15-02-2013, 11:35 AM
Packet-Hiding Methods for Selective Jamming Attacks
Packet-Hiding.pptx (Size: 108.55 KB / Downloads: 53)
Abstract
The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming.
This Jamming in wireless transmissions cause mounting Denial-of-Service attacks on wireless networks.
However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter.
Problem Statement
When A transmits a packet m to B, node J classifies m by receiving only the first few bytes of m. J then corrupts m beyond recovery by interfering with its reception at B.
We address the problem of preventing the jamming node from classifying m in real time, thus mitigating J’s ability to perform selective jamming.
Existing System
Jamming attacks include the continuous or random transmission of high-power interference signals and the adversary has to jam frequency bands.
We address the problem of jamming under an internal threat model.
The implementation details of network protocols at any layer in the network stack provides specific messages of “high importance” are targeted.
Proposed System
We develop a scheme to prevent real time packet classification by combining cryptographic primitives with physical layer attributes.
The proposed SHCS requires the joint consideration of the MAC and PHY layers.
To achieve the strong hiding property, a sub layer called the “hiding sub layer” is inserted between the MAC and the PHY layers.