SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661, ISBN: 2278-8727 Volume 5, Issue 3 (Sep-Oct. 2012), PP 13-20
www.iosrjournals.org
www.iosrjournals.org 13 | P a g e
Jamming Attacks Prevention in Wireless Networks Using Packet
Hiding Methods
Divya. S1
, Manohar Gosul2
1
M.Tech In Cse Dept , S.R Engineering College Warangal, Andhra Pradesh, India
2
Associate Professor In Cse Dept, S.R Engineering College Warangal, Andhra Pradesh, India
Abstract: The open nature of the wireless medium leaves it vulnerable to intentional interference attacks,
typically referred to as jamming. Jamming can be a huge problem for wireless networks. Jamming is one of
many exploits used compromise the wireless environment. It works by denying service to authorized users as
legitimate traffic is jammed by the overwhelming frequencies of illegitimate traffic. If an attacker truly wanted
to compromise your LAN and wireless security, the most effective approach would be to send random
unauthenticated packets to every wireless station in the network. To minimize the impact of an unintentional
disruption, it is important the identify its presence. Jamming makes itself known at the physical layer of the
network, more commonly known as the MAC (Media Access Control) layer. The increased noise floor results in
a faltered noise-to-signal ratio, which will be indicated at the client. It may also be measurable from the
access point where network management features should able to effectively report noise floor levels that exceed
a predetermined threshold. From there the access points must be dynamically reconfigured to transmit channel
in reaction to the disruption as identified by changes at the physical layer
I. Introduction
Wireless networks are susceptible to numerous security threats due to the open nature of the wireless
medium. Anyone with a transceiver can eavesdrop on ongoing transmissions, inject spurious messages, or
block the transmission of legitimate ones. One of the fundamental ways for degrading the network performance
is by jamming wireless transmissions [9], [11], [19], [20]. In the simplest form of jamming, the adversary
corrupts transmitted messages by causing electromagnetic interference in the network’s operational
frequencies, and in proximity to the targeted receivers [15].
For an adversary agnostic to the implementation details of the network, a typical jamming strategy is
the continuous emission of high-power interference signals such as continuous wave tones, or FM modulated
noise [15]. However, adopting an “always-on” jamming strategy has several disadvantages. First, the adversary
has to expend a significant amount of energy to jam frequency bands of interest. Second, the continuous
presence of high interference levels make this type of jamming easy to detect [11], [19], [20]. Third, these
attacks are easy to mitigate either by spread spectrum communications [15], spatial retreats [20], or localization
and removal of the jamming nodes.
In this paper, we consider a sophisticated adversary model in which the adversary is aware of the
implementation details of the network protocols. By exploiting this knowledge, the adversary launches selective
jamming attacks in which it targets specific packets of “high” importance. For example, jamming of TCP
acknowledgments (ACKs) can severely degrade the throughput of a TCP connection due to the congestion
control mechanism of the TCP protocol [3]. Compared to continuous jamming, the adversary is active for a
short period of time, thus expending orders of magnitude less energy.
To perform selective jamming, the adversary must be capable of classifying transmitted packets in real
time, and corrupting them before the end of their transmission. Packet classification can be performed by
receiving just a few bytes of a packet, for example, by decoding the frame control field of a MAC-layer frame.
We are interested in developing resource efficient methods for preventing real-time packet classification and
hence, mitigating selective jamming. Our contributions are summarized below.
A. Our Contributions
We investigate the feasibility of real-time packet classification for launching selective jamming
attacks. We consider a sophisticated adversary who exploits his knowledge on network protocols along with
secrets extracted from compromised nodes to maximize the impact of his attack. To mitigate selective
jamming, we combine cryptographic mechanisms such as commitment schemes [6], cryptographic puzzles [7],
and all in- one transformations [13], with physical-layer parameters.
We further study the impact of various selective jamming strategies on the performance of the TCP
protocol. The remainder of the paper is organized as follows. Section II, presents related work. In Section III,
we describe the problem addressed, and state the system and adversarial model assumptions. In Section IV, we
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
www.iosrjournals.org 14 | P a g e
illustrate the feasibility of selective jamming attacks. In Section V, we develop methods for preventing
selective jamming. Section VI, illustrates the impact of selective jamming on the performance of TCP. In
Section VII, we conclude.
II. RELATED WORK
Continuous jamming has been used as a denial-of-service (DoS) attack against voice communication
since the 1940s [15]. Re cently, several alternative jamming strategies have been demonstrated [11], [12], [19],
[20]. Xu et. al. Categorized jammers into four models, (a) a constant jammer that continuously emits noise, (b)
a deceptive jammer that continuously broadcasts fabricated messages or replays old ones, (c) a random jammer
that alternates between periods of continuous jamming and inactivity, and (d) a reactive jammer who jams only
when transmission activity is detected.
Intelligent attacks which target the transmission of specific packets were presented in [8], [18].
Thuente considered an attacker who infers eminent packet transmissions based on timing information at the
MAC layer. Law et. al. considered(a) (b)
(a) Realization of a selective jamming attack,
(b) a generic frame format for a wireless network.
selective jamming attacks in multi-hop wireless networks, where future transmissions at one hop were inferred
from prior transmissions in other hops. However, in both [8], [18], real-time packet classification was
considered beyond the capabilities of the adversary. Selectivity was achieved via inference from the control
messages already transmitted.
Channel-selective jamming attacks were considered in [4], [17]. It was shown that targeting the
control channel reduces the required power for performing a DoS attack by several orders of magnitude. To
protect control channel traffic, control information was replicated in multiple channels. The “locations” of the
channels where control traffic was broadcasted at any given time, was cryptographically protected. In [9], we
proposed a randomized frequency hopping algorithm, to protect the control channel inside jammers. Finally,
P¨opper et. al. proposed a frequency hopping anti-jamming technique that does not require the sharing of a
secret hopping sequence, between the communicating parties [12].
III. PROPOSED WORK
Here the contribution towards jamming attacks is reduced by using the two algorithms
1. Symmetric encryption algorithm
2. Brute force attacks against block encryption algorithms
The proposed algorithm keeps these two in mind as they are essential in reducing the jamming attacks by using
the packet hiding mechanism.
IV. Problem Statement And Assumptions
A. Problem Statement
Consider the scenario depicted in Fig. 1(a). Nodes A and B communicate via a wireless link. Within
the communication range of both A and B there is a jamming node J. When A transmits a packet m to B, node J
classifies m by receiving only the first few bytes of m. J then corrupts m beyond recovery by interfering with its
reception at B. We address the problem of preventing the jamming node from classifying m in real time, thus
mitigating J’s ability to perform selective jamming. Our goal is to transform a selective jammer to a random
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
www.iosrjournals.org 15 | P a g e
one. Note that in the present work, we do not address packet classification methods based on protocol
semantics, as described in [1], [4], [11], [33].
B. System and Adversary Model
1. Network model
The network consists of a collection of nodes connected via wireless links. Nodes may communicate
directly if they are within communication range, or indirectly via multiple hops. Nodes communicate both in
unicast mode and broadcast mode. Communications can be either unencrypted or encrypted. For encrypted
broadcast communications, symmetric keys are shared among all intended receivers. These keys are established
using preshared pair wise keys or asymmetric cryptography.
2. Communication Model
Packets are transmitted at a rate of R bauds. Each PHY-layer symbol corresponds to q bits, where the
value of q is defined by the underlying digital modulation scheme. Every symbol carries _ _ q data bits, where
α/β is the rate of the PHY-layer encoder. Here, the transmission bit rate is equal to qR bps and the information
bit rate is _ _ qR bps. Spread spectrum techniques such as frequency hopping spread spectrum (FHSS), or
direct sequence spread spectrum (DSSS) may be used at the PHY layer to protect wireless transmissions from
jamming. SS provides immunity to interference to some extent (typically 20 to 30 dB gain), but a powerful
jammer is still capable of jamming data packets of his choosing. Transmitted packets have the generic format
depicted in Fig. 1(b). The preamble is used for synchronizing the sampling process at the receiver. The PHY
layer header contains information regarding the length of the frame, and the transmission rate. The MAC
header determines the MAC protocol version, the source and destination addresses, sequence numbers plus
some additional fields. The MAC header is followed by the frame body that typically contains an ARP packet
or an IP datagram. Finally, the MAC frame is protected by a cyclic redundancy check (CRC) code. At the PHY
layer, a trailer may be appended for synchronizing the sender and receiver.
3. Adversary Model
We assume the adversary is in control of the communication medium and can jam messages at any
part of the network of his choosing (similar to the Dolev- Yao model). The adversary can operate in full-duplex
mode, thus being able to receive and transmit simultaneously. This can be achieved, for example, with the use
of multi-radio transceivers. In addition, the adversary is equipped with directional antennas that enable the
reception of a signal from one node and jamming of the same signal at another.For analysis purposes, we
assume that the adversary can pro-actively jam a number of bits just below the ECC capability early in the
transmission. He can then decide to irrecoverably corrupt a transmitted packet by jamming the last symbol. In
reality, it has been demonstrated that selective jamming can be achieved with far less resources [32], [34]. A
jammer equipped with a single half-duplex transceiver is sufficient to classify and jam transmitted packets.
However, our model captures a more potent adversary that can be effective even at high transmission speeds.
The adversary is assumed to be computationally and storage bounded, although he can be far superior to normal
nodes. In particular, he can be equipped with special purpose hardware for performing cryptanalysis or any
other required computation. Solving well-known hard cryptographic problems is assumed to be time-
consuming. For the purposes of analysis, given a cipher text, the most efficient method for deriving the
corresponding plaintext is assumed to be an exhaustive search on the key space. The implementation details of
every layer of the network stack are assumed to be public. Furthermore, the adversary is capable of physically
compromising network devices and recovering stored information including cryptographic keys, PN codes, etc.
This internal adversary model is realistic for network architectures such as mobile ad-hoc, mesh, cognitive
radio, and wireless sensor networks, where network devices may operate unattended, thus being susceptible to
physical compromise.
V. Implementation
The implementation environment has software such as JDK 1.6 running in Windows XP operating
system. The system uses Java technology such as RMI (Remote Method Invocation). Java’s SWING API is
used to build user interface. The RMI technology lets nodes to communicate remotely. The simulation has three
kinds of nodes namely centralized server, server and client.
The purpose of source is to send the data to the destination. There sender will be consisting of the
Channel Encoder, Interleaver and the Modulator. For simulation of communication in WSN, the server node is
able to send messages to client nodes based on the port number and the communication is routed through one of
the centralized servers. Here user is able to select a file by clicking browse button. The Send button is to be
initiated by user in order to send messages to client based on port number. The message or file selected is
broken into packets with length 48 bytes.
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
www.iosrjournals.org 16 | P a g e
Fig.1 screen shot for source
It selects the required data and sends it to a particular client. The data is sent in the form of packets
with length 48 bytes. The server has to use specific IP address and port number based on the centralized server
through which it is to send the messages to client.
Fig .2 File loading
Channel encoding deals with error control during the transmission through the communication channel. It
transforms the information sequence to the encoded sequence. The result we get after the modulation is “Code
Word”.
Fig.3 Acknowledgment for loading File
The channel encoding will be done in this way. After the encoding is completed there will be a message
displayed.
Select the
data to
transfer
Status
information
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
www.iosrjournals.org 17 | P a g e
Fig.4 Channel encoding of the data
Interleaving is a way to arrange data in a non-contiguous way to increase performance. In error-
correction coding, particularly within data transmission, disk storage, and memory. After the interleaving the
data is converted into packets. Then the packets are used for the transmission.
Fig.5 Status Corresponding to particular action
Identify the destination and data is converted into the packets and send to selected destination. If the data is sent
properly there will be a message in the “status information”
Fig.6 Packet Transmission to the Packet hiding queue
A. Packet Hiding Queue
Packet hiding Queue is responsible for sending the packets in a queue format i.e., first come first
served the packets which come first will be sent first in a sequential order. The packet hiding acts as a server
which is used for identifying the destination. It also checks the size of the data when we are transmitting. Each
packet will be storing its corresponding information in the binary format. The packet hiding queue is
responsible for sending the data to the destination.
Fig.7 Packet Hiding Queue
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
www.iosrjournals.org 18 | P a g e
When the packet hiding queue sends the data received from the source to the destination. The
destination will be ready to take the data from the packet hiding queue.
Fig.8 Packets Received at Destination
The destination will be receiving the path from where it can get the data from the packet hiding queue.
The Destination will be consisting of the Demodulator, De-interleaver and Channel Decoder.
Demodulation is a process used in the receivers to recover the original signal coming from the sender
end in modulating form. At the receiver end, the interleaved data is arranged back into the original sequence by
the de-interleaver. As a result of interleaving, correlated noise introduced in the transmission channel appears
to be statistically independent at the receiver and thus allows better error correction.
Fig. 9 Status After demodulation, deinterleaving and channel decoding
B. Selected File data at the Source
The data sent from the sender is a text file which is consisting the following information.
Fig 10 Choose file with the data at Source
C. Received Data at Destination
Fig.11 Received data At the destination
The status information text area is meant for presenting status messages.
Data
received
Data
sent
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
www.iosrjournals.org 19 | P a g e
D. The Jamming Attack Analysis
Experiments are made with two clients, two servers and a packet hiding Queue. The communication
flow starts when source decides to send messages to client. It chooses a file and breaks it into many packets of
size 48 bytes each and sends them through randomly selected centralized server. The server monitors
communication and detects any jamming attacks. The jamming Attacks can be viewed by “Jamming Attack
Analysis”
Fig.12 Jamming Attack Analysis
The above fig shows the jamming attack detection. There will be many number of nodes which we need to be
added. Each node will be having a range to transmit the data.
When data is sent from source to destination by using the packet hiding queue. It can analyze the
attacks and also find whether the attack is made or not. It considers packet loss as well. It is assumed that due to
attack in sending packets may occur and in turn it results in data loss or packet loss.
Fig.13 Jamming Attack Detection
As seen in fig, the when the jamming attack is detected then it will be indicated with the red symbol at the
corresponding node
VI. Conclusion
We addressed the problem of selective jamming in wireless networks. We illustrated the effectiveness
of selective jamming attacks by implementing such attacks against the TCP protocol.
We showed that an adversary can exploit its knowledge of the protocol implementation to increase the
impact of his attack at a significantly lower energy cost. We illustrated the feasibility of selective jamming
attacks by performing real time packet classification. To mitigate selective jamming, we proposed several
methods that combine cryptographic primitives such as commitment schemes, cryptographic puzzles, and all-
or-nothing transformations with physical layer attributes.
References
[1] OPNETtm modeler 14.5. http://www.opnet.com/solutions/network rd/ modeler.html.
[2] IEEE 802.11 standard. http://standards.ieee.org/getieee802/download/ 802.11-2007.pdf, 2007.
[3] A. Al Hanbali, E. Altman, and P. Nain. A survey of tcp over ad hoc networks. IEEE Communications Surveys & Tutorials,
7(3):22–36, 2005.
[4] A. Chan, X. Liu, G. Noubir, and B. Thapa. Control channel jamming: Resilience and identification of traitors. In Proceedings of
the IEEE ISIT, 2007.
[5] D. Comer. Internetworking with TCP/IP: principles, protocols, and architecture. Prentice Hall, 2006.
[6] I. Damgard. Commitment schemes and zero-knowledge protocols. Lecture notes in computer science, 1561:63–86, 1999.
Jamming
attack
detection
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
www.iosrjournals.org 20 | P a g e
[7] A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proceedings of
the Network and Distributed System Security Symposium, pages 151–165, 1999.
[8] Y. W. Law, M. Palaniswami, L. V. Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy-efficient link-layer jamming attacks
against WSN MAC protocols. ACM Transactions on Sensor Networks, 5(1):1–38,2009.
[9] L. Lazos, S. Liu, and M. Krunz. Mitigating control-channel jamming attacks in multi-channel ad hoc networks. In Proceedings of
the second ACM conference on wireless network security, pages 169–180, 2009.
[10] R. C. Merkle. Secure communications over insecure channels. Communincations of the ACM, 21(4):294–299, 1978.
[11] G. Noubir and G. Lin. Low-power DoS attacks in data wireless LANs and countermeasures. ACM SIGMOBILE Mobile Computing
and Communications Review, 7(3):29–30, 2003.
[12] C. Po¨pper, M. Strasser, and S. Cˇ apkun. Jamming-resistant broadcast communication without shared keys. In Proceedings of the
USENIX Security Symposium, 2009.
[13] R. Rivest. All-or-nothing encryption and the package transform. Lecture Notes in Computer Science, pages 210–218, 1997.
[14] R. Rivest, A. Shamir, and D. Wagner. Time-lock puzzles and timedrelease crypto. 1996.
[15] M. Simon, J. Omura, R. Scholtz, and B. Levitt. Spread spectrum communications handbook. McGraw-Hill Companies, 1994.
[16] D. Stinson. Cryptography: theory and practice. CRC press, 2006.
[17] P. Tague, M. Li, and R. Poovendran. Probabilistic mitigation of control channel jamming via random key distribution. In
Proceedings of the PIMRC, 2007.
[18] D. Thuente and M. Acharya. Intelligent jamming in wireless networks with applications to 802.11b and other networks. In
Proceedings of the IEEE MILCOM, 2006.
[19] W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, pages 46–57, 2005.
[20] W. Xu, T. Wood, W. Trappe, and Y. Zhang. Channel surfing and spatial retreats: defenses against wireless denial of service. In
Proceedings of the 3rd ACM workshop on Wireless security, pages 80–89, 2004.
S.Divya received the B.Tech Degree in Computer Science and Engineering from Kamala
Institute of Technology and Science, Karimnagar, A.P, India. Currently doing M.tech in Computer Science and
Engineering at SR Engineering College, Warangal, India. Her research interests include Networking and
Security.
Manohar Gosul received the B.Tech degree in Computer Science &Engineering from
Poojya Doddappa Appa Engineering College, Gulbarga, India and M.Tech degree in Computer Science &
Engineering from Poojya Doddappa Appa Engineering College, Gulbarga, India. Currently he is an Associate
Professor in the department Computer Science & Engineering, SR Engineering College, Warangal, India. His
research interests include Data Mining, Advance Databases and Network Security.

More Related Content

What's hot

Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
Shaik Irfan
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...
JPINFOTECH JAYAPRAKASH
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
nagibtech
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
JPINFOTECH JAYAPRAKASH
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksJPINFOTECH JAYAPRAKASH
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming Attack
IJCERT
 
Jamming attacks in wireless networks
Jamming attacks in wireless networksJamming attacks in wireless networks
Jamming attacks in wireless networks
Thesis Scientist Private Limited
 
Ijcatr04051010
Ijcatr04051010Ijcatr04051010
Ijcatr04051010
Editor IJCATR
 
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEMitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADE
IJTET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Editor Jacotech
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
IJARIIT
 
K1803036872
K1803036872K1803036872
K1803036872
IOSR Journals
 
Selective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesSelective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholes
IJNSA Journal
 
Ij a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communicationIj a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communicationshobanavsm
 
Source based Security Issues in WDM Systems
Source based Security Issues in WDM Systems Source based Security Issues in WDM Systems
Source based Security Issues in WDM Systems
IJECEIAES
 
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...
ijasuc
 

What's hot (20)

Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...Combining cryptographic primitives to prevent jamming attacks in wireless net...
Combining cryptographic primitives to prevent jamming attacks in wireless net...
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacksPacket hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
 
Prevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming AttackPrevention of Packet Hiding Methods In Selective Jamming Attack
Prevention of Packet Hiding Methods In Selective Jamming Attack
 
Jamming attacks in wireless networks
Jamming attacks in wireless networksJamming attacks in wireless networks
Jamming attacks in wireless networks
 
Ijcatr04051010
Ijcatr04051010Ijcatr04051010
Ijcatr04051010
 
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADEMitigation of Colluding Selective Forwarding Attack in WMNs using FADE
Mitigation of Colluding Selective Forwarding Attack in WMNs using FADE
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET Secure Multicast Communication using Behavioural Measurement Technique in MANET
Secure Multicast Communication using Behavioural Measurement Technique in MANET
 
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
Cooperative Black Hole Attack Prevention by Particle Swarm Optimization with ...
 
K1803036872
K1803036872K1803036872
K1803036872
 
Sub1540
Sub1540Sub1540
Sub1540
 
Selective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholesSelective jamming attack prevention based on packet hiding methods and wormholes
Selective jamming attack prevention based on packet hiding methods and wormholes
 
Ij a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communicationIj a survey on preventing jamming attacks in wireless communication
Ij a survey on preventing jamming attacks in wireless communication
 
Source based Security Issues in WDM Systems
Source based Security Issues in WDM Systems Source based Security Issues in WDM Systems
Source based Security Issues in WDM Systems
 
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...
 

Viewers also liked

Finding Good URLs: Aligning Entities in Knowledge Bases with Public Web Docum...
Finding Good URLs: Aligning Entities in Knowledge Bases with Public Web Docum...Finding Good URLs: Aligning Entities in Knowledge Bases with Public Web Docum...
Finding Good URLs: Aligning Entities in Knowledge Bases with Public Web Docum...Thomas Gottron
 
F0543645
F0543645F0543645
F0543645
IOSR Journals
 
F0443041
F0443041F0443041
F0443041
IOSR Journals
 
Trashing Utopia 2015
Trashing Utopia   2015 Trashing Utopia   2015
F0463842
F0463842F0463842
F0463842
IOSR Journals
 
Aman narain , viva la revolution how banking should and will be disrupted and...
Aman narain , viva la revolution how banking should and will be disrupted and...Aman narain , viva la revolution how banking should and will be disrupted and...
Aman narain , viva la revolution how banking should and will be disrupted and...
Vincent Fong
 
C0330818
C0330818C0330818
C0330818
IOSR Journals
 
D0311824
D0311824D0311824
D0311824
IOSR Journals
 
E0953336
E0953336E0953336
E0953336
IOSR Journals
 
Презентация Ямпольского района - Проект приграничного сотрудничества Украина ...
Презентация Ямпольского района - Проект приграничного сотрудничества Украина ...Презентация Ямпольского района - Проект приграничного сотрудничества Украина ...
Презентация Ямпольского района - Проект приграничного сотрудничества Украина ...
Anastasia Lanina
 
Презентация Барского района - Проект приграничного сотрудничества Украина - М...
Презентация Барского района - Проект приграничного сотрудничества Украина - М...Презентация Барского района - Проект приграничного сотрудничества Украина - М...
Презентация Барского района - Проект приграничного сотрудничества Украина - М...
Anastasia Lanina
 
Manual maestro construcor
Manual maestro construcorManual maestro construcor
Manual maestro construcor
Juan Gabriel Farfán Yovera
 
C0552124
C0552124C0552124
C0552124
IOSR Journals
 
D0952832
D0952832D0952832
D0952832
IOSR Journals
 
B0520710
B0520710B0520710
B0520710
IOSR Journals
 

Viewers also liked (20)

Finding Good URLs: Aligning Entities in Knowledge Bases with Public Web Docum...
Finding Good URLs: Aligning Entities in Knowledge Bases with Public Web Docum...Finding Good URLs: Aligning Entities in Knowledge Bases with Public Web Docum...
Finding Good URLs: Aligning Entities in Knowledge Bases with Public Web Docum...
 
F0543645
F0543645F0543645
F0543645
 
F0443041
F0443041F0443041
F0443041
 
Final Year Project
Final Year ProjectFinal Year Project
Final Year Project
 
D006462595
D006462595D006462595
D006462595
 
Trashing Utopia 2015
Trashing Utopia   2015 Trashing Utopia   2015
Trashing Utopia 2015
 
F0463842
F0463842F0463842
F0463842
 
Aman narain , viva la revolution how banking should and will be disrupted and...
Aman narain , viva la revolution how banking should and will be disrupted and...Aman narain , viva la revolution how banking should and will be disrupted and...
Aman narain , viva la revolution how banking should and will be disrupted and...
 
C0330818
C0330818C0330818
C0330818
 
D0311824
D0311824D0311824
D0311824
 
E0953336
E0953336E0953336
E0953336
 
Презентация Ямпольского района - Проект приграничного сотрудничества Украина ...
Презентация Ямпольского района - Проект приграничного сотрудничества Украина ...Презентация Ямпольского района - Проект приграничного сотрудничества Украина ...
Презентация Ямпольского района - Проект приграничного сотрудничества Украина ...
 
Arlington road
Arlington roadArlington road
Arlington road
 
Презентация Барского района - Проект приграничного сотрудничества Украина - М...
Презентация Барского района - Проект приграничного сотрудничества Украина - М...Презентация Барского района - Проект приграничного сотрудничества Украина - М...
Презентация Барского района - Проект приграничного сотрудничества Украина - М...
 
Manual maestro construcor
Manual maestro construcorManual maestro construcor
Manual maestro construcor
 
Pr
PrPr
Pr
 
C0552124
C0552124C0552124
C0552124
 
D0952832
D0952832D0952832
D0952832
 
B0520710
B0520710B0520710
B0520710
 
Custom keys
Custom keysCustom keys
Custom keys
 

Similar to Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods

Dn36682688
Dn36682688Dn36682688
Dn36682688
IJERA Editor
 
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...
A Security Mechanism Against Reactive Jammer  Attack In Wireless Sensor Netwo...A Security Mechanism Against Reactive Jammer  Attack In Wireless Sensor Netwo...
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...
ijsptm
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
C010631015
C010631015C010631015
C010631015
IOSR Journals
 
A Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNA Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSN
iosrjce
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
ijfcstjournal
 
Hiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesHiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniques
PriyangaRajaram
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
inventionjournals
 
G0261041046
G0261041046G0261041046
G0261041046
inventionjournals
 
G0261041046
G0261041046G0261041046
G0261041046
inventionjournals
 
Paper id 25201446
Paper id 25201446Paper id 25201446
Paper id 25201446IJRAT
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
IJNSA Journal
 
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...Detecting of routng misbehavion in hybrid wireless networks used and acknowle...
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...
AAKASH S
 
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLESSELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
IJNSA Journal
 
A survey on jamming attacks, detection and defending strategies in wireless s...
A survey on jamming attacks, detection and defending strategies in wireless s...A survey on jamming attacks, detection and defending strategies in wireless s...
A survey on jamming attacks, detection and defending strategies in wireless s...
eSAT Journals
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
KGunasekaran1
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networks
iosrjce
 
N010617783
N010617783N010617783
N010617783
IOSR Journals
 

Similar to Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods (20)

Dn36682688
Dn36682688Dn36682688
Dn36682688
 
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...
A Security Mechanism Against Reactive Jammer  Attack In Wireless Sensor Netwo...A Security Mechanism Against Reactive Jammer  Attack In Wireless Sensor Netwo...
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
C010631015
C010631015C010631015
C010631015
 
A Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNA Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSN
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
 
Hiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniquesHiding message from hacker using novel network techniques
Hiding message from hacker using novel network techniques
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
G0261041046
G0261041046G0261041046
G0261041046
 
G0261041046
G0261041046G0261041046
G0261041046
 
Paper id 25201446
Paper id 25201446Paper id 25201446
Paper id 25201446
 
Am03402220229
Am03402220229Am03402220229
Am03402220229
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...Detecting of routng misbehavion in hybrid wireless networks used and acknowle...
Detecting of routng misbehavion in hybrid wireless networks used and acknowle...
 
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLESSELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
 
A survey on jamming attacks, detection and defending strategies in wireless s...
A survey on jamming attacks, detection and defending strategies in wireless s...A survey on jamming attacks, detection and defending strategies in wireless s...
A survey on jamming attacks, detection and defending strategies in wireless s...
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networks
 
N010617783
N010617783N010617783
N010617783
 
Wormhole Attack
Wormhole AttackWormhole Attack
Wormhole Attack
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 5, Issue 3 (Sep-Oct. 2012), PP 13-20 www.iosrjournals.org www.iosrjournals.org 13 | P a g e Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods Divya. S1 , Manohar Gosul2 1 M.Tech In Cse Dept , S.R Engineering College Warangal, Andhra Pradesh, India 2 Associate Professor In Cse Dept, S.R Engineering College Warangal, Andhra Pradesh, India Abstract: The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. Jamming can be a huge problem for wireless networks. Jamming is one of many exploits used compromise the wireless environment. It works by denying service to authorized users as legitimate traffic is jammed by the overwhelming frequencies of illegitimate traffic. If an attacker truly wanted to compromise your LAN and wireless security, the most effective approach would be to send random unauthenticated packets to every wireless station in the network. To minimize the impact of an unintentional disruption, it is important the identify its presence. Jamming makes itself known at the physical layer of the network, more commonly known as the MAC (Media Access Control) layer. The increased noise floor results in a faltered noise-to-signal ratio, which will be indicated at the client. It may also be measurable from the access point where network management features should able to effectively report noise floor levels that exceed a predetermined threshold. From there the access points must be dynamically reconfigured to transmit channel in reaction to the disruption as identified by changes at the physical layer I. Introduction Wireless networks are susceptible to numerous security threats due to the open nature of the wireless medium. Anyone with a transceiver can eavesdrop on ongoing transmissions, inject spurious messages, or block the transmission of legitimate ones. One of the fundamental ways for degrading the network performance is by jamming wireless transmissions [9], [11], [19], [20]. In the simplest form of jamming, the adversary corrupts transmitted messages by causing electromagnetic interference in the network’s operational frequencies, and in proximity to the targeted receivers [15]. For an adversary agnostic to the implementation details of the network, a typical jamming strategy is the continuous emission of high-power interference signals such as continuous wave tones, or FM modulated noise [15]. However, adopting an “always-on” jamming strategy has several disadvantages. First, the adversary has to expend a significant amount of energy to jam frequency bands of interest. Second, the continuous presence of high interference levels make this type of jamming easy to detect [11], [19], [20]. Third, these attacks are easy to mitigate either by spread spectrum communications [15], spatial retreats [20], or localization and removal of the jamming nodes. In this paper, we consider a sophisticated adversary model in which the adversary is aware of the implementation details of the network protocols. By exploiting this knowledge, the adversary launches selective jamming attacks in which it targets specific packets of “high” importance. For example, jamming of TCP acknowledgments (ACKs) can severely degrade the throughput of a TCP connection due to the congestion control mechanism of the TCP protocol [3]. Compared to continuous jamming, the adversary is active for a short period of time, thus expending orders of magnitude less energy. To perform selective jamming, the adversary must be capable of classifying transmitted packets in real time, and corrupting them before the end of their transmission. Packet classification can be performed by receiving just a few bytes of a packet, for example, by decoding the frame control field of a MAC-layer frame. We are interested in developing resource efficient methods for preventing real-time packet classification and hence, mitigating selective jamming. Our contributions are summarized below. A. Our Contributions We investigate the feasibility of real-time packet classification for launching selective jamming attacks. We consider a sophisticated adversary who exploits his knowledge on network protocols along with secrets extracted from compromised nodes to maximize the impact of his attack. To mitigate selective jamming, we combine cryptographic mechanisms such as commitment schemes [6], cryptographic puzzles [7], and all in- one transformations [13], with physical-layer parameters. We further study the impact of various selective jamming strategies on the performance of the TCP protocol. The remainder of the paper is organized as follows. Section II, presents related work. In Section III, we describe the problem addressed, and state the system and adversarial model assumptions. In Section IV, we
  • 2. Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods www.iosrjournals.org 14 | P a g e illustrate the feasibility of selective jamming attacks. In Section V, we develop methods for preventing selective jamming. Section VI, illustrates the impact of selective jamming on the performance of TCP. In Section VII, we conclude. II. RELATED WORK Continuous jamming has been used as a denial-of-service (DoS) attack against voice communication since the 1940s [15]. Re cently, several alternative jamming strategies have been demonstrated [11], [12], [19], [20]. Xu et. al. Categorized jammers into four models, (a) a constant jammer that continuously emits noise, (b) a deceptive jammer that continuously broadcasts fabricated messages or replays old ones, (c) a random jammer that alternates between periods of continuous jamming and inactivity, and (d) a reactive jammer who jams only when transmission activity is detected. Intelligent attacks which target the transmission of specific packets were presented in [8], [18]. Thuente considered an attacker who infers eminent packet transmissions based on timing information at the MAC layer. Law et. al. considered(a) (b) (a) Realization of a selective jamming attack, (b) a generic frame format for a wireless network. selective jamming attacks in multi-hop wireless networks, where future transmissions at one hop were inferred from prior transmissions in other hops. However, in both [8], [18], real-time packet classification was considered beyond the capabilities of the adversary. Selectivity was achieved via inference from the control messages already transmitted. Channel-selective jamming attacks were considered in [4], [17]. It was shown that targeting the control channel reduces the required power for performing a DoS attack by several orders of magnitude. To protect control channel traffic, control information was replicated in multiple channels. The “locations” of the channels where control traffic was broadcasted at any given time, was cryptographically protected. In [9], we proposed a randomized frequency hopping algorithm, to protect the control channel inside jammers. Finally, P¨opper et. al. proposed a frequency hopping anti-jamming technique that does not require the sharing of a secret hopping sequence, between the communicating parties [12]. III. PROPOSED WORK Here the contribution towards jamming attacks is reduced by using the two algorithms 1. Symmetric encryption algorithm 2. Brute force attacks against block encryption algorithms The proposed algorithm keeps these two in mind as they are essential in reducing the jamming attacks by using the packet hiding mechanism. IV. Problem Statement And Assumptions A. Problem Statement Consider the scenario depicted in Fig. 1(a). Nodes A and B communicate via a wireless link. Within the communication range of both A and B there is a jamming node J. When A transmits a packet m to B, node J classifies m by receiving only the first few bytes of m. J then corrupts m beyond recovery by interfering with its reception at B. We address the problem of preventing the jamming node from classifying m in real time, thus mitigating J’s ability to perform selective jamming. Our goal is to transform a selective jammer to a random
  • 3. Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods www.iosrjournals.org 15 | P a g e one. Note that in the present work, we do not address packet classification methods based on protocol semantics, as described in [1], [4], [11], [33]. B. System and Adversary Model 1. Network model The network consists of a collection of nodes connected via wireless links. Nodes may communicate directly if they are within communication range, or indirectly via multiple hops. Nodes communicate both in unicast mode and broadcast mode. Communications can be either unencrypted or encrypted. For encrypted broadcast communications, symmetric keys are shared among all intended receivers. These keys are established using preshared pair wise keys or asymmetric cryptography. 2. Communication Model Packets are transmitted at a rate of R bauds. Each PHY-layer symbol corresponds to q bits, where the value of q is defined by the underlying digital modulation scheme. Every symbol carries _ _ q data bits, where α/β is the rate of the PHY-layer encoder. Here, the transmission bit rate is equal to qR bps and the information bit rate is _ _ qR bps. Spread spectrum techniques such as frequency hopping spread spectrum (FHSS), or direct sequence spread spectrum (DSSS) may be used at the PHY layer to protect wireless transmissions from jamming. SS provides immunity to interference to some extent (typically 20 to 30 dB gain), but a powerful jammer is still capable of jamming data packets of his choosing. Transmitted packets have the generic format depicted in Fig. 1(b). The preamble is used for synchronizing the sampling process at the receiver. The PHY layer header contains information regarding the length of the frame, and the transmission rate. The MAC header determines the MAC protocol version, the source and destination addresses, sequence numbers plus some additional fields. The MAC header is followed by the frame body that typically contains an ARP packet or an IP datagram. Finally, the MAC frame is protected by a cyclic redundancy check (CRC) code. At the PHY layer, a trailer may be appended for synchronizing the sender and receiver. 3. Adversary Model We assume the adversary is in control of the communication medium and can jam messages at any part of the network of his choosing (similar to the Dolev- Yao model). The adversary can operate in full-duplex mode, thus being able to receive and transmit simultaneously. This can be achieved, for example, with the use of multi-radio transceivers. In addition, the adversary is equipped with directional antennas that enable the reception of a signal from one node and jamming of the same signal at another.For analysis purposes, we assume that the adversary can pro-actively jam a number of bits just below the ECC capability early in the transmission. He can then decide to irrecoverably corrupt a transmitted packet by jamming the last symbol. In reality, it has been demonstrated that selective jamming can be achieved with far less resources [32], [34]. A jammer equipped with a single half-duplex transceiver is sufficient to classify and jam transmitted packets. However, our model captures a more potent adversary that can be effective even at high transmission speeds. The adversary is assumed to be computationally and storage bounded, although he can be far superior to normal nodes. In particular, he can be equipped with special purpose hardware for performing cryptanalysis or any other required computation. Solving well-known hard cryptographic problems is assumed to be time- consuming. For the purposes of analysis, given a cipher text, the most efficient method for deriving the corresponding plaintext is assumed to be an exhaustive search on the key space. The implementation details of every layer of the network stack are assumed to be public. Furthermore, the adversary is capable of physically compromising network devices and recovering stored information including cryptographic keys, PN codes, etc. This internal adversary model is realistic for network architectures such as mobile ad-hoc, mesh, cognitive radio, and wireless sensor networks, where network devices may operate unattended, thus being susceptible to physical compromise. V. Implementation The implementation environment has software such as JDK 1.6 running in Windows XP operating system. The system uses Java technology such as RMI (Remote Method Invocation). Java’s SWING API is used to build user interface. The RMI technology lets nodes to communicate remotely. The simulation has three kinds of nodes namely centralized server, server and client. The purpose of source is to send the data to the destination. There sender will be consisting of the Channel Encoder, Interleaver and the Modulator. For simulation of communication in WSN, the server node is able to send messages to client nodes based on the port number and the communication is routed through one of the centralized servers. Here user is able to select a file by clicking browse button. The Send button is to be initiated by user in order to send messages to client based on port number. The message or file selected is broken into packets with length 48 bytes.
  • 4. Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods www.iosrjournals.org 16 | P a g e Fig.1 screen shot for source It selects the required data and sends it to a particular client. The data is sent in the form of packets with length 48 bytes. The server has to use specific IP address and port number based on the centralized server through which it is to send the messages to client. Fig .2 File loading Channel encoding deals with error control during the transmission through the communication channel. It transforms the information sequence to the encoded sequence. The result we get after the modulation is “Code Word”. Fig.3 Acknowledgment for loading File The channel encoding will be done in this way. After the encoding is completed there will be a message displayed. Select the data to transfer Status information
  • 5. Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods www.iosrjournals.org 17 | P a g e Fig.4 Channel encoding of the data Interleaving is a way to arrange data in a non-contiguous way to increase performance. In error- correction coding, particularly within data transmission, disk storage, and memory. After the interleaving the data is converted into packets. Then the packets are used for the transmission. Fig.5 Status Corresponding to particular action Identify the destination and data is converted into the packets and send to selected destination. If the data is sent properly there will be a message in the “status information” Fig.6 Packet Transmission to the Packet hiding queue A. Packet Hiding Queue Packet hiding Queue is responsible for sending the packets in a queue format i.e., first come first served the packets which come first will be sent first in a sequential order. The packet hiding acts as a server which is used for identifying the destination. It also checks the size of the data when we are transmitting. Each packet will be storing its corresponding information in the binary format. The packet hiding queue is responsible for sending the data to the destination. Fig.7 Packet Hiding Queue
  • 6. Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods www.iosrjournals.org 18 | P a g e When the packet hiding queue sends the data received from the source to the destination. The destination will be ready to take the data from the packet hiding queue. Fig.8 Packets Received at Destination The destination will be receiving the path from where it can get the data from the packet hiding queue. The Destination will be consisting of the Demodulator, De-interleaver and Channel Decoder. Demodulation is a process used in the receivers to recover the original signal coming from the sender end in modulating form. At the receiver end, the interleaved data is arranged back into the original sequence by the de-interleaver. As a result of interleaving, correlated noise introduced in the transmission channel appears to be statistically independent at the receiver and thus allows better error correction. Fig. 9 Status After demodulation, deinterleaving and channel decoding B. Selected File data at the Source The data sent from the sender is a text file which is consisting the following information. Fig 10 Choose file with the data at Source C. Received Data at Destination Fig.11 Received data At the destination The status information text area is meant for presenting status messages. Data received Data sent
  • 7. Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods www.iosrjournals.org 19 | P a g e D. The Jamming Attack Analysis Experiments are made with two clients, two servers and a packet hiding Queue. The communication flow starts when source decides to send messages to client. It chooses a file and breaks it into many packets of size 48 bytes each and sends them through randomly selected centralized server. The server monitors communication and detects any jamming attacks. The jamming Attacks can be viewed by “Jamming Attack Analysis” Fig.12 Jamming Attack Analysis The above fig shows the jamming attack detection. There will be many number of nodes which we need to be added. Each node will be having a range to transmit the data. When data is sent from source to destination by using the packet hiding queue. It can analyze the attacks and also find whether the attack is made or not. It considers packet loss as well. It is assumed that due to attack in sending packets may occur and in turn it results in data loss or packet loss. Fig.13 Jamming Attack Detection As seen in fig, the when the jamming attack is detected then it will be indicated with the red symbol at the corresponding node VI. Conclusion We addressed the problem of selective jamming in wireless networks. We illustrated the effectiveness of selective jamming attacks by implementing such attacks against the TCP protocol. We showed that an adversary can exploit its knowledge of the protocol implementation to increase the impact of his attack at a significantly lower energy cost. We illustrated the feasibility of selective jamming attacks by performing real time packet classification. To mitigate selective jamming, we proposed several methods that combine cryptographic primitives such as commitment schemes, cryptographic puzzles, and all- or-nothing transformations with physical layer attributes. References [1] OPNETtm modeler 14.5. http://www.opnet.com/solutions/network rd/ modeler.html. [2] IEEE 802.11 standard. http://standards.ieee.org/getieee802/download/ 802.11-2007.pdf, 2007. [3] A. Al Hanbali, E. Altman, and P. Nain. A survey of tcp over ad hoc networks. IEEE Communications Surveys & Tutorials, 7(3):22–36, 2005. [4] A. Chan, X. Liu, G. Noubir, and B. Thapa. Control channel jamming: Resilience and identification of traitors. In Proceedings of the IEEE ISIT, 2007. [5] D. Comer. Internetworking with TCP/IP: principles, protocols, and architecture. Prentice Hall, 2006. [6] I. Damgard. Commitment schemes and zero-knowledge protocols. Lecture notes in computer science, 1561:63–86, 1999. Jamming attack detection
  • 8. Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods www.iosrjournals.org 20 | P a g e [7] A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proceedings of the Network and Distributed System Security Symposium, pages 151–165, 1999. [8] Y. W. Law, M. Palaniswami, L. V. Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy-efficient link-layer jamming attacks against WSN MAC protocols. ACM Transactions on Sensor Networks, 5(1):1–38,2009. [9] L. Lazos, S. Liu, and M. Krunz. Mitigating control-channel jamming attacks in multi-channel ad hoc networks. In Proceedings of the second ACM conference on wireless network security, pages 169–180, 2009. [10] R. C. Merkle. Secure communications over insecure channels. Communincations of the ACM, 21(4):294–299, 1978. [11] G. Noubir and G. Lin. Low-power DoS attacks in data wireless LANs and countermeasures. ACM SIGMOBILE Mobile Computing and Communications Review, 7(3):29–30, 2003. [12] C. Po¨pper, M. Strasser, and S. Cˇ apkun. Jamming-resistant broadcast communication without shared keys. In Proceedings of the USENIX Security Symposium, 2009. [13] R. Rivest. All-or-nothing encryption and the package transform. Lecture Notes in Computer Science, pages 210–218, 1997. [14] R. Rivest, A. Shamir, and D. Wagner. Time-lock puzzles and timedrelease crypto. 1996. [15] M. Simon, J. Omura, R. Scholtz, and B. Levitt. Spread spectrum communications handbook. McGraw-Hill Companies, 1994. [16] D. Stinson. Cryptography: theory and practice. CRC press, 2006. [17] P. Tague, M. Li, and R. Poovendran. Probabilistic mitigation of control channel jamming via random key distribution. In Proceedings of the PIMRC, 2007. [18] D. Thuente and M. Acharya. Intelligent jamming in wireless networks with applications to 802.11b and other networks. In Proceedings of the IEEE MILCOM, 2006. [19] W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, pages 46–57, 2005. [20] W. Xu, T. Wood, W. Trappe, and Y. Zhang. Channel surfing and spatial retreats: defenses against wireless denial of service. In Proceedings of the 3rd ACM workshop on Wireless security, pages 80–89, 2004. S.Divya received the B.Tech Degree in Computer Science and Engineering from Kamala Institute of Technology and Science, Karimnagar, A.P, India. Currently doing M.tech in Computer Science and Engineering at SR Engineering College, Warangal, India. Her research interests include Networking and Security. Manohar Gosul received the B.Tech degree in Computer Science &Engineering from Poojya Doddappa Appa Engineering College, Gulbarga, India and M.Tech degree in Computer Science & Engineering from Poojya Doddappa Appa Engineering College, Gulbarga, India. Currently he is an Associate Professor in the department Computer Science & Engineering, SR Engineering College, Warangal, India. His research interests include Data Mining, Advance Databases and Network Security.