SlideShare a Scribd company logo
1 of 19
OPTIMAL JAMMING ATTACK 
STRATEGIES IN WIRELESS 
SENSOR NETWORKS 
PRESENTED BY, 
ARCHANA.B,NITHIYA.K 
III CSE 
KINGS COLLEGE OF ENGINEERING
OBJECTIVES 
The objective of this paper is to detect the 
jammer and avoid the collisions in 
wireless sensor networks.
CONTENT: 
 Jamming attack in wireless sensor 
network 
Optimal jamming attacks 
Defense policy 
Modeling Assumptions 
Attack detection model
INTRODUCTION 
In this paper the fundamental characteristic 
of wireless networks that Renders them more 
vulnerable to attacks than their wire line 
Counterparts Is the open, shared nature of their 
medium this exposes . 
If the attacker abuses a protocol with the 
primary goal to obtain performance benefits 
itself, the attack is referred to as misbehavior.
EXSISTING SYSTEM: 
The sensor node, looses its energy 
continuously so it is failed because of 
attacker attacks. 
 It take more time to transfer the 
information because of the retransmission 
process again and again.
PROPOSED SYSTEM 
Using the monitoring node the attacker is 
detected. 
The attacker is release power signals at 
that time the sensor node is act as 
sleeping node so does not loses the 
consumed energy.
WSN & WSN ATTACKS: 
WSN(WWiirreelleessss SSeennssoorr NNeettwwoorrkkss)) 
TTyyppeess ooff aattttaacckk iinn WWSSNN 
 Passive Attack 
 Active Attack 
PASSIVE ATTACK : Passively absorping ongoing 
communication 
ACTIVE ATTACK : Attacker is involved in transmission
DOS ATTACKS 
Depending on whether one looks at the 
cause of the consequence of it miss 
behavior in Wireless Networks stems. 
The utility is expressed in terms of 
consumed energy or achievable 
throughput on per link or end_to_end 
basis.
JAMMER 
Jammer is neither authenticated nor 
associated with the network. 
The attacker attempt to strike a balance 
short and long term benefits.
sensor node 
monitoring node 
jammer/attacker
OPTIMAL ATTACK 
We derive the optimal attack and optimal defense 
strategies as solution to optimization problems 
that are faced by the attacker. 
For attack detection we provide a methodology. 
We include in the formulation the attack 
detection.
ATTACK DETECTION MODEL 
The monitoring mechanism consists of , 
Determination of a subset of 
nodes(M). 
1.Employment of a detection 
algorithm. 
2.A detection algorithm is part of the 
detection module.
TYPES OF LINK LAYER JAMMER 
Deceptive, 
Random, 
 Reactive jammer.
REACTIVE JAMMER 
The reactive jammer is the most sophisticated 
one as it launches its attack after sensing 
ongoing transmission. 
Channel surfing involves on-demand 
frequency hopping as a countermeasure.
DETECTION ALGORITHM 
 A detection algorithm is part of the 
detection module at a monitor node; it takes as 
input observation samples obtained by the 
monitor node (i.e., collision/not collision) 
 decides whether there is an attack or not. On 
one hand.
OBSERVATION WINDOW 
The observation window should be small 
enough, such that the attack is detected in a 
timely manner and appropriate 
countermeasures are initiated. 
 On the other hand, this window should be 
sufficiently large, such that the chance of a 
false alarm notification is reduced.
CONCLUSION 
We studied controllable jamming attacks in 
wireless sensor networks, which are easy to 
launch and difficult to detect and confront. 
Our work is a first step towards understanding 
the structure of these problems. 
Interesting issues arise in multi-channel 
networks.
THANK YOU
QQUURRIIEESS??

More Related Content

What's hot

ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...ijiert bestjournal
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksJPINFOTECH JAYAPRAKASH
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksJPINFOTECH JAYAPRAKASH
 
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...IOSR Journals
 
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...
A Security Mechanism Against Reactive Jammer  Attack In Wireless Sensor Netwo...A Security Mechanism Against Reactive Jammer  Attack In Wireless Sensor Netwo...
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...ijsptm
 
I030102056063
I030102056063I030102056063
I030102056063theijes
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackIJCERT
 
Ad hoc secuirty-vemula
Ad hoc secuirty-vemulaAd hoc secuirty-vemula
Ad hoc secuirty-vemulaRaju Vemula
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networksPiyush Mittal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Minimum cost blocking problem in multi path wireless routing protocols
Minimum cost blocking problem in multi path wireless routing protocolsMinimum cost blocking problem in multi path wireless routing protocols
Minimum cost blocking problem in multi path wireless routing protocolsJPINFOTECH JAYAPRAKASH
 
Detection and prevention of wormhole attack in mobile adhoc networks
Detection and prevention of wormhole attack in mobile adhoc networksDetection and prevention of wormhole attack in mobile adhoc networks
Detection and prevention of wormhole attack in mobile adhoc networksambitlick
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manetMeena S Pandi
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manetKunal Prajapati
 
A survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessA survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessfarrukh Farrukh
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANETNitin Verma
 

What's hot (20)

ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
 
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...
A Security Mechanism Against Reactive Jammer  Attack In Wireless Sensor Netwo...A Security Mechanism Against Reactive Jammer  Attack In Wireless Sensor Netwo...
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...
 
I030102056063
I030102056063I030102056063
I030102056063
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming Attack
 
Dn36682688
Dn36682688Dn36682688
Dn36682688
 
Ad hoc secuirty-vemula
Ad hoc secuirty-vemulaAd hoc secuirty-vemula
Ad hoc secuirty-vemula
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
Security in mobile ad hoc networks
Security in mobile ad hoc networksSecurity in mobile ad hoc networks
Security in mobile ad hoc networks
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Minimum cost blocking problem in multi path wireless routing protocols
Minimum cost blocking problem in multi path wireless routing protocolsMinimum cost blocking problem in multi path wireless routing protocols
Minimum cost blocking problem in multi path wireless routing protocols
 
Detection and prevention of wormhole attack in mobile adhoc networks
Detection and prevention of wormhole attack in mobile adhoc networksDetection and prevention of wormhole attack in mobile adhoc networks
Detection and prevention of wormhole attack in mobile adhoc networks
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
 
Wormhole Attack
Wormhole AttackWormhole Attack
Wormhole Attack
 
Study of security attacks in manet
Study of security attacks in manetStudy of security attacks in manet
Study of security attacks in manet
 
A survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessA survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wireless
 
Security Issues in MANET
Security Issues in MANETSecurity Issues in MANET
Security Issues in MANET
 

Viewers also liked

Router and Routing Protocol Attacks
Router and Routing Protocol AttacksRouter and Routing Protocol Attacks
Router and Routing Protocol AttacksConferencias FIST
 
AJAL JAMMING
AJAL JAMMINGAJAL JAMMING
AJAL JAMMINGAJAL A J
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jammingMahmoud Abdeen
 
Presentation on Jamming
Presentation on JammingPresentation on Jamming
Presentation on JammingAbdul Haseeb
 
GNSS Jamming Detection, Localization and Mitigation
GNSS Jamming Detection, Localization and MitigationGNSS Jamming Detection, Localization and Mitigation
GNSS Jamming Detection, Localization and MitigationMarco Lisi
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Saad Bare
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its typesVishal Tandel
 
Wearable biosensors-1222865689459971-8 (1)
Wearable biosensors-1222865689459971-8 (1)Wearable biosensors-1222865689459971-8 (1)
Wearable biosensors-1222865689459971-8 (1)Mani Prince
 
Wireless Power Transmission Using Solar Power System
Wireless Power Transmission Using Solar Power System Wireless Power Transmission Using Solar Power System
Wireless Power Transmission Using Solar Power System elprocus
 
Body Adapted Wearable Bio Sensor
Body Adapted Wearable Bio SensorBody Adapted Wearable Bio Sensor
Body Adapted Wearable Bio Sensorkavindrakrishna
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issuesMaha Saad
 

Viewers also liked (20)

Router and Routing Protocol Attacks
Router and Routing Protocol AttacksRouter and Routing Protocol Attacks
Router and Routing Protocol Attacks
 
Mobile jammer
Mobile jammerMobile jammer
Mobile jammer
 
AJAL JAMMING
AJAL JAMMINGAJAL JAMMING
AJAL JAMMING
 
Caffe Latte Attack
Caffe Latte AttackCaffe Latte Attack
Caffe Latte Attack
 
Wireless signal jamming
Wireless signal jammingWireless signal jamming
Wireless signal jamming
 
Jamming in Wireless Sensor Networks
Jamming in Wireless Sensor NetworksJamming in Wireless Sensor Networks
Jamming in Wireless Sensor Networks
 
Presentation on Jamming
Presentation on JammingPresentation on Jamming
Presentation on Jamming
 
GNSS Jamming Detection, Localization and Mitigation
GNSS Jamming Detection, Localization and MitigationGNSS Jamming Detection, Localization and Mitigation
GNSS Jamming Detection, Localization and Mitigation
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...
 
honey pots introduction and its types
honey pots introduction and its typeshoney pots introduction and its types
honey pots introduction and its types
 
Honeypot
HoneypotHoneypot
Honeypot
 
Sensor For UTM
Sensor For UTMSensor For UTM
Sensor For UTM
 
Wearable biosensors-1222865689459971-8 (1)
Wearable biosensors-1222865689459971-8 (1)Wearable biosensors-1222865689459971-8 (1)
Wearable biosensors-1222865689459971-8 (1)
 
Wireless Power Transmission Using Solar Power System
Wireless Power Transmission Using Solar Power System Wireless Power Transmission Using Solar Power System
Wireless Power Transmission Using Solar Power System
 
Honeypot
Honeypot Honeypot
Honeypot
 
531 biosensors
531 biosensors531 biosensors
531 biosensors
 
All about Honeypots & Honeynets
All about Honeypots & HoneynetsAll about Honeypots & Honeynets
All about Honeypots & Honeynets
 
Body Adapted Wearable Bio Sensor
Body Adapted Wearable Bio SensorBody Adapted Wearable Bio Sensor
Body Adapted Wearable Bio Sensor
 
Cell phone jammer ppt
Cell phone jammer pptCell phone jammer ppt
Cell phone jammer ppt
 
Wireless sensor network security issues
Wireless sensor network security issuesWireless sensor network security issues
Wireless sensor network security issues
 

Similar to Wireless sensor networks

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...ijfcstjournal
 
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKNOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKIJNSA Journal
 
Ij a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communicationIj a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communicationshobanavsm
 
A survey on jamming attacks, detection and defending strategies in wireless s...
A survey on jamming attacks, detection and defending strategies in wireless s...A survey on jamming attacks, detection and defending strategies in wireless s...
A survey on jamming attacks, detection and defending strategies in wireless s...eSAT Journals
 
SELF-PROTECTION MECHANISM FOR WIRELESS SENSOR NETWORKS
SELF-PROTECTION MECHANISM FOR WIRELESS SENSOR NETWORKS SELF-PROTECTION MECHANISM FOR WIRELESS SENSOR NETWORKS
SELF-PROTECTION MECHANISM FOR WIRELESS SENSOR NETWORKS IJNSA Journal
 
Self protection mechanism for wireless sensor networks
Self protection mechanism for wireless sensor networksSelf protection mechanism for wireless sensor networks
Self protection mechanism for wireless sensor networksIJNSA Journal
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORijcsa
 
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsPrevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsIOSR Journals
 
Maximizing network interruption in wireless
Maximizing network interruption in wirelessMaximizing network interruption in wireless
Maximizing network interruption in wirelessIJCNCJournal
 
Intrusion detection in MANETS
Intrusion detection in MANETSIntrusion detection in MANETS
Intrusion detection in MANETSPooja Kundu
 
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...ijwmn
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attackseSAT Publishing House
 
A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )Joanna Paulsen
 
Online Intrusion Alert Aggregation with Generative Data Stream Modeling
Online Intrusion Alert Aggregation with Generative Data Stream  ModelingOnline Intrusion Alert Aggregation with Generative Data Stream  Modeling
Online Intrusion Alert Aggregation with Generative Data Stream ModelingIJMER
 
Security threats in cognitive radio
Security threats in cognitive radioSecurity threats in cognitive radio
Security threats in cognitive radioNavya Shree
 
A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...JPINFOTECH JAYAPRAKASH
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsnRicha Kumari
 
A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...ieijjournal
 
Artificial immune system
Artificial immune systemArtificial immune system
Artificial immune systemTejaswini Jitta
 

Similar to Wireless sensor networks (20)

International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
 
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORKNOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
 
Ij a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communicationIj a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communication
 
A survey on jamming attacks, detection and defending strategies in wireless s...
A survey on jamming attacks, detection and defending strategies in wireless s...A survey on jamming attacks, detection and defending strategies in wireless s...
A survey on jamming attacks, detection and defending strategies in wireless s...
 
SELF-PROTECTION MECHANISM FOR WIRELESS SENSOR NETWORKS
SELF-PROTECTION MECHANISM FOR WIRELESS SENSOR NETWORKS SELF-PROTECTION MECHANISM FOR WIRELESS SENSOR NETWORKS
SELF-PROTECTION MECHANISM FOR WIRELESS SENSOR NETWORKS
 
Self protection mechanism for wireless sensor networks
Self protection mechanism for wireless sensor networksSelf protection mechanism for wireless sensor networks
Self protection mechanism for wireless sensor networks
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
 
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsPrevention of Selective Jamming Attacks by Using Packet Hiding Methods
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
 
Maximizing network interruption in wireless
Maximizing network interruption in wirelessMaximizing network interruption in wireless
Maximizing network interruption in wireless
 
Intrusion detection in MANETS
Intrusion detection in MANETSIntrusion detection in MANETS
Intrusion detection in MANETS
 
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )A Wireless Sensor Network ( Wsn )
A Wireless Sensor Network ( Wsn )
 
Online Intrusion Alert Aggregation with Generative Data Stream Modeling
Online Intrusion Alert Aggregation with Generative Data Stream  ModelingOnline Intrusion Alert Aggregation with Generative Data Stream  Modeling
Online Intrusion Alert Aggregation with Generative Data Stream Modeling
 
Security threats in cognitive radio
Security threats in cognitive radioSecurity threats in cognitive radio
Security threats in cognitive radio
 
A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...
 
Vampire attack in wsn
Vampire attack in wsnVampire attack in wsn
Vampire attack in wsn
 
A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...A secure routing process to simultaneously defend against false report and wo...
A secure routing process to simultaneously defend against false report and wo...
 
Artificial immune system
Artificial immune systemArtificial immune system
Artificial immune system
 

More from ANJALAI AMMAL MAHALINGAM ENGINEERING COLLEGE (8)

BIGDATA ANALYTICS LAB MANUAL final.pdf
BIGDATA  ANALYTICS LAB MANUAL final.pdfBIGDATA  ANALYTICS LAB MANUAL final.pdf
BIGDATA ANALYTICS LAB MANUAL final.pdf
 
GE3171-PROBLEM SOLVING AND PYTHON PROGRAMMING LABORATORY
GE3171-PROBLEM SOLVING AND PYTHON PROGRAMMING LABORATORYGE3171-PROBLEM SOLVING AND PYTHON PROGRAMMING LABORATORY
GE3171-PROBLEM SOLVING AND PYTHON PROGRAMMING LABORATORY
 
GE8151-PROBLEM SOLVING AND PYTHON PROGRAMMING-UNIT I
GE8151-PROBLEM SOLVING AND PYTHON PROGRAMMING-UNIT IGE8151-PROBLEM SOLVING AND PYTHON PROGRAMMING-UNIT I
GE8151-PROBLEM SOLVING AND PYTHON PROGRAMMING-UNIT I
 
IT6701-Information management question bank
IT6701-Information management question bankIT6701-Information management question bank
IT6701-Information management question bank
 
C PROGRAMMING BASICS- COMPUTER PROGRAMMING UNIT II
C PROGRAMMING BASICS- COMPUTER PROGRAMMING UNIT IIC PROGRAMMING BASICS- COMPUTER PROGRAMMING UNIT II
C PROGRAMMING BASICS- COMPUTER PROGRAMMING UNIT II
 
Unit ii ppt
Unit ii pptUnit ii ppt
Unit ii ppt
 
STUDY EDUCATIONAL OPERATING SYSTEM MINIX OPERATING SYSTEM AND DEVELOP REASO...
STUDY  EDUCATIONAL OPERATING  SYSTEM MINIX OPERATING SYSTEM AND DEVELOP REASO...STUDY  EDUCATIONAL OPERATING  SYSTEM MINIX OPERATING SYSTEM AND DEVELOP REASO...
STUDY EDUCATIONAL OPERATING SYSTEM MINIX OPERATING SYSTEM AND DEVELOP REASO...
 
Using fuzzy ant colony optimization for Diagnosis of Diabetes Disease
Using fuzzy ant colony optimization for Diagnosis of Diabetes DiseaseUsing fuzzy ant colony optimization for Diagnosis of Diabetes Disease
Using fuzzy ant colony optimization for Diagnosis of Diabetes Disease
 

Recently uploaded

Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxNANDHAKUMARA10
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxMustafa Ahmed
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementDr. Deepak Mudgal
 
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...Christo Ananth
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Stationsiddharthteach18
 
Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2ChandrakantDivate1
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...ssuserdfc773
 
Overview of Transformation in Computer Graphics
Overview of Transformation in Computer GraphicsOverview of Transformation in Computer Graphics
Overview of Transformation in Computer GraphicsChandrakantDivate1
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxMustafa Ahmed
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdfAlexander Litvinenko
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelDrAjayKumarYadav4
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...archanaece3
 
Fundamentals of Structure in C Programming
Fundamentals of Structure in C ProgrammingFundamentals of Structure in C Programming
Fundamentals of Structure in C ProgrammingChandrakantDivate1
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdfKamal Acharya
 

Recently uploaded (20)

Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Electromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptxElectromagnetic relays used for power system .pptx
Electromagnetic relays used for power system .pptx
 
Dynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptxDynamo Scripts for Task IDs and Space Naming.pptx
Dynamo Scripts for Task IDs and Space Naming.pptx
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Ground Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth ReinforcementGround Improvement Technique: Earth Reinforcement
Ground Improvement Technique: Earth Reinforcement
 
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
Call for Papers - Journal of Electrical Systems (JES), E-ISSN: 1112-5209, ind...
 
Independent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging StationIndependent Solar-Powered Electric Vehicle Charging Station
Independent Solar-Powered Electric Vehicle Charging Station
 
Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
Overview of Transformation in Computer Graphics
Overview of Transformation in Computer GraphicsOverview of Transformation in Computer Graphics
Overview of Transformation in Computer Graphics
 
Autodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptxAutodesk Construction Cloud (Autodesk Build).pptx
Autodesk Construction Cloud (Autodesk Build).pptx
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...5G and 6G refer to generations of mobile network technology, each representin...
5G and 6G refer to generations of mobile network technology, each representin...
 
Fundamentals of Structure in C Programming
Fundamentals of Structure in C ProgrammingFundamentals of Structure in C Programming
Fundamentals of Structure in C Programming
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 

Wireless sensor networks

  • 1. OPTIMAL JAMMING ATTACK STRATEGIES IN WIRELESS SENSOR NETWORKS PRESENTED BY, ARCHANA.B,NITHIYA.K III CSE KINGS COLLEGE OF ENGINEERING
  • 2. OBJECTIVES The objective of this paper is to detect the jammer and avoid the collisions in wireless sensor networks.
  • 3. CONTENT:  Jamming attack in wireless sensor network Optimal jamming attacks Defense policy Modeling Assumptions Attack detection model
  • 4. INTRODUCTION In this paper the fundamental characteristic of wireless networks that Renders them more vulnerable to attacks than their wire line Counterparts Is the open, shared nature of their medium this exposes . If the attacker abuses a protocol with the primary goal to obtain performance benefits itself, the attack is referred to as misbehavior.
  • 5. EXSISTING SYSTEM: The sensor node, looses its energy continuously so it is failed because of attacker attacks.  It take more time to transfer the information because of the retransmission process again and again.
  • 6. PROPOSED SYSTEM Using the monitoring node the attacker is detected. The attacker is release power signals at that time the sensor node is act as sleeping node so does not loses the consumed energy.
  • 7. WSN & WSN ATTACKS: WSN(WWiirreelleessss SSeennssoorr NNeettwwoorrkkss)) TTyyppeess ooff aattttaacckk iinn WWSSNN  Passive Attack  Active Attack PASSIVE ATTACK : Passively absorping ongoing communication ACTIVE ATTACK : Attacker is involved in transmission
  • 8. DOS ATTACKS Depending on whether one looks at the cause of the consequence of it miss behavior in Wireless Networks stems. The utility is expressed in terms of consumed energy or achievable throughput on per link or end_to_end basis.
  • 9. JAMMER Jammer is neither authenticated nor associated with the network. The attacker attempt to strike a balance short and long term benefits.
  • 10. sensor node monitoring node jammer/attacker
  • 11. OPTIMAL ATTACK We derive the optimal attack and optimal defense strategies as solution to optimization problems that are faced by the attacker. For attack detection we provide a methodology. We include in the formulation the attack detection.
  • 12. ATTACK DETECTION MODEL The monitoring mechanism consists of , Determination of a subset of nodes(M). 1.Employment of a detection algorithm. 2.A detection algorithm is part of the detection module.
  • 13. TYPES OF LINK LAYER JAMMER Deceptive, Random,  Reactive jammer.
  • 14. REACTIVE JAMMER The reactive jammer is the most sophisticated one as it launches its attack after sensing ongoing transmission. Channel surfing involves on-demand frequency hopping as a countermeasure.
  • 15. DETECTION ALGORITHM  A detection algorithm is part of the detection module at a monitor node; it takes as input observation samples obtained by the monitor node (i.e., collision/not collision)  decides whether there is an attack or not. On one hand.
  • 16. OBSERVATION WINDOW The observation window should be small enough, such that the attack is detected in a timely manner and appropriate countermeasures are initiated.  On the other hand, this window should be sufficiently large, such that the chance of a false alarm notification is reduced.
  • 17. CONCLUSION We studied controllable jamming attacks in wireless sensor networks, which are easy to launch and difficult to detect and confront. Our work is a first step towards understanding the structure of these problems. Interesting issues arise in multi-channel networks.