SlideShare a Scribd company logo
1 of 7
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.50-56
ISSN: 2278-2400
50
Mitigation and control of Defeating Jammers using P-1
Factorization
G Krithika
1
, K Kamala
2
1Student, ME-Communication Systems,krithika8793@gmail.com,Valliammai Engineering
College,Potheri,Chennai 603203.
2Assistant Professor(OG),kurrakamalareddy@gmail.com,Dept of ECE,Valliammai Engineering
College,Potheri, Chennai 603203
.Abstract— Jamming-resistant broadcast communication is
crucial for safety-critical applications such as emergency alert
broadcasts or the dissemination of navigation signals in
adversarial settings. These applications share the need for
guaranteed authenticity and availability of messages which are
broadcasted by base stations to a large and unknown number
of (potentially untrusted) receivers. Common techniques to
counter jamming attacks such as Direct-Sequence Spread
Spectrum (DSSS) and Frequency Hopping are based on secrets
that need to be shared between the sender and the receivers
before the start of the communication. However, broadcast anti
jamming communication that relies on Pollards Rho Method.
In this work, we therefore propose a solution called P-Rho
Method to enables spread-spectrum anti-jamming broadcast
communication without the requirement of shared
secrets. complete our work with an experimental evaluation on
a prototype implementation.
Keywords—Jamming, Broadcast Communications, Wireless
networks.
I. INTRODUCTION
Wireless communications are vulnerable to intentional
interference attacks, typically referred to as jamming.
Conventional anti-jamming techniques rely on spread spectrum
(SS) communications, such as direct sequence spread spectrum
(DSSS) and frequency hopping spread spectrum (FHSS) [17].
DSSS provides bit-level protection by spreading bits according
to a secret pseudorandom noise (PN) code, known only to the
communicating parties. In FHSS, the sender and the receiver
hop synchronously using a secret random frequency hopping
(FH) sequence [5], [10], [15]. For jamming-resistant broadcast
communications, a common secret to be shared between n the
sender and all (potentially non-trustworthy) receiver. The
disclosure of this common secret due to the compromise of any
receiver nullifies the SS gains [15], [17]. After the studies,
Researchers assumed that the jammer cannot flip a bit ‘1’ to a
bit ‘0’. It was shown that a jammer cannot erase packets from
the wireless channel. They proposed a method called
Uncoordinated DSSS (UDSSS) [15] and RD-DSS. We
propose the Time-Delayed Broadcast Scheme (TDBS) as an
emergency mechanism for temporarily restoring broadcast
communications until inside jammers are physically removed
from the network. TDBS differs from classical FHSS designs in
that two communicating nodes do not follow the same FH
sequence, but are assigned unique ones. TDBS is specifically
designed to fecilitate broadcasting in the presence of jammers
[17], [9], [12] and in the absence of the coordination channel. We
further consider the problem of updating the FH sequences of
existing nodes when the broadcast group is dynamic. This
problem is mapped to the construction of rainbow path of fixed
size in proper edge- colored complete. Note that TDBS is not
meant as a permanent replacement of the conventional broadcast
mechanism. Broadcasting on a common frequency band achieves
the optimal communication efficiency in the absence of any
jammer. TDBS is designed as an emergency mechanism for
temporarily restoring communications until the jammer is
physically removed.
II. ARCHITECTURE OF THE SYSTEM
The architecture diagram shows that the messages in a network are
transmitted simultaneously through many paths. While reaching
the server the messages are collected and identified the path
through which the message is traversed. The path through which
the message is delayed while reaching the server is identified and
the jammer in that path is located using the JADE mechanism
III. WORK DESCRIPTION
A. JAMMER
To ensure the successful deployment of pervasive wireless
networks, it is crucial to localize jammers, since the locations of
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.50-56
ISSN: 2278-2400
51
jammers allow a better physical arrangement of wireless
devices that cause unintentional radio interference, or enable a
wide range of defense strategies for combating malicious
jamming attackers. There are many different attack strategies
that jammers can perform in order to disrupt wireless
communications. It is impractical to cover all the possible
jamming attack models that might exist. Thus, we mainly focus
on one common type of jammer - constant jammers. Constant
jammers continually emit radio signals, regardless of whether
the channel is idle or not. Such jammers can be unintentional
radio interferers that are always active or malicious jammers
that keep disturbing network communication. Besides, we
assume each jammer is equipped with an omnidirectional
antenna. Thus, every jammer has a similar jamming range in all
directions. Identification of jammers' positions will be
performed after the jamming attack is detected, and we assume
the network is able to identify jamming attacks and obtain the
number of jammers.
B.NETWORK CLASSIFICATION
We classify the network nodes based on the level of
disturbance caused by jammers, and identify the nodes that can
participate in jammer localization, e.g., the ones that can
measure and report the JSS. Essentially, the communication
range changes caused by jamming are reflected by the changes
of neighbors at the network topology level. Thus, the network
nodes could be classified based on the changes of neighbors
caused by jamming. We define that node B is a neighbor of
node A if A can communicate with B prior to jamming. The
network nodes can be classified into three categories according
to the impact of jamming: unaffected node, jammed node, and
boundary node.
C. EVALUATE METRIC
Essentially, our jammer localization approach works as
follows. Given a set of JSS, for every estimated location, we
are able to provide a quantitative evaluation feedback
indicating the distance between the estimated locations of
jammers and their true locations. For example, a small value of
evaluation feedback indicates that estimated locations are close
to the true ones, and vice versa.
D. SINGLE JAMMER
Assume a jammer J located at (xJ, yJ) starts to transmit at the
power level of PJ, and m nodes located at {(xi, yi)}i∈[1,m]
become boundary nodes. To calculate ez, each boundary node
will first measure JSS locally and we denote the JSS measured
at boundary node i as Pri. Then the current estimation of the
jammer J's location can be calculated.
E. MULTIPLE JAMMER
Similar to single jammer, we assume n jammers located at {(xJi
, yJi )}i∈[1,n] start to transmit at the power level of {PJi
}i∈[1,n] separately at the same time, and m nodes located at {(xi ,
yi )}i∈[1,m] become boundary nodes. To calculate ez, each
boundary node measures JSS locally and we denote the JSS
measured at boundary node i as Pri which is a combined JSS
from multiple jammers. We can include all the variables to be
estimated, i.e., current estimation of the n jammers' locations and
the transmission powers, calculated in a form of matrix.
F. MEASURE JSS
Calculating JSS is equivalent to obtaining the average of the
Ambient Noise Floor (ANFs), i.e., mean (sa). In most cases, sc =
∅ and sa ⊂ s. In a special case where no sender has ever
transmitted packets throughout the process of obtaining n
measurements, sc = ∅ and sa = s. The algorithm for calculating
the ANF should be able to cope with both cases. A regular node
will take n measurements of the ambient noise measurements. It
will consider the ANF as the average of all measurements if no
sender has trans- mitted during the period of measuring;
otherwise, the ANF is the average of sa, which can be obtained
by filtering out sc from s. The intuition of differentiating those
two cases is that if only jamming signals are present, then the
variance of n measurements will be small; otherwise, the ambient
noise measurements will vary as different senders happen to
transmit. The correctness of the algorithm is supported by the fact
that sa is not likely to be empty due to carrier sensing, and the
JSS approximately equals to the average.
G. BEST ESTIMATION
The jammer localization problem can be modeled as a non-linear
optimization problem (defined in Problem 1), and finding a good
estimation of jammers' locations is equivalent to seeking the
solution that minimizes the evaluation feedback metric ez . We
use several heuristic search algorithms that rely on guided
random processes to approach the global optimum without
converging to a local minimum.
H.GENETICALGORITHM
Genetic algorithms (GA) searches for the global optimum by
mimicking the process of natural selection in biological
evolution. A GA iteratively generates a set of solutions known
as a population. At each iteration, a GA selects a subset of
solutions to form a new population based on their "fitness" and
also randomly generates a few new solutions. As a result, the
"fitter" solutions will be inherited. At the same time, new
solutions will be introduced to the population, which may turn
out to be "fitter" than ever. As a result, over successive
generations, a GA is likely to escape from local optima and
"evolves" towards an optimal solution.
I. SIMULATED ANNEALING ALGORITHM
A simulated annealing algorithm (SA) searches for the optimal
solutions by modeling the physical process of heating a material
and then controlled lowering the temperature to decrease defects.
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.50-56
ISSN: 2278-2400
52
At each iteration, the simulated annealing algorithm compares
the current solution with a randomly-generated new solution.
The new solution is selected according to a probability
distribution with a scale proportional to the temperature, and it
will replace the current solution according to a probability
governed by both the new object function value and
temperature.
IV. SIMULATION TOOL
NS (version 2) is an object-oriented, discrete event driven
network simulator developed at UC Berkely written in C++ and
OTcl. NS is primarily useful for simulating local and wide area
networks. Although NS is fairly easy to use once you get to
know the simulator, it is quite difficult for a first time user,
because there are few user-friendly manuals. Even though there
is a lot of documentation written by the developers which has
in depth explanation of the simulator, it is written with the
depth of a skilled NS user.The purpose of this project is to give
a new user some basic idea of how the simultor works, how to
setup simulation networks, where to look for further
information about network components in simulator codes,
how to create new network components, etc., mainly by giving
simple examples and brief explanations based on our
experiences. Although all the usage of the simulator or possible
network simulation setups may not be covered in this project,
the project should help a new user to get started quickly.
NS is an event driven network simulator developed at UC
Berkeley that simulates variety of IP networks. It implements
network protocols such as TCP and UPD, traffic source
behavior such as FTP, Telnet, Web, CBR and VBR, router
queue management mechanism such as Drop Tail, RED and
CBQ, routing algorithms such as Dijkstra, and more. NS also
implements multicasting and some of the MAC layer protocols
for LAN simulations. The NS project is now a part of the VINT
project that develops tools for simulation results display,
analysis and converters that convert network topologies
generated by well-known generators to NS formats. Currently,
NS (version 2) written in C++ and OTcl (Tcl script language
with Object-oriented extensions developed at MIT) is available.
Fig.2. Simplified View of NS
As shown in Figure in a simplified view, NS is Object-oriented
Tcl (OTcl) script interpreter that has a simulation event
scheduler and network component object libraries, and network
setup (plumbing) module libraries (actually, plumbing modules
are implemented as member functions of the base simulator
object). In other words, to use NS, you program in OTcl script
language. To setup and run a simulation network, a user should
write an OTcl script that initiates an event scheduler, sets up the
network topology using the network objects and the plumbing
functions in the library, and tells traffic sources when to start and
stop transmitting packets through the event scheduler. The term
"plumbing" is used for a network setup, because setting up a
network is plumbing possible data paths among network objects
by setting the "neighbor" pointer of an object to the address of an
appropriate object. When a user wants to make a new network
object, he or she can easily make an object either by writing a
new object or by making a compound object from the object
library, and plumb the data path through the object. This may
sound like complicated job, but the plumbing OTcl modules
actually make the job very easy. The power of NS comes from
this plumbing.
Another major component of NS beside network objects is the
event scheduler. An event in NS is a packet ID that is unique for a
packet with scheduled time and the pointer to an object that
handles the event. In NS, an event scheduler keeps track of
simulation time and fires all the events in the event queue
scheduled for the current time by invoking appropriate network
components, which usually are the ones who issued the events,
and let them do the appropriate action associated with packet
pointed by the event. Network components communicate with
one another passing packets, however this does not consume
actual simulation time. All the network components that need to
spend some simulation time handling a packet (i.e. need a delay)
use the event scheduler by issuing an event for the packet and
waiting for the event to be fired to itself before doing further
action handling the packet. For example, a network switch
component that simulates a switch with 20 microseconds of
switching delay issues an event for a packet to be switched to the
scheduler as an event 20 microsecond later. The scheduler after
20 microsecond dequeues the event and fires it to the switch
component, which then passes the packet to an appropriate output
link component. Another use of an event scheduler is timer. For
example, TCP needs a timer to keep track of a packet
transmission time out for retransmission (transmission of a packet
with the same TCP packet number but different NS packet ID).
Timers use event schedulers in a similar manner that delay does.
The only difference is that timer measures a time value associated
with a packet and does an appropriate action related to that packet
after a certain time goes by, and does not simulate a delay.NS is
written not only in OTcl but in C++ also. For efficiency reason,
NS separates the data path implementation from control path
implementations. In order to reduce packet and event processing
time (not simulation time), the event scheduler and the basic
network component objects in the data path are written and
compiled using C++. These compiled objects are made available
to the OTcl interpreter through an OTcl linkage that creates a
matching OTcl object for each of the C++ objects and makes the
control functions and the configurable variables specified by the
C++ object act as member functions and member variables of the
corresponding OTcl object. In this way, the controls of the C++
objects are given to OTcl. It is also possible to add member
functions and variables to a C++ linked OTcl object. The objects
in C++ that do not need to be controlled in a simulation or
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.50-56
ISSN: 2278-2400
53
internally used by another object do not need to be linked to
OTcl. Likewise, an object (not in the data path) can be entirely
implemented in OTcl. Figure 6.2 shows an object hierarchy
example in C++ and OTcl. One thing to note in the figure is
that for C++ objects that have an OTcl linkage forming a
hierarchy, there is a matching OTcl object hierarchy very
similar to that of C++.
Fig.3. C++ and OTcl: The Duality
Fig.4. Architectural View of NS
Figure 8 shows the general architecture of NS. In this figure a
general user (not an NS developer) can be thought of standing
at the left bottom corner, designing and running simulations in
Tcl using the simulator objects in the OTcl library. The event
schedulers and most of the network components are
implemented in C++ and available to OTcl through an OTcl
linkage that is implemented using tclcl. The whole thing
together makes NS, which is a OO extended Tcl interpreter
with network simulator libraries.This section briefly examined
the general structure and architecture of NS. At this point, one
might be wondering about how to obtain NS simulation results.
As shown in Figure 7, when a simulation is finished, NS
produces one or more text-based output files that contain
detailed simulation data, if specified to do so in the input Tcl
(or more specifically, OTcl) script. The data can be used for
simulation analysis (two simulation result analysis examples
are presented in later sections) or as an input to a graphical
simulation display tool called Network Animator (NAM) .
NAM has a nice graphical user interface similar to that of a CD
player (play, fast forward, rewind, pause and so on), and also
has a display speed controller. Furthermore, it can graphically
present information such as throughput and number of packet
drops at each link, although the graphical information cannot
be used for accurate simulation analysis.
Network simulator (NS) is an object–oriented, discrete event
simulator for networking research. NS provides substantial
support for simulation of TCP, routing and multicast protocols
over wired and wireless networks. The simulator is a result of
an ongoing effort of research and developed. Even though there is
a considerable confidence in NS, it is not a polished product yet
and bugs are being discovered and corrected continuously. NS is
written in C++, with an OTcl1 interpreter as a command and
configuration interface. The C++ part, which is fast to run but
slower to change, is used for detailed protocol implementation.
The OTcl part, on the other hand, which runs much slower but
can be changed very fast quickly, is used for simulation
configuration. One of the advantages of this split-language
program approach is that it allows for fast generation of large
scenarios. To simply use the simulator, it is sufficient to know
OTcl. On the other hand, one disadvantage is that modifying and
extending the simulator requires programming and debugging in
both languages.
NS can simulate the following:
1) Topology: Wired, wireless
2) Sheduling Algorithms: RED,
Drop Tail,
3) Transport Protocols: TCP,
UDP
4) Routing: Static and dynamic
routing
5) Application: FTP, HTTP,
Telnet, Traffic generators
A.NETWORK COMPONENTS
This section talks about the NS components, mostly compound
network components. Figure shows a partial OTcl class hierarchy
of NS, which will help understanding the basic network
components. The root of the hierarchy is the Tcl Object class that
is the super class of all OTcl library objects (scheduler, network
components, timers and the other objects including NAM related
ones). As an ancestor class of Tcl Object, Ns Object class is the
super class of all basic network component objects that handle
packets, which may compose compound network objects such as
nodes and links. The basic network components are further
divided into two subclasses, Connector and Classifier, based on
the number of the possible output DATA paths. The basic
network and objects that have only one output DATA path are
under the Connector class, and switching objects that have
possible multiple output DATA paths are under the Classifier
class.
Fig.5. OTcl Class Hierarchy
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.50-56
ISSN: 2278-2400
54
A.CLASS TCL
The class Tcl encapsulates the actual instance of the OTcl
interpreter and provides the methods to access and
communicate with that interpreter, code. The class provides
methods for the following operations:
1.obtain a reference to the Tel instance
2.invoke OTcl procedures through the interpreter
3.retrieve, or pass back results to the interpreter
4.report error situations and exit in an uniform
manner
5.store and lookup "TclObjects"
6.acquire direct access to the interpreter.
B.OBTAIN A REFERENCE TO THE CLASS TCL
INSTANCE
A single instance of the class is declared in -tclcl/Tcl.cc as a
static member variable. The statement required to access this
instance is Tel& tel = Tcl::instance();
C. INVOKING OTCL PROCEDURES
There are four different methods to invoke an OTcl command
through the instance, tcl. They differ essentially in their calling
arguments. Each function passes a string to the interpreter that
then evaluates the string in a global context. These methods
will return to the caller if the interpreter returns TCL_OK. On
the other hand, if the interpreter returns TCL_ERROR, the
methods will call tkerror{}. The user can overload this
procedure to selectively disregard certain types of errors.
1. Passing Results to/from the Interpreter : When the
interpreter invokes a C++ method, it expects the result
back in the private member variable, tcl-> result.
2. Error Reporting and Exit: This method provides a
uniform way to report errors in the compiled code.
D.COMMAND METHODS: DEFINITION AND
INVOCATION
For every TclObject that is created, ns establishes the instance
procedure,cmd{}, as a hook to executing methods through the
compiled shadow object. The procedure cmd{} invokes the
method command() of the shadow object automatically,
passing the arguments to cmd{} as an argument vector to the
command() method. The user can invoke the cmd {} method in
one of two ways, by explicitly invoking the procedure,
specifying the desired operation as the first argument, or
implicitly, as if there were an instance procedure of the same
name as the desired operation. Most simulation scripts will use
the latter form. If matched in this method, it must invoke its
parent's command method, and return the corresponding result.
This permits the user to conceive of operations as having the
same inheritance properties as instance procedures or compiled
methods.In the event that this command method is defined for a
class with multipleinheritance, one of two implementations can
be chosen:
1.Either they can invoke one of the parent's command method,
and return the result of that invocation.
2. They can each of the parent's command methods in some
sequence, and return the result of the first invocation that is
successful. If none of them are successful, then they should
return an error.
E.MOBILE NETWORKING
The wireless model essentially consists of the Mobile Node at the
core with additional supporting features that allows simulations
of multi-hop ad-hoc networks, wireless LANs etc. The Mobile
Node object is a split object. The C++ class Mobile Node is
derived from parent class Node. A Mobile Node thus is the basic
Node object with added functionalities of a wireless and mobile
node like ability to move within a given topology, ability to
receive and transmit signals to and from a wireless channel etc. A
major difference between them is that a mobile Node is not
connected by means of Links to other nodes or mobile
nodes.Mobile Node is the basic nsNode object with added
functionalities like movement, ability to transmit and receive on a
channel that allows it to be used to create mobile, wireless
simulation environments. The class Mobile Node is derived from
the base class Node. The four ad-hoc routing protocols that are
currently supported are, Dynamic Source Routing (DSR),
Temporally ordered Routing Algorithm (TORA) and Adhoc On-
demand Distance Vector (AODV).
F.TRACE ANALYSIS
This section shows a trace analysis. Running the TCL script
generates a
NAM trace file that is going to be used as an input to NAM and a
trace file called "out.tr" that will be used for our simulation
analysis. Figure shows the trace format and example trace DATA
from "out.tr". Where each line in trace file represents an event
associated to a packet.
G.NETWORK ANIMATOR (NAM)
NAM-Tool for viewing network simulation traces and real world
packet teaches. It supports topology layout, packet level
animation and various DATA inspection tools. Before starting to
use NAM, trace file need to be created. This trace file is usually
generated by NS. It contains topology information, e.g. nodes and
links, as well as packet traces .during a simulation, the user can
produce topology configurations, layout information and packet
traces using tracing events in NS.Once the trace file is generated,
NAM can be used to animate it.Upon startup, NAM will read the
trace file, create topology, pop up a window, do layout if
necessary and then pause at time 0. Through its user interface,
NAM provides control over many aspects of animation. In Figure
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.50-56
ISSN: 2278-2400
55
a screenshot of a NAM window is shown, where the most
important function are explained. Although the NAM software
contains bugs, as do the NS software, it works fine most of the
times and times and causes only little trouble. NAM is an
excellent first step to check.
V. RESULTS AND DISCUSSIONS
NS2 is one of the most popular open source network
simulators. We conduct the following experiments with NS2.34
simulator.A network is taken into consideration in which 50
nodes are randomly deployed. The time taken for simulation is
30 ms.
A.DEPLOYING THE NODES
The nodes are deployed in a random manner. The number of
nodes deployed are 50
Fig.6. Deploying of Nodes
B.COVERAGE AREA
The coverage area of the neighboring nodes are identified
Fig.7. Coverage area of Neighbouring Nodes
C.DETERMINATION OF SOURCE AND
DESTINATION NODES
The source and destination nodes are identified and marked
in different colors
Fig.8. Source and Destination nodes Detected
D.IDENTIFICATION OF THE ROUTE TO TRANSMIT
PACKETS
The route between source and destination nodes are identified
to transmit packets
Fig9. Path Identification
E.TRANSMITTING PACKETS AS NICAST
TRANSMISSIONS
After identifying the path between source and destination nodes
the packets are transmitted in unicast transmissions
Fig.10. Unicast Transmission
F.COMPLETION OF PACKET TRANSMISSION
The packets are transmitted successfully even though jammer is
present in the network or not
Integrated Intelligent Research (IIR) International Journal of Business Intelligents
Volume: 05 Issue: 01 June 2016 Page No.50-56
ISSN: 2278-2400
56
Fig 11. Transmission Completed
G.PERFORMANCE ANALYSIS GRAPH
Performance analysis on delay time is measured between the
number of messages and delay time
Fig.12. Performance Graph
H.ENERGY GRAPH
The graph is plotted between the drop rate and the packets
Fig.13. Energy Graph
VI. CONCLUSION
The proposed TDBS is a scheme for jamming-resistant
broadcast communications in the presence of inside jammers.
In TDBS broadcast is realized as the series of unicast
transmissions distributed in frequency and time. Further
developed mechanisms for updating the FH sequences assigned
to nodes, when the broadcast group is dynamic. It mapped the
problem of minimizing the number of FH sequence changes
required for node addition. It analytically evaluates the security
properties of TDBS under both an external and internal threat
model and shows that TDBS maintains broadcast
communications even when multiple nodes are compromised.In
future to ensure the successful deployment of pervasive wireless
networks, it is crucial to localize jammers, since the location of
jammers allow a better physical arrangement of wireless devices
that cause unintentional radio interference or enable a wide range
of defense strategies for combating malicious jamming attackers.
It mainly focuses on two types of jammers they are Reactive
jammer and Non Reactive jammers which emits radio signals
even when the network is idle.
REFERENCES
[1] Abdel Rahman. M, Rahbari. H and Krunz. M (2012), “Adaptive
frequency hopping algorithms for multicast rendezvous in DSA
networks,” in Proc. IEEE DYSPAN Symp., pp. 517–528.
[2] Adamy. D (2001), EW 101: A First Course in Electronic Warfare.
Norwood, MA, USA: Artech House.
[3] Andersen. L. D (1989), “Hamilton circuits with many colours in
properly edge-coloured complete graphs,” Math. Scandinavica, vol.
64, pp. 5–14.
[4] Appel. K and Haken. W (1977), “Every planar map is four colourable:
Part I,” Illinois J. Math., vol. 21, no. 3, pp. 491–567.
[5] L. C, Bahn. W. L, Collins. M. D, Carlisle. M. C and Butler. S. C
(2007), “Keyless jam resistance,” in Proc. IEEE Workshop Inf.
Assurance United States Military Acad.
[6] Bahl. P, Chandra. R and Dunagan. J (2004), “SSCH: slotted seeded
channel hopping for capacity improvement in IEEE 802.11 ad-hoc
wireless networks,” in Proc. MOBICOM Conf., pp. 216–230.
[7] Bian. K, Park. J and Chen. R (2009), “A quorum-based framework for
establishing control channels in dynamic spectrum access networks,”
in Proc. MOBICOM Conf., pp. 25–36.
[8] Chan. A, Liu. X, Noubir. G and Thapa. B (2007), “Broadcast control
channel jamming: Resilience and identification of traitors,” in Proc.
ISIT Conf., pp. 2496–2500.
[9] Chaporkar. P, Kar. K, Luo. X and Sarkar. S (Feb. 2008), “Throughput
and fairness guarantees through maximal scheduling in wireless
networks,” IEEE Trans. Inf. Theory, vol. 54, no. 2, pp. 572–594.
[10] Chiang. J. T and Hu. Y. C (2008), “Dynamic jamming mitigation for
wireless broadcast networks,” in Proc. INFOCOM Conf., pp. 1211–
1219.
[11] Dinitz. J. H and Stinson. D. R (1987), “A hill-climbing algorithm for
the construction of one-factorizations and room squares,” SIAM J.
Algebraic Discrete Meth., vol. 8, no. 3, pp. 430–438.
[12] Gupta. A, Lin. X and Srikant. R (Dec. 2009), “Low-complexity
distributed scheduling algorithms for wireless networks,” IEEE/ACM
Trans. Netw., vol. 17, no. 6, pp. 1846–1859.
[13] Ganeriwal. S, Popper. C, Capkun. S and Srivastava. M. B (2008),
“Secure time synchronization in sensor networks,” ACM Trans. Inf.
Syst. Security, vol. 11, no. 4, p. 23.
[14] Gollakota. S and Katabi. D (2008), “Zigzag decoding: Combating
hidden terminals in wireless networks,” in Proc. ACM SIGCOMM
Conf., pp. 159–170.
[15] Liu. S, Lazos. L and Krunz. M (2011), “Thwarting inside jamming
attacks on wireless broadcast communications,” in Proc. 4th ACM
WiSec Conf., pp. 29–40.
[16] Sisi Liu, Loukas Lazos and Marwan Krunz (May/Jun. 2015) “Time-
Delayed Broadcasting for Defeating Inside Jammers,” in Proc. IEEE
Transactions On Dependable And Secure Computing, Vol. 12, No. 3.
[17] [17] Zhang. Y, Yu. G, Li. Q, Wang. H, Zhu. H and Wang. B (Jun.
2014), “Channel hopping-based communication rendezvous in
cognitive radio networks,” IEEE/ACM Trans. Netw., vol. 22, no. 3, pp.
889–902.

More Related Content

Similar to Mitigation and control of Defeating Jammers using P-1 Factorization

Contemporary Spread Spectrum Techniques: A Comparative Study
Contemporary Spread Spectrum Techniques: A Comparative StudyContemporary Spread Spectrum Techniques: A Comparative Study
Contemporary Spread Spectrum Techniques: A Comparative StudyIJERD Editor
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) inventionjournals
 
Parallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projectsParallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projectsVijay Karan
 
Parallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 ProjectsParallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 ProjectsVijay Karan
 
SIGNAL DETECTION IN MIMO COMMUNICATIONS SYSTEM WITH NON-GAUSSIAN NOISES BASED...
SIGNAL DETECTION IN MIMO COMMUNICATIONS SYSTEM WITH NON-GAUSSIAN NOISES BASED...SIGNAL DETECTION IN MIMO COMMUNICATIONS SYSTEM WITH NON-GAUSSIAN NOISES BASED...
SIGNAL DETECTION IN MIMO COMMUNICATIONS SYSTEM WITH NON-GAUSSIAN NOISES BASED...ijwmn
 
Signal Detection in MIMO Communications System with Non-Gaussian Noises based...
Signal Detection in MIMO Communications System with Non-Gaussian Noises based...Signal Detection in MIMO Communications System with Non-Gaussian Noises based...
Signal Detection in MIMO Communications System with Non-Gaussian Noises based...ijwmn
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
NoDig 2016 TM2-T2-02 Final
NoDig 2016 TM2-T2-02 FinalNoDig 2016 TM2-T2-02 Final
NoDig 2016 TM2-T2-02 FinalSiggi Finnsson
 
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...IJMTST Journal
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor NetworksIOSR Journals
 
Wormhole globecom
Wormhole globecomWormhole globecom
Wormhole globecomZep Lao
 
A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...JPINFOTECH JAYAPRAKASH
 
A Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetA Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetIJSRD
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...ijfcstjournal
 

Similar to Mitigation and control of Defeating Jammers using P-1 Factorization (20)

Contemporary Spread Spectrum Techniques: A Comparative Study
Contemporary Spread Spectrum Techniques: A Comparative StudyContemporary Spread Spectrum Techniques: A Comparative Study
Contemporary Spread Spectrum Techniques: A Comparative Study
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI) International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Parallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projectsParallel and-distributed-system-ieee-2014-projects
Parallel and-distributed-system-ieee-2014-projects
 
Parallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 ProjectsParallel and Distributed System IEEE 2014 Projects
Parallel and Distributed System IEEE 2014 Projects
 
Ijetr012022
Ijetr012022Ijetr012022
Ijetr012022
 
SIGNAL DETECTION IN MIMO COMMUNICATIONS SYSTEM WITH NON-GAUSSIAN NOISES BASED...
SIGNAL DETECTION IN MIMO COMMUNICATIONS SYSTEM WITH NON-GAUSSIAN NOISES BASED...SIGNAL DETECTION IN MIMO COMMUNICATIONS SYSTEM WITH NON-GAUSSIAN NOISES BASED...
SIGNAL DETECTION IN MIMO COMMUNICATIONS SYSTEM WITH NON-GAUSSIAN NOISES BASED...
 
Signal Detection in MIMO Communications System with Non-Gaussian Noises based...
Signal Detection in MIMO Communications System with Non-Gaussian Noises based...Signal Detection in MIMO Communications System with Non-Gaussian Noises based...
Signal Detection in MIMO Communications System with Non-Gaussian Noises based...
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
G0261041046
G0261041046G0261041046
G0261041046
 
G0261041046
G0261041046G0261041046
G0261041046
 
NoDig 2016 TM2-T2-02 Final
NoDig 2016 TM2-T2-02 FinalNoDig 2016 TM2-T2-02 Final
NoDig 2016 TM2-T2-02 Final
 
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
Support Recovery with Sparsely Sampled Free Random Matrices for Wideband Cogn...
 
Dq24746750
Dq24746750Dq24746750
Dq24746750
 
3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks3D Localization Algorithms for Wireless Sensor Networks
3D Localization Algorithms for Wireless Sensor Networks
 
Wormhole globecom
Wormhole globecomWormhole globecom
Wormhole globecom
 
A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...A trigger identification service for defending reactive jammers in wireless s...
A trigger identification service for defending reactive jammers in wireless s...
 
Indoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor NetworksIndoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor Networks
 
A Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manetA Secure message exchange and anti-jamming mechanism in manet
A Secure message exchange and anti-jamming mechanism in manet
 
F04 3-3944
F04 3-3944F04 3-3944
F04 3-3944
 
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
 

More from ijcnes

A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...ijcnes
 
Economic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian EconomyEconomic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian Economyijcnes
 
An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...ijcnes
 
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...ijcnes
 
Challenges of E-government in Oman
Challenges of E-government in OmanChallenges of E-government in Oman
Challenges of E-government in Omanijcnes
 
Power Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage SystemPower Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage Systemijcnes
 
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining TechniquesHolistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining Techniquesijcnes
 
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...ijcnes
 
Feature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image RetrievalFeature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image Retrievalijcnes
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computingijcnes
 
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...ijcnes
 
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...ijcnes
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networksijcnes
 
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic VehiclesSecured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic Vehiclesijcnes
 
Virtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor NetworksVirtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor Networksijcnes
 
An analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining TechniquesAn analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining Techniquesijcnes
 
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...ijcnes
 
Priority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSNPriority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSNijcnes
 
Semantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based SystemSemantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based Systemijcnes
 
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...ijcnes
 

More from ijcnes (20)

A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...A Survey of Ontology-based Information Extraction for Social Media Content An...
A Survey of Ontology-based Information Extraction for Social Media Content An...
 
Economic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian EconomyEconomic Growth of Information Technology (It) Industry on the Indian Economy
Economic Growth of Information Technology (It) Industry on the Indian Economy
 
An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...An analysis of Mobile Learning Implementation in Shinas College of Technology...
An analysis of Mobile Learning Implementation in Shinas College of Technology...
 
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
A Survey on the Security Issues of Software Defined Networking Tool in Cloud ...
 
Challenges of E-government in Oman
Challenges of E-government in OmanChallenges of E-government in Oman
Challenges of E-government in Oman
 
Power Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage SystemPower Management in Micro grid Using Hybrid Energy Storage System
Power Management in Micro grid Using Hybrid Energy Storage System
 
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining TechniquesHolistic Forecasting of Onset of Diabetes through Data Mining Techniques
Holistic Forecasting of Onset of Diabetes through Data Mining Techniques
 
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
A Survey on Disease Prediction from Retinal Colour Fundus Images using Image ...
 
Feature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image RetrievalFeature Extraction in Content based Image Retrieval
Feature Extraction in Content based Image Retrieval
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
 
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
Detection of Node Activity and Selfish & Malicious Behavioral Patterns using ...
 
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
Optimal Channel and Relay Assignment in Ofdmbased Multi-Relay Multi-Pair Two-...
 
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor NetworksAn Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
An Effective and Scalable AODV for Wireless Ad hoc Sensor Networks
 
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic VehiclesSecured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
 
Virtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor NetworksVirtual Position based Olsr Protocol for Wireless Sensor Networks
Virtual Position based Olsr Protocol for Wireless Sensor Networks
 
An analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining TechniquesAn analysis and impact factors on Agriculture field using Data Mining Techniques
An analysis and impact factors on Agriculture field using Data Mining Techniques
 
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
A Study on Code Smell Detection with Refactoring Tools in Object Oriented Lan...
 
Priority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSNPriority Based Multi Sen Car Technique in WSN
Priority Based Multi Sen Car Technique in WSN
 
Semantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based SystemSemantic Search of E-Learning Documents Using Ontology Based System
Semantic Search of E-Learning Documents Using Ontology Based System
 
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
Investigation on Challenges in Cloud Security to Provide Effective Cloud Comp...
 

Recently uploaded

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 

Mitigation and control of Defeating Jammers using P-1 Factorization

  • 1. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.50-56 ISSN: 2278-2400 50 Mitigation and control of Defeating Jammers using P-1 Factorization G Krithika 1 , K Kamala 2 1Student, ME-Communication Systems,krithika8793@gmail.com,Valliammai Engineering College,Potheri,Chennai 603203. 2Assistant Professor(OG),kurrakamalareddy@gmail.com,Dept of ECE,Valliammai Engineering College,Potheri, Chennai 603203 .Abstract— Jamming-resistant broadcast communication is crucial for safety-critical applications such as emergency alert broadcasts or the dissemination of navigation signals in adversarial settings. These applications share the need for guaranteed authenticity and availability of messages which are broadcasted by base stations to a large and unknown number of (potentially untrusted) receivers. Common techniques to counter jamming attacks such as Direct-Sequence Spread Spectrum (DSSS) and Frequency Hopping are based on secrets that need to be shared between the sender and the receivers before the start of the communication. However, broadcast anti jamming communication that relies on Pollards Rho Method. In this work, we therefore propose a solution called P-Rho Method to enables spread-spectrum anti-jamming broadcast communication without the requirement of shared secrets. complete our work with an experimental evaluation on a prototype implementation. Keywords—Jamming, Broadcast Communications, Wireless networks. I. INTRODUCTION Wireless communications are vulnerable to intentional interference attacks, typically referred to as jamming. Conventional anti-jamming techniques rely on spread spectrum (SS) communications, such as direct sequence spread spectrum (DSSS) and frequency hopping spread spectrum (FHSS) [17]. DSSS provides bit-level protection by spreading bits according to a secret pseudorandom noise (PN) code, known only to the communicating parties. In FHSS, the sender and the receiver hop synchronously using a secret random frequency hopping (FH) sequence [5], [10], [15]. For jamming-resistant broadcast communications, a common secret to be shared between n the sender and all (potentially non-trustworthy) receiver. The disclosure of this common secret due to the compromise of any receiver nullifies the SS gains [15], [17]. After the studies, Researchers assumed that the jammer cannot flip a bit ‘1’ to a bit ‘0’. It was shown that a jammer cannot erase packets from the wireless channel. They proposed a method called Uncoordinated DSSS (UDSSS) [15] and RD-DSS. We propose the Time-Delayed Broadcast Scheme (TDBS) as an emergency mechanism for temporarily restoring broadcast communications until inside jammers are physically removed from the network. TDBS differs from classical FHSS designs in that two communicating nodes do not follow the same FH sequence, but are assigned unique ones. TDBS is specifically designed to fecilitate broadcasting in the presence of jammers [17], [9], [12] and in the absence of the coordination channel. We further consider the problem of updating the FH sequences of existing nodes when the broadcast group is dynamic. This problem is mapped to the construction of rainbow path of fixed size in proper edge- colored complete. Note that TDBS is not meant as a permanent replacement of the conventional broadcast mechanism. Broadcasting on a common frequency band achieves the optimal communication efficiency in the absence of any jammer. TDBS is designed as an emergency mechanism for temporarily restoring communications until the jammer is physically removed. II. ARCHITECTURE OF THE SYSTEM The architecture diagram shows that the messages in a network are transmitted simultaneously through many paths. While reaching the server the messages are collected and identified the path through which the message is traversed. The path through which the message is delayed while reaching the server is identified and the jammer in that path is located using the JADE mechanism III. WORK DESCRIPTION A. JAMMER To ensure the successful deployment of pervasive wireless networks, it is crucial to localize jammers, since the locations of
  • 2. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.50-56 ISSN: 2278-2400 51 jammers allow a better physical arrangement of wireless devices that cause unintentional radio interference, or enable a wide range of defense strategies for combating malicious jamming attackers. There are many different attack strategies that jammers can perform in order to disrupt wireless communications. It is impractical to cover all the possible jamming attack models that might exist. Thus, we mainly focus on one common type of jammer - constant jammers. Constant jammers continually emit radio signals, regardless of whether the channel is idle or not. Such jammers can be unintentional radio interferers that are always active or malicious jammers that keep disturbing network communication. Besides, we assume each jammer is equipped with an omnidirectional antenna. Thus, every jammer has a similar jamming range in all directions. Identification of jammers' positions will be performed after the jamming attack is detected, and we assume the network is able to identify jamming attacks and obtain the number of jammers. B.NETWORK CLASSIFICATION We classify the network nodes based on the level of disturbance caused by jammers, and identify the nodes that can participate in jammer localization, e.g., the ones that can measure and report the JSS. Essentially, the communication range changes caused by jamming are reflected by the changes of neighbors at the network topology level. Thus, the network nodes could be classified based on the changes of neighbors caused by jamming. We define that node B is a neighbor of node A if A can communicate with B prior to jamming. The network nodes can be classified into three categories according to the impact of jamming: unaffected node, jammed node, and boundary node. C. EVALUATE METRIC Essentially, our jammer localization approach works as follows. Given a set of JSS, for every estimated location, we are able to provide a quantitative evaluation feedback indicating the distance between the estimated locations of jammers and their true locations. For example, a small value of evaluation feedback indicates that estimated locations are close to the true ones, and vice versa. D. SINGLE JAMMER Assume a jammer J located at (xJ, yJ) starts to transmit at the power level of PJ, and m nodes located at {(xi, yi)}i∈[1,m] become boundary nodes. To calculate ez, each boundary node will first measure JSS locally and we denote the JSS measured at boundary node i as Pri. Then the current estimation of the jammer J's location can be calculated. E. MULTIPLE JAMMER Similar to single jammer, we assume n jammers located at {(xJi , yJi )}i∈[1,n] start to transmit at the power level of {PJi }i∈[1,n] separately at the same time, and m nodes located at {(xi , yi )}i∈[1,m] become boundary nodes. To calculate ez, each boundary node measures JSS locally and we denote the JSS measured at boundary node i as Pri which is a combined JSS from multiple jammers. We can include all the variables to be estimated, i.e., current estimation of the n jammers' locations and the transmission powers, calculated in a form of matrix. F. MEASURE JSS Calculating JSS is equivalent to obtaining the average of the Ambient Noise Floor (ANFs), i.e., mean (sa). In most cases, sc = ∅ and sa ⊂ s. In a special case where no sender has ever transmitted packets throughout the process of obtaining n measurements, sc = ∅ and sa = s. The algorithm for calculating the ANF should be able to cope with both cases. A regular node will take n measurements of the ambient noise measurements. It will consider the ANF as the average of all measurements if no sender has trans- mitted during the period of measuring; otherwise, the ANF is the average of sa, which can be obtained by filtering out sc from s. The intuition of differentiating those two cases is that if only jamming signals are present, then the variance of n measurements will be small; otherwise, the ambient noise measurements will vary as different senders happen to transmit. The correctness of the algorithm is supported by the fact that sa is not likely to be empty due to carrier sensing, and the JSS approximately equals to the average. G. BEST ESTIMATION The jammer localization problem can be modeled as a non-linear optimization problem (defined in Problem 1), and finding a good estimation of jammers' locations is equivalent to seeking the solution that minimizes the evaluation feedback metric ez . We use several heuristic search algorithms that rely on guided random processes to approach the global optimum without converging to a local minimum. H.GENETICALGORITHM Genetic algorithms (GA) searches for the global optimum by mimicking the process of natural selection in biological evolution. A GA iteratively generates a set of solutions known as a population. At each iteration, a GA selects a subset of solutions to form a new population based on their "fitness" and also randomly generates a few new solutions. As a result, the "fitter" solutions will be inherited. At the same time, new solutions will be introduced to the population, which may turn out to be "fitter" than ever. As a result, over successive generations, a GA is likely to escape from local optima and "evolves" towards an optimal solution. I. SIMULATED ANNEALING ALGORITHM A simulated annealing algorithm (SA) searches for the optimal solutions by modeling the physical process of heating a material and then controlled lowering the temperature to decrease defects.
  • 3. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.50-56 ISSN: 2278-2400 52 At each iteration, the simulated annealing algorithm compares the current solution with a randomly-generated new solution. The new solution is selected according to a probability distribution with a scale proportional to the temperature, and it will replace the current solution according to a probability governed by both the new object function value and temperature. IV. SIMULATION TOOL NS (version 2) is an object-oriented, discrete event driven network simulator developed at UC Berkely written in C++ and OTcl. NS is primarily useful for simulating local and wide area networks. Although NS is fairly easy to use once you get to know the simulator, it is quite difficult for a first time user, because there are few user-friendly manuals. Even though there is a lot of documentation written by the developers which has in depth explanation of the simulator, it is written with the depth of a skilled NS user.The purpose of this project is to give a new user some basic idea of how the simultor works, how to setup simulation networks, where to look for further information about network components in simulator codes, how to create new network components, etc., mainly by giving simple examples and brief explanations based on our experiences. Although all the usage of the simulator or possible network simulation setups may not be covered in this project, the project should help a new user to get started quickly. NS is an event driven network simulator developed at UC Berkeley that simulates variety of IP networks. It implements network protocols such as TCP and UPD, traffic source behavior such as FTP, Telnet, Web, CBR and VBR, router queue management mechanism such as Drop Tail, RED and CBQ, routing algorithms such as Dijkstra, and more. NS also implements multicasting and some of the MAC layer protocols for LAN simulations. The NS project is now a part of the VINT project that develops tools for simulation results display, analysis and converters that convert network topologies generated by well-known generators to NS formats. Currently, NS (version 2) written in C++ and OTcl (Tcl script language with Object-oriented extensions developed at MIT) is available. Fig.2. Simplified View of NS As shown in Figure in a simplified view, NS is Object-oriented Tcl (OTcl) script interpreter that has a simulation event scheduler and network component object libraries, and network setup (plumbing) module libraries (actually, plumbing modules are implemented as member functions of the base simulator object). In other words, to use NS, you program in OTcl script language. To setup and run a simulation network, a user should write an OTcl script that initiates an event scheduler, sets up the network topology using the network objects and the plumbing functions in the library, and tells traffic sources when to start and stop transmitting packets through the event scheduler. The term "plumbing" is used for a network setup, because setting up a network is plumbing possible data paths among network objects by setting the "neighbor" pointer of an object to the address of an appropriate object. When a user wants to make a new network object, he or she can easily make an object either by writing a new object or by making a compound object from the object library, and plumb the data path through the object. This may sound like complicated job, but the plumbing OTcl modules actually make the job very easy. The power of NS comes from this plumbing. Another major component of NS beside network objects is the event scheduler. An event in NS is a packet ID that is unique for a packet with scheduled time and the pointer to an object that handles the event. In NS, an event scheduler keeps track of simulation time and fires all the events in the event queue scheduled for the current time by invoking appropriate network components, which usually are the ones who issued the events, and let them do the appropriate action associated with packet pointed by the event. Network components communicate with one another passing packets, however this does not consume actual simulation time. All the network components that need to spend some simulation time handling a packet (i.e. need a delay) use the event scheduler by issuing an event for the packet and waiting for the event to be fired to itself before doing further action handling the packet. For example, a network switch component that simulates a switch with 20 microseconds of switching delay issues an event for a packet to be switched to the scheduler as an event 20 microsecond later. The scheduler after 20 microsecond dequeues the event and fires it to the switch component, which then passes the packet to an appropriate output link component. Another use of an event scheduler is timer. For example, TCP needs a timer to keep track of a packet transmission time out for retransmission (transmission of a packet with the same TCP packet number but different NS packet ID). Timers use event schedulers in a similar manner that delay does. The only difference is that timer measures a time value associated with a packet and does an appropriate action related to that packet after a certain time goes by, and does not simulate a delay.NS is written not only in OTcl but in C++ also. For efficiency reason, NS separates the data path implementation from control path implementations. In order to reduce packet and event processing time (not simulation time), the event scheduler and the basic network component objects in the data path are written and compiled using C++. These compiled objects are made available to the OTcl interpreter through an OTcl linkage that creates a matching OTcl object for each of the C++ objects and makes the control functions and the configurable variables specified by the C++ object act as member functions and member variables of the corresponding OTcl object. In this way, the controls of the C++ objects are given to OTcl. It is also possible to add member functions and variables to a C++ linked OTcl object. The objects in C++ that do not need to be controlled in a simulation or
  • 4. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.50-56 ISSN: 2278-2400 53 internally used by another object do not need to be linked to OTcl. Likewise, an object (not in the data path) can be entirely implemented in OTcl. Figure 6.2 shows an object hierarchy example in C++ and OTcl. One thing to note in the figure is that for C++ objects that have an OTcl linkage forming a hierarchy, there is a matching OTcl object hierarchy very similar to that of C++. Fig.3. C++ and OTcl: The Duality Fig.4. Architectural View of NS Figure 8 shows the general architecture of NS. In this figure a general user (not an NS developer) can be thought of standing at the left bottom corner, designing and running simulations in Tcl using the simulator objects in the OTcl library. The event schedulers and most of the network components are implemented in C++ and available to OTcl through an OTcl linkage that is implemented using tclcl. The whole thing together makes NS, which is a OO extended Tcl interpreter with network simulator libraries.This section briefly examined the general structure and architecture of NS. At this point, one might be wondering about how to obtain NS simulation results. As shown in Figure 7, when a simulation is finished, NS produces one or more text-based output files that contain detailed simulation data, if specified to do so in the input Tcl (or more specifically, OTcl) script. The data can be used for simulation analysis (two simulation result analysis examples are presented in later sections) or as an input to a graphical simulation display tool called Network Animator (NAM) . NAM has a nice graphical user interface similar to that of a CD player (play, fast forward, rewind, pause and so on), and also has a display speed controller. Furthermore, it can graphically present information such as throughput and number of packet drops at each link, although the graphical information cannot be used for accurate simulation analysis. Network simulator (NS) is an object–oriented, discrete event simulator for networking research. NS provides substantial support for simulation of TCP, routing and multicast protocols over wired and wireless networks. The simulator is a result of an ongoing effort of research and developed. Even though there is a considerable confidence in NS, it is not a polished product yet and bugs are being discovered and corrected continuously. NS is written in C++, with an OTcl1 interpreter as a command and configuration interface. The C++ part, which is fast to run but slower to change, is used for detailed protocol implementation. The OTcl part, on the other hand, which runs much slower but can be changed very fast quickly, is used for simulation configuration. One of the advantages of this split-language program approach is that it allows for fast generation of large scenarios. To simply use the simulator, it is sufficient to know OTcl. On the other hand, one disadvantage is that modifying and extending the simulator requires programming and debugging in both languages. NS can simulate the following: 1) Topology: Wired, wireless 2) Sheduling Algorithms: RED, Drop Tail, 3) Transport Protocols: TCP, UDP 4) Routing: Static and dynamic routing 5) Application: FTP, HTTP, Telnet, Traffic generators A.NETWORK COMPONENTS This section talks about the NS components, mostly compound network components. Figure shows a partial OTcl class hierarchy of NS, which will help understanding the basic network components. The root of the hierarchy is the Tcl Object class that is the super class of all OTcl library objects (scheduler, network components, timers and the other objects including NAM related ones). As an ancestor class of Tcl Object, Ns Object class is the super class of all basic network component objects that handle packets, which may compose compound network objects such as nodes and links. The basic network components are further divided into two subclasses, Connector and Classifier, based on the number of the possible output DATA paths. The basic network and objects that have only one output DATA path are under the Connector class, and switching objects that have possible multiple output DATA paths are under the Classifier class. Fig.5. OTcl Class Hierarchy
  • 5. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.50-56 ISSN: 2278-2400 54 A.CLASS TCL The class Tcl encapsulates the actual instance of the OTcl interpreter and provides the methods to access and communicate with that interpreter, code. The class provides methods for the following operations: 1.obtain a reference to the Tel instance 2.invoke OTcl procedures through the interpreter 3.retrieve, or pass back results to the interpreter 4.report error situations and exit in an uniform manner 5.store and lookup "TclObjects" 6.acquire direct access to the interpreter. B.OBTAIN A REFERENCE TO THE CLASS TCL INSTANCE A single instance of the class is declared in -tclcl/Tcl.cc as a static member variable. The statement required to access this instance is Tel& tel = Tcl::instance(); C. INVOKING OTCL PROCEDURES There are four different methods to invoke an OTcl command through the instance, tcl. They differ essentially in their calling arguments. Each function passes a string to the interpreter that then evaluates the string in a global context. These methods will return to the caller if the interpreter returns TCL_OK. On the other hand, if the interpreter returns TCL_ERROR, the methods will call tkerror{}. The user can overload this procedure to selectively disregard certain types of errors. 1. Passing Results to/from the Interpreter : When the interpreter invokes a C++ method, it expects the result back in the private member variable, tcl-> result. 2. Error Reporting and Exit: This method provides a uniform way to report errors in the compiled code. D.COMMAND METHODS: DEFINITION AND INVOCATION For every TclObject that is created, ns establishes the instance procedure,cmd{}, as a hook to executing methods through the compiled shadow object. The procedure cmd{} invokes the method command() of the shadow object automatically, passing the arguments to cmd{} as an argument vector to the command() method. The user can invoke the cmd {} method in one of two ways, by explicitly invoking the procedure, specifying the desired operation as the first argument, or implicitly, as if there were an instance procedure of the same name as the desired operation. Most simulation scripts will use the latter form. If matched in this method, it must invoke its parent's command method, and return the corresponding result. This permits the user to conceive of operations as having the same inheritance properties as instance procedures or compiled methods.In the event that this command method is defined for a class with multipleinheritance, one of two implementations can be chosen: 1.Either they can invoke one of the parent's command method, and return the result of that invocation. 2. They can each of the parent's command methods in some sequence, and return the result of the first invocation that is successful. If none of them are successful, then they should return an error. E.MOBILE NETWORKING The wireless model essentially consists of the Mobile Node at the core with additional supporting features that allows simulations of multi-hop ad-hoc networks, wireless LANs etc. The Mobile Node object is a split object. The C++ class Mobile Node is derived from parent class Node. A Mobile Node thus is the basic Node object with added functionalities of a wireless and mobile node like ability to move within a given topology, ability to receive and transmit signals to and from a wireless channel etc. A major difference between them is that a mobile Node is not connected by means of Links to other nodes or mobile nodes.Mobile Node is the basic nsNode object with added functionalities like movement, ability to transmit and receive on a channel that allows it to be used to create mobile, wireless simulation environments. The class Mobile Node is derived from the base class Node. The four ad-hoc routing protocols that are currently supported are, Dynamic Source Routing (DSR), Temporally ordered Routing Algorithm (TORA) and Adhoc On- demand Distance Vector (AODV). F.TRACE ANALYSIS This section shows a trace analysis. Running the TCL script generates a NAM trace file that is going to be used as an input to NAM and a trace file called "out.tr" that will be used for our simulation analysis. Figure shows the trace format and example trace DATA from "out.tr". Where each line in trace file represents an event associated to a packet. G.NETWORK ANIMATOR (NAM) NAM-Tool for viewing network simulation traces and real world packet teaches. It supports topology layout, packet level animation and various DATA inspection tools. Before starting to use NAM, trace file need to be created. This trace file is usually generated by NS. It contains topology information, e.g. nodes and links, as well as packet traces .during a simulation, the user can produce topology configurations, layout information and packet traces using tracing events in NS.Once the trace file is generated, NAM can be used to animate it.Upon startup, NAM will read the trace file, create topology, pop up a window, do layout if necessary and then pause at time 0. Through its user interface, NAM provides control over many aspects of animation. In Figure
  • 6. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.50-56 ISSN: 2278-2400 55 a screenshot of a NAM window is shown, where the most important function are explained. Although the NAM software contains bugs, as do the NS software, it works fine most of the times and times and causes only little trouble. NAM is an excellent first step to check. V. RESULTS AND DISCUSSIONS NS2 is one of the most popular open source network simulators. We conduct the following experiments with NS2.34 simulator.A network is taken into consideration in which 50 nodes are randomly deployed. The time taken for simulation is 30 ms. A.DEPLOYING THE NODES The nodes are deployed in a random manner. The number of nodes deployed are 50 Fig.6. Deploying of Nodes B.COVERAGE AREA The coverage area of the neighboring nodes are identified Fig.7. Coverage area of Neighbouring Nodes C.DETERMINATION OF SOURCE AND DESTINATION NODES The source and destination nodes are identified and marked in different colors Fig.8. Source and Destination nodes Detected D.IDENTIFICATION OF THE ROUTE TO TRANSMIT PACKETS The route between source and destination nodes are identified to transmit packets Fig9. Path Identification E.TRANSMITTING PACKETS AS NICAST TRANSMISSIONS After identifying the path between source and destination nodes the packets are transmitted in unicast transmissions Fig.10. Unicast Transmission F.COMPLETION OF PACKET TRANSMISSION The packets are transmitted successfully even though jammer is present in the network or not
  • 7. Integrated Intelligent Research (IIR) International Journal of Business Intelligents Volume: 05 Issue: 01 June 2016 Page No.50-56 ISSN: 2278-2400 56 Fig 11. Transmission Completed G.PERFORMANCE ANALYSIS GRAPH Performance analysis on delay time is measured between the number of messages and delay time Fig.12. Performance Graph H.ENERGY GRAPH The graph is plotted between the drop rate and the packets Fig.13. Energy Graph VI. CONCLUSION The proposed TDBS is a scheme for jamming-resistant broadcast communications in the presence of inside jammers. In TDBS broadcast is realized as the series of unicast transmissions distributed in frequency and time. Further developed mechanisms for updating the FH sequences assigned to nodes, when the broadcast group is dynamic. It mapped the problem of minimizing the number of FH sequence changes required for node addition. It analytically evaluates the security properties of TDBS under both an external and internal threat model and shows that TDBS maintains broadcast communications even when multiple nodes are compromised.In future to ensure the successful deployment of pervasive wireless networks, it is crucial to localize jammers, since the location of jammers allow a better physical arrangement of wireless devices that cause unintentional radio interference or enable a wide range of defense strategies for combating malicious jamming attackers. It mainly focuses on two types of jammers they are Reactive jammer and Non Reactive jammers which emits radio signals even when the network is idle. REFERENCES [1] Abdel Rahman. M, Rahbari. H and Krunz. M (2012), “Adaptive frequency hopping algorithms for multicast rendezvous in DSA networks,” in Proc. IEEE DYSPAN Symp., pp. 517–528. [2] Adamy. D (2001), EW 101: A First Course in Electronic Warfare. Norwood, MA, USA: Artech House. [3] Andersen. L. D (1989), “Hamilton circuits with many colours in properly edge-coloured complete graphs,” Math. Scandinavica, vol. 64, pp. 5–14. [4] Appel. K and Haken. W (1977), “Every planar map is four colourable: Part I,” Illinois J. Math., vol. 21, no. 3, pp. 491–567. [5] L. C, Bahn. W. L, Collins. M. D, Carlisle. M. C and Butler. S. C (2007), “Keyless jam resistance,” in Proc. IEEE Workshop Inf. Assurance United States Military Acad. [6] Bahl. P, Chandra. R and Dunagan. J (2004), “SSCH: slotted seeded channel hopping for capacity improvement in IEEE 802.11 ad-hoc wireless networks,” in Proc. MOBICOM Conf., pp. 216–230. [7] Bian. K, Park. J and Chen. R (2009), “A quorum-based framework for establishing control channels in dynamic spectrum access networks,” in Proc. MOBICOM Conf., pp. 25–36. [8] Chan. A, Liu. X, Noubir. G and Thapa. B (2007), “Broadcast control channel jamming: Resilience and identification of traitors,” in Proc. ISIT Conf., pp. 2496–2500. [9] Chaporkar. P, Kar. K, Luo. X and Sarkar. S (Feb. 2008), “Throughput and fairness guarantees through maximal scheduling in wireless networks,” IEEE Trans. Inf. Theory, vol. 54, no. 2, pp. 572–594. [10] Chiang. J. T and Hu. Y. C (2008), “Dynamic jamming mitigation for wireless broadcast networks,” in Proc. INFOCOM Conf., pp. 1211– 1219. [11] Dinitz. J. H and Stinson. D. R (1987), “A hill-climbing algorithm for the construction of one-factorizations and room squares,” SIAM J. Algebraic Discrete Meth., vol. 8, no. 3, pp. 430–438. [12] Gupta. A, Lin. X and Srikant. R (Dec. 2009), “Low-complexity distributed scheduling algorithms for wireless networks,” IEEE/ACM Trans. Netw., vol. 17, no. 6, pp. 1846–1859. [13] Ganeriwal. S, Popper. C, Capkun. S and Srivastava. M. B (2008), “Secure time synchronization in sensor networks,” ACM Trans. Inf. Syst. Security, vol. 11, no. 4, p. 23. [14] Gollakota. S and Katabi. D (2008), “Zigzag decoding: Combating hidden terminals in wireless networks,” in Proc. ACM SIGCOMM Conf., pp. 159–170. [15] Liu. S, Lazos. L and Krunz. M (2011), “Thwarting inside jamming attacks on wireless broadcast communications,” in Proc. 4th ACM WiSec Conf., pp. 29–40. [16] Sisi Liu, Loukas Lazos and Marwan Krunz (May/Jun. 2015) “Time- Delayed Broadcasting for Defeating Inside Jammers,” in Proc. IEEE Transactions On Dependable And Secure Computing, Vol. 12, No. 3. [17] [17] Zhang. Y, Yu. G, Li. Q, Wang. H, Zhu. H and Wang. B (Jun. 2014), “Channel hopping-based communication rendezvous in cognitive radio networks,” IEEE/ACM Trans. Netw., vol. 22, no. 3, pp. 889–902.