Seminar Topics & Project Ideas On Computer Science Electronics Electrical Mechanical Engineering Civil MBA Medicine Nursing Science Physics Mathematics Chemistry ppt pdf doc presentation downloads and Abstract

Full Version: Packet Concealing From Discriminating Selective Jamming Attacks Using Prevention Me
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Packet Concealing From Discriminating
Selective Jamming Attacks Using Prevention
Methods


[attachment=68267]

ABSTRACT


— The wireless medium leaves it vulnerable to deliberate interference attacks which is called as jamming.
This deliberate interference with wireless transmissions can be used a rise for mounting Denial-of-Service attacks on
wireless networks. Typically, jamming has been address under an outdoor threat model. Though, adversaries with
internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are
difficult to detect the jamming attack and it is unable to count. The problem of selective jamming attacks in wireless
networks is addressed. The selective jamming attack is defined as the attack in which the adversary is active only for a
short duration period. This type of attack is selectively targeting the messages of high importance. The advantages of
selective jamming in terms of network performance demotion and adversary effort is presented in two case study
methods. First a selective attack is implemented on TCP. Second the selective jamming attacks implemented on
routing. The selective jamming attacks can be explained by performing real-time packet classification at the physical
layer. To reduce the selective jamming attack, the four types of schemes are incorporated that can be prevent real-time
packet classification by combining the cryptographic primitives with physical-layer attributes. The four types of
schemes are Digital Signature Based Transformation (DSBT), All-Or-Nothing Transformations (AONT),
Cryptographic Puzzle Hiding Scheme (CPHS), Strong Hiding Commitment Scheme (SHCS).The security of methods is
tested and this will evaluate the computational and communication overhead.



INTRODUCTION


Wireless Local Area Networks (WLANs) are becoming an increasingly important technology that is bringing
the world nearer together. WLANs are used in all over areas, such as educational area, agriculture area,
pharmaceuticals, manufacturing, transportation, military, and research area. Hence, the importance of Wireless Local
Area Network (WLAN) security is notable. WLANs can provide two types of popular styles. They are client-server
networks and ad-hoc networks. The discrepancy between these two networks is that client-server networks routers or
use access point to transmit data, but ad-hoc networks do not believed on any pre-existing transmitters. For example all
the nodes in an ad-hoc network participate in the routing process by forwarding messages together. According to The
Institute of Electrical and Electronics Engineers (IEEE) 802.11g standards (IEEE Org., 2012) issues some standard
information about the wireless networks. All wireless network nodes transmit data packets in various channels. Since
channels in WLANs are definite by frequencies, they are impressionable to nasty jamming attacks. It is easy for
attackers to perform send more than of useless packets in a specific frequency. Jamming attacks attempt to provide the
system crash by torrent it with unnecessary traffic, and use all the resources in the network so users in the network cannot properly connect to the system. It is consistently used by unauthorized person to break networks and system
performance, because of ease rise and security issues.



PROBLEM FORMULATION


4.1 Existing System
Jamming attacks are much difficult to counter and more security problems rise in this case. They have been
shown to actualize service Denial-of-Service (DoS) attacks against wireless networks. In the simple form of jamming,
the adversary interferes with the entries of messages by transmitting a continuous jamming signal, or more than short
jamming pulses jamming attacks have been considered under an external threat model. In this the jammers is not part of
the network. Below this model, jamming strategies include the continuous or random transmission of high-power
interference signals. So interference occurs easily in transmission medium. And also an eavesdropping occurs, so easily
trusted person original information leakage


.CONCLUSION


The problem of selective jamming attacks in wireless networks is addressed. An internal adversary model is a
model in which the jammer is part of the network under attack, so being aware of the protocol specifications and shared
network secrets. To indicate that the jammer can be classified based on the transmitted packets in real time by decoding
the first few symbols of an ongoing transmission. The impact of selective jamming attacks on network protocols can be
measure by TCP and routing. Particularly the selective jamming attack is selected. The selective jammer can
significantly impact performance with very low effort. To discriminate the selective jammers the four schemes are
proposed to transform the selective jammer to a random one by preventing real-time packet classification. In this
schemes combine cryptographic primitives like as Cryptographic puzzles, commitment schemes and all-or-nothing
transformations (AONTs) with physical layer characteristics along with digital signature technique. The security of
these schemes is maintained and the quantification is made in computational and communication overhead.