Jamming Prevention by hiding Cryptographic Ancients in the … · 2017-05-08 · MANET becomes the...

14
International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 5 (2017), pp. 767-780 © Research India Publications http://www.ripublication.com Jamming Prevention by hiding Cryptographic Ancients in the MANETs 1 N. Muthyala, 2 V.Kakulapati, 3 VB.Chodavarapu and 4 SR.Kattamuri 1,2,3,4 Sreenidhi Institute of Science and Technology, Yamnampet, Ghatkesar, Hyderabad, Telangana-501301 Abstract MANET becomes the significant system that is providing the world closer collectively. In this kind of system setting there may be further possibilities of assaults. It impacts the system efficiently degrade. Whereas eavesdropping as well as information insertion has prohibited utilizing cryptographic techniques, but selective jamming attacks tend to be difficult to counter (which is selectively launch the attack on TCP packet)? They were revealed in the direction of recognizing significant Denial-of-Service (DoS) assaults towards systems. During the easiest form antagonist prevents the packets which are sent over the wireless system. To conquer the described issue of network traffic as well as efficiency in this work we have viewed a three crypto primitives which uses one of the cryptographic algorithms (DES) that are securely send packets over the system. We are treating the issue of selective jamming attacks using internal threat model and also approach to avoid the real-time packet category of packets by incorporating hiding strategy according to cryptographic ancients. Keywords: Jamming, DOS, address manager, Packet Classification, Time-lock I. INTRODUCTION Wireless systems are computer systems which aren't associated with connections of any type. Wi-Fi allows wireless connection towards the Internet through radio waves instead of cables for a particular host system, the tablet, notebooks or else an equivalent cellular phone. Usage of a Wi-Fi device creates groups to save you the

Transcript of Jamming Prevention by hiding Cryptographic Ancients in the … · 2017-05-08 · MANET becomes the...

Page 1: Jamming Prevention by hiding Cryptographic Ancients in the … · 2017-05-08 · MANET becomes the significant system that is providing the world closer ... decrease openness to the

International Journal of Computational Intelligence Research

ISSN 0973-1873 Volume 13, Number 5 (2017), pp. 767-780

© Research India Publications

http://www.ripublication.com

Jamming Prevention by hiding Cryptographic

Ancients in the MANETs

1N. Muthyala, 2V.Kakulapati, 3VB.Chodavarapu and 4SR.Kattamuri

1,2,3,4 Sreenidhi Institute of Science and Technology, Yamnampet, Ghatkesar, Hyderabad, Telangana-501301

Abstract

MANET becomes the significant system that is providing the world closer

collectively. In this kind of system setting there may be further possibilities of

assaults. It impacts the system efficiently degrade. Whereas eavesdropping as

well as information insertion has prohibited utilizing cryptographic

techniques, but selective jamming attacks tend to be difficult to counter (which

is selectively launch the attack on TCP packet)? They were revealed in the

direction of recognizing significant Denial-of-Service (DoS) assaults towards

systems. During the easiest form antagonist prevents the packets which are

sent over the wireless system. To conquer the described issue of network

traffic as well as efficiency in this work we have viewed a three crypto

primitives which uses one of the cryptographic algorithms (DES) that are

securely send packets over the system. We are treating the issue of selective

jamming attacks using internal threat model and also approach to avoid the

real-time packet category of packets by incorporating hiding strategy

according to cryptographic ancients.

Keywords: Jamming, DOS, address manager, Packet Classification, Time-lock

I. INTRODUCTION

Wireless systems are computer systems which aren't associated with connections of

any type. Wi-Fi allows wireless connection towards the Internet through radio waves

instead of cables for a particular host system, the tablet, notebooks or else an

equivalent cellular phone. Usage of a Wi-Fi device creates groups to save you the

Page 2: Jamming Prevention by hiding Cryptographic Ancients in the … · 2017-05-08 · MANET becomes the significant system that is providing the world closer ... decrease openness to the

768 N. Muthyala, V.Kakulapati, VB.Chodavarapu and SR.Kattamuri

high-priced system of providing connections into systems or as an association around

various tool places. The bases for wireless networks tend to be radio-waves; it

signifies an execution with the intention of happens at the actual stage of system

formation. During the processing time, the name Wi-Fi is used as unclear, as it can

consider various assorted wireless systems. Wireless systems are being a

progressively significant system to facilitate collectively.

Wireless systems are used in areas like agriculture, education, medication,

manufacturing, military, travelling as well as researching. So, the significance of

Wireless systems protection is considerable. The main aim of the communication

system is security attacks have been revealed over the past several years.

802.11 radio wireless operations is one of the Ad-hoc models. Here, we are

conceptualizing Wireless networks with mobile – Ad-hoc network by implementing

distributed address manager which is the dynamic configuration of systems when

systems are in mobile condition. It occurs at OSI layer [1], the physical layer, and it

fundamentally implies that all gadgets can convey specifically to whatever the other

device that is inside radio range. Ordinarily, in Infrastructure mode, remote devices

can just speak with a focal Access Point or Router and that device is in charge of re-

transmitting parcels starting with one customer device then onto the next customer

device (regardless of the possibility that they are ideal between each other).

Ad-Hoc networks dispose of the center man that is the AP; however, they don't have

any intrinsic capacity for the multi-bounce. That implies, if the device A can achieve

the device B, and device B can achieve the device C, however A can't achieve C, then

A and C can't convey in light of the fact that B won't re-transmit any parcels. A

MANET is the infrastructure less type of a wireless Mesh Network. The clients

(every one of the hubs have similar capacities concerning the system operation, i.e.

there is no hub that is in control for verification or security administrations, for

instance) don't have multi hop capacity.

In WMN, there could be the infrastructure type where packets are being routed, using

not only hop metrics but also other metrics for path selection. And some WMN

operate in hybrid such that the network develops the hub’s repetition of hubs and the

self-arranging system worldview to defeat a few issues that are natural to remote

systems (tradeoff amongst separation and exchange rates) or to systems when all is

said in done (congestion, design and establishment costs).

MANETs are exceptionally vulnerable to DoS assaults [2, 3]. DoS assaults are

classified as an assault with the objective of blocking trustworthy users from utilizing

a certain system resource like a website, web service, or computer system. The

wireless connection channel is a broadcast network, revealing the physical layer of

wireless connection to jamming [4]. Previous research has mainly aimed at protecting

voice interaction with spread spectrum strategies [5]. The SS strategies incorporate

bit- level security by distributing bits based on an undisclosed pseudo-clatter (PC)

rule, recognized just before interacting parties. Strategy spreads the transmission into

an extremely significant frequency band as well as creates a jammer with constrained

energy sources not able to allow jamming the whole band. Such techniques only

Page 3: Jamming Prevention by hiding Cryptographic Ancients in the … · 2017-05-08 · MANET becomes the significant system that is providing the world closer ... decrease openness to the

Jamming Prevention by hiding Cryptographic Ancients in the MANETs 769

preserve wireless attacks using the external threat system. Non-continuous jamming

exclusively leads to an elegant destruction of voice excellence. So, this strategy is

efficient to preserve voice interaction towards jamming.

II. RELATED WORK

Timothy et.al [6] handles issue of an aggressor intruding on an encoded target remote

specially appointed framework with sticking. Jamming is requested with layers

furthermore this archive concentrates on Jamming inside the Transport or Network

layer. Jamming in the mid of this layer misuses AODV and furthermore TCP models

like manner is revealed to be best in reenacted as well as significant systems when it

may sense target packet kinds, however encryption is presumed to hide the complete

header than well as information of the packet to ensure just sachet range, point in

time, also the series is designed in the direction of the goon for sensing. A sensor

would be created that contains four components.

The first will be a probabilistic arrangement of sizes and in addition between bundle

snapshots of different packet sorts. The second will be a verifiable strategy for

identifying perceived convention arrangements that will be used to make probabilistic

frameworks, the third will be a compelling jamming strategy to constrain the

objective framework to produce uncovered groupings towards chronicled analyzer,

and furthermore the fourth will be the web classifier which makes bundle sort

classification measures. The system is assessed on live data and uncovered that for

different packet sorts the class is to a great degree dependable. The relative

components of size, timing, the likewise arrangement have a tendency to be furnished

with suggestions for producing frameworks significantly secure.

M. Cagalj, et.al [7] With their incredibly quality, wireless sensor systems are

definitely the more susceptible concept of wireless systems with "radio channel

jamming"- based DoS strikes: A foe may easily conceal the exercises that the sensor

system may decide by furtively jamming an important division with the hubs; like

this, he hinders them to depict what basically detecting to the system administrator.

Consequently, despite the fact that the reality an occasion will be detected by one or

numerous hubs (likewise the sensor system is totally related), the system

administrator can't be updated opportune. This archive uncovered how the sensor hubs

may utilize the channel differing qualities being decide wormholes from the jammed

area, by which a caution might be sent to the system administrator. Three remedies

are recommended: 1. Indicated by wired arrangements of sensors; 2. Relies on upon

recurrence, bouncing, and furthermore 3. A novel approach clumsy system jumping.

Loukas Lazos et. al., [8] handles the issue of organize-divert congestion ambushes in

multi-feed Ad-hoc systems. Veering off with the customary viewpoint which

considers jamming strikes as physical-layer defenselessness, we pick a propelled

opponent who misuses data for the model perspectives utilizing cryptographic

amounts taken from influenced hubs to improve the effect of his attack on higher-

layer highlights.

Page 4: Jamming Prevention by hiding Cryptographic Ancients in the … · 2017-05-08 · MANET becomes the significant system that is providing the world closer ... decrease openness to the

770 N. Muthyala, V.Kakulapati, VB.Chodavarapu and SR.Kattamuri

This paper proposes novel safety analytics which survey the facility of the enemy to

decrease openness to the control network, additionally the general delay managed in

re-building up the control network. They even recommended a randomized

administered technique that empowers hubs to decide another control station using

frequency jumping. Our procedure changes from conventional frequency jumping

where no two hubs uncover the comparable bouncing grouping, subsequently

relieving the impact of hub holding back. Also, a hacked hub is particularly decided

with its bounce arrangement, bringing about its confinement from each potential

information identifying with the recurrence range of the control network.

III. OUR APPROACH

The issue of jamming using an internal threat design may contemplate. Antagonist

who knows network techniques also the application information of the set of

connection prototypes by every layer in the system load up may prepare. The

opponent adventures the internal comprehension for setting up specific jamming

attacks wherein specific data of "high significance" are engaged. A jammer may

concentrate on route request/reply data with the routing layer to limit route revelation,

or preferred TCP affirmations inside a TCP method to fundamentally debase the

throughput on the end-to-end stream. Target this issue we suggested three strategies

that incorporate encryption methods to conceal the packets from jammer. Also

packets are sent to the recipient along with privacy with no packet loss.

III. A. CONNECTION MODULE

The set of connections incorporates a set of hubs associated using Wi-Fi with

implementation of distributed address manager. Designing of the network is done 3x3

matrixes with the fixed number of nodes. Each block of matrix is consisting of 10

nodes and network gateway (router). All nodes are in mobile condition but network

router is fixed in certain location.

Each block is the representing autonomous system. Hubs can interface specifically in

the event that they are inside cooperate with each other extended or in a roundabout

way utilizing various bounces. Nodes interact together in the unique method as well

as transmit method. Interactions may be whether decoded or encoded. If any node is

moving from one autonomous network to another, dynamic configuration is creating

by the distributed address manager. Dynamic configuration such as ip address, care-

of-address, subnet mask. Distributed address management is required due to lack of

central administration and host mobility in MANETs.

To ensure the right functioning of the system, the conventions endeavor to accomplish

the accompanying targets:

Allocate exclusive IP addresses: Ensure that at least two hubs don't get a

similar IP address.

Page 5: Jamming Prevention by hiding Cryptographic Ancients in the … · 2017-05-08 · MANET becomes the significant system that is providing the world closer ... decrease openness to the

Jamming Prevention by hiding Cryptographic Ancients in the MANETs 771

Task accurately: An IP address is just connected with a hub for the time that it

is kept in the system. At the point when a hub leaves the system, its IP address ought

to then got to be distinctly accessible for the relationship to another hub.

Fix the issues derived from the loss of messages: In the event of any hub

disappointment or if message misfortune happens, the convention ought to work

sufficiently snappy to keep at least two hubs from having a similar IP address

Allocate multi-jump routing: A hub won't be designed with an IP address if

there aren't any accessible in the entire system. Accordingly, if any hub of the system

has a free IP address, it needs to connect itself with the hub which is asking for an IP

address, despite the fact that it is at two-bounces of separation or more.

Reduce the supplementary sachet passage in the network: The convention

must limit the quantity of packets traded among the hubs in the auto-design prepare.

As it were, the control packet movement must bring about as meager damage as

conceivable to information bundle activity, given that in the extraordinary case, the

system execution would diminish.

Confirm the survival of competing requests for an IP address: At the point

when two hubs ask for an IP address in the meantime, the convention must do the

correlated treatment so that a similar IP deliver is not given to two hubs.

Be adaptable to apportioning and converging with the versatile mobile ad hoc

system: The convention must have the capacity to accomplish the union of two

diverse portable impromptu systems and also the conceivable parceling into two

networks.

Perform management: The convention must adjust to the quick changes of the

remote system topology because of the successive portability of the hubs. The

synchronization is done occasionally to guarantee the setup of the system is as the

breakthrough as could be expected under the circumstances.

Fig 3.1: Conceptual Diagram of MANETs

For encoded broadcast interactions, symmetric keys tend to be provided among each

desired recipients. All these keys are produced utilizing pre distributed match savvy

keys or lopsided cryptography. Our implementation is done similar to cellular

networks.

Page 6: Jamming Prevention by hiding Cryptographic Ancients in the … · 2017-05-08 · MANET becomes the significant system that is providing the world closer ... decrease openness to the

772 N. Muthyala, V.Kakulapati, VB.Chodavarapu and SR.Kattamuri

III. B. Adversary Module

Adversary is in the treatment of the association channel likewise may jam writings at

each part of the arrangement of finding. The foe could continue running in full-duplex

mode, thusly to get and furthermore transmit all the while. This may be proficient, for

instance, with the utilization of multi-radio handsets.

The foe is outfitted with directional accepting wires which allow the response of a

banner from the single center point, and furthermore jamming of the equivalent signal

at the other. It is accumulated which foe may star effectively jam a measure of bits

just underneath the ECC ability in front of schedule in the sending. Once the foe is

revealed, data packets with the hub shouldn't be gotten to at beneficiary

III.C. Synchronized sachet classification

With the Physical layer, a sachet m will be prearranged, interrupted, and moreover

directed when it is sent in the midst of the remote framework. With the recipient, the

signal will be demodulated, de-interleaved and moreover deciphered to restore the

hidden package m. Hubs A and furthermore B interface through remote affiliation.

Inside the affiliation gathering of both A and moreover B there will be a jamming hub

J. Once A sends a packet m to B, hub J shows m by receiving just the underlying

couple of bytes of m. J maybe taints m facilitate change by upsetting with its reaction

at B

III.D. Dedication Method based Sturdy Hiding (SHDM)

This is as indicated by symmetric cryptography. It delivers a sturdy hiding feature

while maintaining the calculation as well as the connection elevated to a minimal. The

SHDM component will be executed. Initially, cryptographic keys can be provided

with any cryptographic algorithm such as DES.

Subsequently the information is split into packets also these packets tend to be

encrypted utilizing the newly produced key. After that many bits will be included

using encrypted information as padding procedure to hide the identity of the

information. Well the information is permutated as well as transmitted to the choice

node. The cryptographic key is renewed regularly to hide the key with the jammer

node.

Page 7: Jamming Prevention by hiding Cryptographic Ancients in the … · 2017-05-08 · MANET becomes the significant system that is providing the world closer ... decrease openness to the

Jamming Prevention by hiding Cryptographic Ancients in the MANETs 773

Fig 3.2: Module Diagram of SHDM

Padding as well as Permutation tends to be two functions which can be used in the

message. Initially, the message will split into various packets; likewise every packet

encoded with subjective key qualities. This key value can be altered regularly to

maintain the key values hidden with adversaries. The subsequent step is padding. At

this time certain bits tend to be included in the encoded data to change the data.

Lastly, the information will be permuted as well as submit to the destiny. Following

attacker efforts to prevent the packets however, doesn't block as packets encoded.

III. D. a. Implementation details of SHDM

Considering, the correspondent S has Sachet P for R. S computes (C, d) = entrust (P), Where,

C = Ek (π1(P)), d = k.

The dedication work Ek() is an off-the-shelf algorithm. Here we are taking symmetric

algorithm (e.g., DES), π1 is a known change, and k ∈ {0, 1}s is an arbitrary key.

Now sender broadcasts (C||d). After receiving of d, receiver R constructs

P = π1−1 (Dk(C)) Where π1−1 is contrary variation of π1. Packet carrying d is modulated in the last

physical layer symbol to satisfy hiding property.

Decoding of last symbol is required for the transmitted packet to recover d.

MAC and PHY layers both are needed to SHDM implementation.

SHDM

Encrypte

d data

Sender

Messag

e

Mess

Generat

ed

random

key

Receiv

er

Decrypt

ed

Messag

e

Page 8: Jamming Prevention by hiding Cryptographic Ancients in the … · 2017-05-08 · MANET becomes the significant system that is providing the world closer ... decrease openness to the

774 N. Muthyala, V.Kakulapati, VB.Chodavarapu and SR.Kattamuri

Fig 3.3: Diagram for the procedure of the hiding sub layer.

Assume a frame P which is at MAC layer. Frame P contains MAC header and the

payload, which is trailing by the CRC code. Firstly, P is permuted and Processing is

done at the hiding sub layer. After the transformation, π1(P) is encrypted by using a

arbitrary key k i.e.,

C = Ek (π1(P)). Secondly, a padding function pad () applied, creating a symbol size of multiple size.

At last C||pad(C) ||k is changed by using a recognized combination π2.

Objective of π2 is to demonstrate that interleaving capacity connected at the physical

layer don't change the bits of k to various symbols.

Thirdly, a padding function pad () applied, creating a symbol size of multiple size. At

last C||pad(C)||k is changed by using a recognized combination π1.

Objective of π3 is to demonstrate that interleaving capacity connected at the physical

layer don't change the bits of k to various symbols.

III. E. Hiding Scheme based Cryptographic riddle

Cryptographic riddles can be the ancients at first proposed by Merkle as a procedure

for making a key in excess of a helpless transmission feed. Pick an assortment of

projects from controlling Denial of Service strikes to providing communicate check

and in addition key secure systems. In according to hiding strategy, cryptographic

riddle features known as the time lock challenge is utilized. The key idea regarding

these puzzles will be to compel the receiver of a riddle execute a predefined number

of calculations prior to capable of drag an undisclosed of consideration.

Page 9: Jamming Prevention by hiding Cryptographic Ancients in the … · 2017-05-08 · MANET becomes the significant system that is providing the world closer ... decrease openness to the

Jamming Prevention by hiding Cryptographic Ancients in the MANETs 775

The required time for getting the cure of a problem relies on upon its hardness and

furthermore the strategy capacity of the solver. The upside of bewilder subordinate

system is that it's steady quality can't depend on upon the PHY layer necessities

III. E. i. Implementation details of CRHS

Let’s, packet m is encrypted with any sized key k ∈ {0, 1}s We are taking symmetric

encryption algorithm as earlier mechanism. Now the key k is combined by using

cryptographic riddle P = riddle (k, tp), here tp is time required for solving the riddle.

Sender will broadcast (C,P) where

P = riddle (k, tp) and C = Ek (π1 (m)) Now at recipient side, R need to solve P to get k' and then

m' = π1(Dk'(C')) Because of computationally bounded, jammer cannot solve cryptographic riddle

before the transmission of packet m which is completely encrypted. Hence, the

classification of packet m is not possible for performing selective jamming.

Correspondent S Recipient R

C,P

Time-lock riddles– Time-lock riddles, designed by Rivest [9] based on the iterative

controlled number of module operation. Several attractive features i.e., well grains in

organizing tp and the chronological calculation is used.

In such time-lock puzzle, a compound modulus is generated

g = u * v Where u, v are two primary digits randomly taken. By selectting arbitrary values of a

i.e. 1 < a < g and conceals the key K= k + a2t mod g

Where t = tp *N, is needed time to answer k. Assumption made by calculating the N2

module g /sec. K can be calculated

if φ(g) = (u − 1)(v − 1) Otherwise the attacker may have to calculate all t2 to get k. The riddle contains this

assessment P = (g, K, t, a)

Produce: k, tp P = riddle (k, tp ) C = Ek(π1 (m))

C', P'

k' = solve (P) Calculate

m' = π1(Dk (C')) verify: m' is meaningful if not: discard m'

Page 10: Jamming Prevention by hiding Cryptographic Ancients in the … · 2017-05-08 · MANET becomes the significant system that is providing the world closer ... decrease openness to the

776 N. Muthyala, V.Kakulapati, VB.Chodavarapu and SR.Kattamuri

III. F. Transformation based All-or-nothing

Such type of transformation is used to minimize the brute force attack. It is

preprocessing step and completely irreversible process such that after data is passed to

block encryption. Minimization of brute force is directly proportional to the number

of cipher blocks.

Packet is fragmented with bisection function then encrypted with the pool of keys.

III. F. i. Implementation details of AONT-HS

Assume sachet m is fragmented just before the set of y key chunks, m = {m1, . . . , my},which act as input to an AONT

f : {Fu}y → {Fu}y′ Here, Fu indicates the alphabet of blocks mi and y′ is the number of output i.e y ′ ≥ y.

Therefore, a set of artificial-messages m′ = {m′1, . . . ,m′y′} is transmitted. And at

the receiver, the contrary alteration f−1 is applied to pull through m. AONT can be

implemented two ways: a linear transformation [10], and the novel parcel

transformation [11]. We implemented the parcel alteration in our project due its

efficiency and less computational overhead.

Package Transform–In package transform designed by Rivest [11], message m, and

random key k′, and the output are calculated as follows:

m′i = mi ⊕ Ek′ (i), for i = 1, 2, . . . , y

m′y+1 = k′ ⊕ e1 ⊕ e2 ⊕ …….⊕ ey

Where ei = Ek0 (m′i ⊕i), for i = 1, 2, . . . , y and k0 is a fixed publicly known key.

After the receiving all pseudo-messages m is calculated as follows:

k′ = m′x+1 ⊕ e1 ⊕ e2 ⊕……… ⊕ ey

mi = m′i ⊕ Ek′ (i), for i = 1, 2, . . . , y If m′i is unknown, then any value of k′ is possible, as the corresponding ei is not

guessed. Hence, Ek′ (i) cannot be calculated for any i.

IV. EXPERIENMENTAL RESULTS

In this Paper, we obtain applied Client server teen. We utilized mxml for creating

GUI. We have generated a client server program that might be implemented in the

network, where in the client may deliver data to server as well as server get the data in

a protected manner. We examined the preventive jamming assaults using three special

cases like Sturdy Hiding Dedication Method, Cryptographic Riddle, and All-or-

nothing transformation. Whenever a sender needs to deliver a data to the recipient, the

transmitter encrypts the information also delivers in a protected manner.

Page 11: Jamming Prevention by hiding Cryptographic Ancients in the … · 2017-05-08 · MANET becomes the significant system that is providing the world closer ... decrease openness to the

Jamming Prevention by hiding Cryptographic Ancients in the MANETs 777

Here is a strategy utilized for hiding the data that are Dedication Method according to

jamming anticipation by crypto mechanism. The packet concealing strategies will be

implemented to deliver information by preventing jamming attack.

Fig 4.1: The network model, executions of all algorithms are done on this layout

IV.A. Jamming Analysis

At first, experiment is executed without any prevention mechanism and number of

jammers performing attacks is shown on the log file. We plotted the graph (like

jamming probability, jamming the succession rate & jamming distribution graph by

various jammer node) by analyzing the table over repeated experiments.

Table 1: Probability & success rate against various test cases

No. of test cases Jam Succeed Jamming Probability

( þ)

Jamming Succession

Rate( µ%)

5 2 2.4 40

6 4 1.4 66.6

7 3 2.333 42.85

8 5 1.7 62.5

Page 12: Jamming Prevention by hiding Cryptographic Ancients in the … · 2017-05-08 · MANET becomes the significant system that is providing the world closer ... decrease openness to the

778 N. Muthyala, V.Kakulapati, VB.Chodavarapu and SR.Kattamuri

Fig 4.2: Graph for Jamming Probability

Fig 4.3: Graph for Jamming Success Rate

IV.B. Analysis of three Crypto mechanisms

Efficiency graph is generated of three mechanisms by considering the values on over

only three experiments.

Table 2: Time (millisecond) taken by three mechanisms

Experiment

Number

SHDM (milli sec) CRHS (milli sec) AONT (milli sec)

1 1 2 3

2 1 1 2

3 1 1 3

Page 13: Jamming Prevention by hiding Cryptographic Ancients in the … · 2017-05-08 · MANET becomes the significant system that is providing the world closer ... decrease openness to the

Jamming Prevention by hiding Cryptographic Ancients in the MANETs 779

Fig 4.4: Efficiency Graph

Since, complexity prevention mechanism increases, which leads to decrease in

efficiency.

Efficiency order: SHDM > CRHS > AONT

SHDM is most efficient and AONT is least efficient among three mechanisms.

V. CONCLUSIONS

The issue of selective jamming assaults in build threat design is regarded. Over here

jammer will be the aspect of the system under assault, therefore learning the protocol

requirements as well as provided network secrets. To prevent packet categorization in

wireless communication, we suggested three techniques like persistence strategy,

according to SHDM also no Prevention on cryptographic challenge. Such three

strategies prevent the jammer with preventing the packets which is sent over the

wireless system to ensure the data attains the recipient with no faults.

VI. FUTURE SCOPE

In this paper we analyzed the various prevention mechanisms and comparison of

efficiency different mechanisms, we also discussed about security issues in Jamming

prevention mechanism. In the future, we will concentrate on finding more efficient

methods against the other kind of jamming attacks by considering the wireless

network, the internet of things and other countermeasure of physical attacks.

REFERENCES

[1] Alejandro Proan~o and Loukas Lazos,” Packet-Hiding Methods for Preventing

Selective Jamming Attacks”, ieee transactions on dependable and secure

computing, vol. 9, no. 1, january/february 2012

Page 14: Jamming Prevention by hiding Cryptographic Ancients in the … · 2017-05-08 · MANET becomes the significant system that is providing the world closer ... decrease openness to the

780 N. Muthyala, V.Kakulapati, VB.Chodavarapu and SR.Kattamuri

[2] L. Lazos, S. Liu, and M. Krunz. Mitigating control-channel jamming attacks in

multi-channel ad hoc networks. In Proceedings of the 2nd ACM conference on

wireless network security, pages 169-180, 2009.

[3] G. Noubir and G. Lin. Low-power DoS attacks in data wireless lans and

countermeasures. Mobile Computing and Communications Review,7(3):29-30,

2003.

[4] M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. Levitt. Spread Spectrum

Communications Handbook. McGraw-Hill, 2001.Y. Desmedt. Broadcast anti-

jamming systems. Computer Networks,35(2-3):223-236, February 2001

[5] M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. Levitt. Spread Spectrum

Communications Handbook. McGraw-Hill, 2001.

[6] T. X. Brown, J. E. James, and A. Sethi. Jamming and sensing of encrypted

wireless ad hoc networks. In Proceedings of MobiHoc, pages120-130, 2006.

[7] M. Cagalj, S. Capkun, and J.-P. Hubaux. Wormhole-based antijamming

techniques in sensor networks. IEEE Transactions on Mobile Computing,

6(1):100-114, 2007.

[8] L. Lazos, S. Liu, and M. Krunz. Mitigating control-channel jamming attacks in

multi-channel ad hoc networks. In Proceedings of the 2ndACM conference on

wireless network security, pages 169-180, 2009.

[9] R. Rivest, A. Shamir, and D. Wagner. Time-lock puzzles and timed release

crypto. Massachusetts Institute of Technology, 1996.

[10] D. Stinson. Something about all or nothing (transforms). Designs, Codes and Cryptography, 22(2):133–138, 2001.

[11] R. Rivest. All-or-nothing encryption and the package transform. Lecture Notes in Computer Science, pages 210–218, 1997.