27-12-2012, 05:21 PM
PACKET-HIDING METHODS FOR PREVENTING SELECTIVE JAMMING ATTACKS
PACKET-HIDING METHODS.ppt (Size: 3.74 MB / Downloads: 71)
INTRODUCTION
Open nature of wireless medium leaves it
exposed to jamming.
Deliberate interference with radio transmissions in
order to corrupt signal beyond recovery.
Selective jamming attacks
- Selectively targeting messages of high
importance(Control packets).
- Based on real time packet classification and
protocol semantics.
EXISTING TECHNIQUES
Eavesdropping and message injection prevented using cryptographic methods.
Jamming attacks are much harder to counter.
Conventional anti-jamming techniques rely on spread-spectrum(SS) communications.
DISADVANTAGES
Potential disclosure of secrets due to node compromise, neutralizes the gains of SS communications.
SS prevents jamming as long as pseudo noise sequences are kept secret.
Broadcast communications are particularly vulnerable under an internal threat model.
NETWORK MODEL
Preventing the jamming node from classifying m in real time, thus mitigating J’s ability to perform selective jamming.
Nodes communicate directly or indirectly ,in unicast or broadcast mode or unencrypted or encrypted.
REAL-TIME PACKET CLASSIFICATION
Solution to selective jamming is encryption of packets with a static key.
Susceptible to key compromise.
Update static key whenever it is compromised.
Mechanism for identifying set of compromised nodes.
CONCLUSION
Selective jamming attacks are a realistic threat for
present and future wireless networks.
Developed three schemes that prevents real time
packet classification.
Schemes combine cryptographic primitives such as
commitment schemes , cryptographic puzzles and
all-or-nothing transformations with physical layer
characteristics.
Analyzed the security of schemes and quantified their
computational and communication overhead.