan 15% PLAGIARISM REPORT M.TECH ( M S WORD FILE )
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Important question bank
Important question bankImportant question bank
Important question bank
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
MULTIPLEXERS
MULTIPLEXERSMULTIPLEXERS
MULTIPLEXERS
 
1004.0152v1
1004.0152v11004.0152v1
1004.0152v1
 
Wdm
WdmWdm
Wdm
 
6 chapter 1,2,3,4,5 (15%) M.TECH ( PDF FILE )
6 chapter 1,2,3,4,5 (15%) M.TECH ( PDF FILE )6 chapter 1,2,3,4,5 (15%) M.TECH ( PDF FILE )
6 chapter 1,2,3,4,5 (15%) M.TECH ( PDF FILE )
 
6 chapter 1,2,3,4,5 (15%) M.TECH ( M S WORD FILE )
6 chapter 1,2,3,4,5 (15%) M.TECH ( M S WORD FILE )6 chapter 1,2,3,4,5 (15%) M.TECH ( M S WORD FILE )
6 chapter 1,2,3,4,5 (15%) M.TECH ( M S WORD FILE )
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
Multiplexing Techniques
Multiplexing TechniquesMultiplexing Techniques
Multiplexing Techniques
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 
Ch6 bandwidth utilisation multiplexing and spreading
Ch6 bandwidth utilisation multiplexing and spreadingCh6 bandwidth utilisation multiplexing and spreading
Ch6 bandwidth utilisation multiplexing and spreading
 
Data communication and networking ==> Multiplexing .
Data communication and networking ==> Multiplexing .Data communication and networking ==> Multiplexing .
Data communication and networking ==> Multiplexing .
 
03 time division-multiplexing
03 time division-multiplexing03 time division-multiplexing
03 time division-multiplexing
 
Jammers in wsn
Jammers in wsnJammers in wsn
Jammers in wsn
 

Similar to Time delayed broadcasting for defeating

Contemporary Spread Spectrum Techniques: A Comparative Study
Contemporary Spread Spectrum Techniques: A Comparative StudyContemporary Spread Spectrum Techniques: A Comparative Study
Contemporary Spread Spectrum Techniques: A Comparative StudyIJERD Editor
 
09 spread spectrum
09 spread spectrum09 spread spectrum
09 spread spectrumKashif Amjad
 
Bracer a distributed broadcast protocol in multi hop cognitive radio ad hoc n...
Bracer a distributed broadcast protocol in multi hop cognitive radio ad hoc n...Bracer a distributed broadcast protocol in multi hop cognitive radio ad hoc n...
Bracer a distributed broadcast protocol in multi hop cognitive radio ad hoc n...ieeeprojectschennai
 
Introduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMAIntroduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMABidhan Ghimire
 
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...ijtsrd
 
Spread spectrum techniques
Spread spectrum techniquesSpread spectrum techniques
Spread spectrum techniquesFaisal Ch
 
spread spectrum in digital communication
spread spectrum in digital communicationspread spectrum in digital communication
spread spectrum in digital communicationNidhi Jain
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrummpsrekha83
 
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1418  PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...JPN1418  PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...chennaijp
 
Lect13 multiple access
Lect13 multiple accessLect13 multiple access
Lect13 multiple accesssumanuppala1
 
Unit-II Data Communication.ppt
Unit-II Data Communication.pptUnit-II Data Communication.ppt
Unit-II Data Communication.pptshloksharma1315
 
Dsss final
Dsss finalDsss final
Dsss finalAJAL A J
 
spread spectrum communication
spread spectrum communicationspread spectrum communication
spread spectrum communicationabhishek reddy
 

Similar to Time delayed broadcasting for defeating (20)

UNIT-5 Spread Spectrum Communication.pdf
UNIT-5 Spread Spectrum Communication.pdfUNIT-5 Spread Spectrum Communication.pdf
UNIT-5 Spread Spectrum Communication.pdf
 
Contemporary Spread Spectrum Techniques: A Comparative Study
Contemporary Spread Spectrum Techniques: A Comparative StudyContemporary Spread Spectrum Techniques: A Comparative Study
Contemporary Spread Spectrum Techniques: A Comparative Study
 
09 spread spectrum
09 spread spectrum09 spread spectrum
09 spread spectrum
 
09-SpreadSpectrum.ppt
09-SpreadSpectrum.ppt09-SpreadSpectrum.ppt
09-SpreadSpectrum.ppt
 
Bracer a distributed broadcast protocol in multi hop cognitive radio ad hoc n...
Bracer a distributed broadcast protocol in multi hop cognitive radio ad hoc n...Bracer a distributed broadcast protocol in multi hop cognitive radio ad hoc n...
Bracer a distributed broadcast protocol in multi hop cognitive radio ad hoc n...
 
A.pptx
A.pptxA.pptx
A.pptx
 
09 spread spectrum
09 spread spectrum09 spread spectrum
09 spread spectrum
 
Introduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMAIntroduction to spred spectrum and CDMA
Introduction to spred spectrum and CDMA
 
spread spectrum
spread spectrumspread spectrum
spread spectrum
 
CDMA
CDMACDMA
CDMA
 
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
 
Spread spectrum techniques
Spread spectrum techniquesSpread spectrum techniques
Spread spectrum techniques
 
spread spectrum in digital communication
spread spectrum in digital communicationspread spectrum in digital communication
spread spectrum in digital communication
 
Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1418  PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...JPN1418  PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
JPN1418 PSR: A Lightweight Proactive Source Routing Protocol For Mobile Ad H...
 
Lect13 multiple access
Lect13 multiple accessLect13 multiple access
Lect13 multiple access
 
Unit-II Data Communication.ppt
Unit-II Data Communication.pptUnit-II Data Communication.ppt
Unit-II Data Communication.ppt
 
Spread spectrum technologies
Spread spectrum technologiesSpread spectrum technologies
Spread spectrum technologies
 
Dsss final
Dsss finalDsss final
Dsss final
 
spread spectrum communication
spread spectrum communicationspread spectrum communication
spread spectrum communication
 

More from jpstudcorner

Variable length signature for near-duplicate
Variable length signature for near-duplicateVariable length signature for near-duplicate
Variable length signature for near-duplicatejpstudcorner
 
Robust representation and recognition of facial
Robust representation and recognition of facialRobust representation and recognition of facial
Robust representation and recognition of facialjpstudcorner
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpegjpstudcorner
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpegjpstudcorner
 
Pareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrievalPareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrievaljpstudcorner
 
Multifocus image fusion based on nsct
Multifocus image fusion based on nsctMultifocus image fusion based on nsct
Multifocus image fusion based on nsctjpstudcorner
 
Image super resolution based on
Image super resolution based onImage super resolution based on
Image super resolution based onjpstudcorner
 
Fractal analysis for reduced reference
Fractal analysis for reduced referenceFractal analysis for reduced reference
Fractal analysis for reduced referencejpstudcorner
 
Face sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy searchFace sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy searchjpstudcorner
 
Face recognition across non uniform motion
Face recognition across non uniform motionFace recognition across non uniform motion
Face recognition across non uniform motionjpstudcorner
 
Combining left and right palmprint images for
Combining left and right palmprint images forCombining left and right palmprint images for
Combining left and right palmprint images forjpstudcorner
 
A probabilistic approach for color correction
A probabilistic approach for color correctionA probabilistic approach for color correction
A probabilistic approach for color correctionjpstudcorner
 
A no reference texture regularity metric
A no reference texture regularity metricA no reference texture regularity metric
A no reference texture regularity metricjpstudcorner
 
A feature enriched completely blind image
A feature enriched completely blind imageA feature enriched completely blind image
A feature enriched completely blind imagejpstudcorner
 
Sel csp a framework to facilitate
Sel csp a framework to facilitateSel csp a framework to facilitate
Sel csp a framework to facilitatejpstudcorner
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertainjpstudcorner
 
Psmpa patient self controllable
Psmpa patient self controllablePsmpa patient self controllable
Psmpa patient self controllablejpstudcorner
 
Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detectionjpstudcorner
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploadedjpstudcorner
 
Page a partition aware engine
Page a partition aware enginePage a partition aware engine
Page a partition aware enginejpstudcorner
 

More from jpstudcorner (20)

Variable length signature for near-duplicate
Variable length signature for near-duplicateVariable length signature for near-duplicate
Variable length signature for near-duplicate
 
Robust representation and recognition of facial
Robust representation and recognition of facialRobust representation and recognition of facial
Robust representation and recognition of facial
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
 
Revealing the trace of high quality jpeg
Revealing the trace of high quality jpegRevealing the trace of high quality jpeg
Revealing the trace of high quality jpeg
 
Pareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrievalPareto depth for multiple-query image retrieval
Pareto depth for multiple-query image retrieval
 
Multifocus image fusion based on nsct
Multifocus image fusion based on nsctMultifocus image fusion based on nsct
Multifocus image fusion based on nsct
 
Image super resolution based on
Image super resolution based onImage super resolution based on
Image super resolution based on
 
Fractal analysis for reduced reference
Fractal analysis for reduced referenceFractal analysis for reduced reference
Fractal analysis for reduced reference
 
Face sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy searchFace sketch synthesis via sparse representation based greedy search
Face sketch synthesis via sparse representation based greedy search
 
Face recognition across non uniform motion
Face recognition across non uniform motionFace recognition across non uniform motion
Face recognition across non uniform motion
 
Combining left and right palmprint images for
Combining left and right palmprint images forCombining left and right palmprint images for
Combining left and right palmprint images for
 
A probabilistic approach for color correction
A probabilistic approach for color correctionA probabilistic approach for color correction
A probabilistic approach for color correction
 
A no reference texture regularity metric
A no reference texture regularity metricA no reference texture regularity metric
A no reference texture regularity metric
 
A feature enriched completely blind image
A feature enriched completely blind imageA feature enriched completely blind image
A feature enriched completely blind image
 
Sel csp a framework to facilitate
Sel csp a framework to facilitateSel csp a framework to facilitate
Sel csp a framework to facilitate
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertain
 
Psmpa patient self controllable
Psmpa patient self controllablePsmpa patient self controllable
Psmpa patient self controllable
 
Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detection
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploaded
 
Page a partition aware engine
Page a partition aware enginePage a partition aware engine
Page a partition aware engine
 

Recently uploaded

Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 

Time delayed broadcasting for defeating

  • 1. Time-Delayed Broadcasting for Defeating Inside Jammers ABSTRACT: We address the problem of jamming-resistant broadcast communications under an internal threat model. We propose a time-delayed broadcast scheme (TDBS), which implements the broadcast operation as a series of unicast transmissions distributed in frequency and time. TDBS does not rely on commonly shared secrets, or the existence of jamming-immune control channels for coordinating broadcasts. Instead, each node follows a unique pseudo-noise (PN) frequency hopping sequence. Contrary to conventional PN sequences designed for multi- access systems, the PN sequences in TDBS exhibit correlation to enable broadcast. Moreover, they are designed to limit the information leakage due to the exposure of a subset of sequences by compromised nodes. We map the problem of constructing such PN sequences to the 1-factorization problem for complete graphs. We further accommodate dynamic broadcast groups by mapping the problem of updating the assigned PN sequences to the problem of constructing rainbow paths in proper edge-colored graphs.
  • 2. EXISTING SYSTEM:  Several researchers have studied the broadcasting problem in the presence of inside jammers. Methods eliminate the dependencyof SS on shared secrets.  Baird et al. proposed the encoding of “indelible marks” at specific locations within each broadcasted message. Assuming that the jammer cannot flip a bit ‘1’ to a bit ‘0’, it was shown that a jammer cannot erase packets from the wireless channel.  Popper et al. proposed a method called Uncoordinated DSSS (UDSSS), in which broadcast transmissions are spread according to a PN code, randomly selected from a public codebook. Receivers decode transmitted messages by exhaustively applying every PN codein the public codebook. DISADVANTAGES OF EXISTING SYSTEM:  Dependency on shared secrets  In most PHY-layer standards, frame detection is based on the signal cross- correlation between the received signal and the known preamble and does not require preamble decoding.
  • 3. PROPOSED SYSTEM:  We propose the Time-Delayed Broadcast Scheme (TDBS) as an emergency mechanism for temporarily restoring broadcast communications until inside jammers are physically removed from the network. TDBS differs from classical FHSS designs in that two communicating nodes do not follow the same FH sequence, but are assigned unique ones. Unlike the typical broadcast in which all receivers tune to the same channel, TDBS propagates broadcast messages as a series of unicast transmissions, spread both in frequency and time.  To ensure resilience to inside jammers, the locations of these unicast transmissions, defined by a frequency band/slot pair, are only partially known to any subset of receivers. Assuming that the jammer can only interfere with a limited number of frequency bands, a subset of the unicast transmissions are interference-free, thus propagating broadcastmessages. ADVANTAGES OF PROPOSED SYSTEM:  Prevents the sender(s) from communicating with all, or a subset of the intended receivers.  We mapped the problem of minimizing the number of FH sequence changes required for node addition, to the problem of finding rainbow paths in proper edge-colored complete graphs.
  • 4. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb.
  • 5. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7/LINUX.  Implementation : NS2  NS2 Version : NS2.2.28  Front End : OTCL (Object Oriented Tool Command Language)  Tool : Cygwin (To simulate in Windows OS) REFERENCE: Sisi Liu, Loukas Lazos, Member, IEEE, and Marwan Krunz, Fellow, IEEE, “Time- Delayed Broadcasting for Defeating Inside Jammer”, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 12, NO. 3, MAY/JUNE 2015.