27-12-2011, 07:39 PM
Check out the attachment
23-01-2012, 06:48 AM
can any one help me in this project. please upload the content related to this project if any one had it.
10-02-2012, 12:13 PM
Hi sir,
Please can you send me the uml diagram of Denial of Service Attacks in Wireless Networks: The case of Jammers this project, i will feel great full as you have support to pass out my education background Thanks patnaik[at]tammina.com
28-02-2012, 10:26 PM
sir
please send me the ppt n pdf data for the project Denial of service attacks incase of jammers. thanks ishwarya
18-07-2012, 12:01 PM
Denial of Service Attacks in Wireless Networks: The case of Jammers Denial of Service Attacks.pdf (Size: 150.25 KB / Downloads: 80) Abstract The commodity of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. All current research work demonstrates that such attacks can easily be accomplished. For example a jammer can continually transmit a radio signal in order to block any access to the medium by legitimate wireless nodes. Jamming techniques can vary, from simple ones based on the continual transmission of interference signals, to more sophisticated that rely on exploiting the protocol used for communication among wireless devices. In this survey we present a detailed reference to all jamming attacks been recorded in literature since now. In addition, we illustrate various techniques that where introduced in order to detect the presence of an adversary node as well as the mechanisms proposed for protecting the network from such attacks. INTRODUCTION Security is one of the most important issues for every communication network. Various attacks have been recorded through the previous years. Most of the attacks were targeting wired networks since, according to our assessment, wireless networks weren’t that much spread. Today though, with the advances in wireless technology, wireless networks gain more ground day by day. They are becoming more affordable and easier to be built. Many metropolitan areas deploy public WMEN for their citizens to use freely. Moreover, the prevalence of WLANs as the basic access solution to the Internet is rabidly increasing. However, the main disadvantage of wireless networks is that they are much easier to be compromised than any wire-line network. INTELLIGENT JAMMING MODELS The methods presented until now can be thought as naive jamming solutions. This is due to the fact that these jamming models only try to break down the communication between two nodes,without caring about the energy efficiency of the jamming nodes or the easiness of detecting the jammer. However, in addition to physical layer jamming several WDoS techniques can be applied at higher protocol layers. For example in IEEE 802.11 someone can force the backoff window to remain at its maximum or at Bluetooth MAC someone can just destroy some control packets. At the routing level one can inject erroneous or destroy legitimate control routing packets. Similarly, at the transport layer a jammer can force TCP to multiplicative decrease in order to keep the congestion window small. INTRUSION DETECTION SCHEMES The purpose of this work is not to define what an intrusion detection system is and which the various types of them are. Prior works have done extensive work on things of similar issues A good overview of IDSs can be found in [19]. Although IDSs for wired networks have been excessively studied this is not the case for wireless networks. Many of the IDSs implemented for a wired network are signature-based. In wireless networks though, many attacks happen at the MAC layer and thus it is difficult to isolate sequences of packets to use them in such IDSs. In addition to this, if this was possible the power constraints of a mobile user are such that make it relatively difficult to build such a system, which needs to store a great amount of attack signatures. Actually most of the work that has been done until now refers to Intrusion Prevention. By this we mean that most schemes that are proposed, suppose that there is an intruder and there are some solutions given in order to avoid him/her in a transparent way to the user. Following we will present some detection schemes for wireless networks that have been proposed and we will also present some antijamming techniques that exist in the literature. INTRUSION PREVENTION SCHEMES As it was mentioned earlier it is very common in wireless networks to use Intrusion Prevention Systems. Actually these systems are the first line of defense for a wireless network. Many times these systems suppose that there are adversaries at the network and try to avoid them anti-jamming. In the following sub sections we will present some anti-jamming techniques. a) Channel Surfing: This technique has been inspired in some way from the frequency hopping technique. Unlike frequency hopping that takes place at the PHY layer, channel surfing takes place at the MAC layer [6][28]. When a node detects that it is jammed it can switch channel and send a beacon message at the new channelss fequency band. CONCLUSIONS & FUTURE WORK The most important conclusion we derived through our study is that there is no solution that can currently fully address the problem of jamming in wireless networks. What can be done is the construction of an efficient system, which combines most of the techniques described herein. For example, for every antijamming system there should be an efficient detection mechanism accompanying it. The detection can be done in two levels. The first subsystem can operate at the PHY and use the consistency checks that we saw that work very well [5] [6]. |
|