Preventing jamming attack by combining cryptography
-
Upload
rumana-firdose -
Category
Engineering
-
view
138 -
download
1
Transcript of Preventing jamming attack by combining cryptography
Presented by
Anusha H NAvinasha H NNiha Noorain
Syed Musthak K S
Under the guidance ofMrs. Shylaja L.N., B.E., M.Tech.
Associate Professor Department of Information Science and Engineering
Aim
Scope
Objectives
Introduction
Literature Survey
Methodology
Expected Result
References
Gantt Chart
Contents
2
To prevent the selective jamming attack bycombining three cryptographic primitives such asstrong hiding commitment scheme, cryptographicpuzzle hiding scheme and all-or-nothingtransformations scheme.
3
Aim
Project show that selective jamming attacks can be
launched by performing real time packetclassification at the physical layer.
To mitigate these attacks, proposed project developthree schemes that prevent real-time packetclassification by combining cryptographic primitiveswith physical-layer attributes.
4
Scope
Strong Hiding Commitment Scheme (SHCS),
Cryptographic Puzzle Hiding Scheme(CPHS) andAll-Or-Nothing Transformation (AONT) scheme.
This project analyze the security of methods andevaluate their computational and communicationoverhead.
5
Contd…
To prevent the selective jamming attack.
To avoid packet dropouts due to collisions betweenneighboring nodes.
To show that a selective jammer can significantlyimpact performance with very low effort on networkprotocol such as TCP and routing.
To secure the packet transmission in wirelessnetworks.
Objectives
6
“Coping with a Smart Jammer in WirelessNetworks: A Stackelberg Game Approach”[2013]
-Dejun Yang
Technique used: Power Control Smart Jammer game.
Drawback: Jammer improves its utility inUNAWARE condition.
7
Literature Survey
“Denial of Service Attacks in Wireless Network: The
Case of Jammer”.[2011]
-Konstantinos Pelechrinis
Technique used: Intrusion Detection Scheme(IDS)used to detect the attack.
Intrusion Prevention System(IPS) used to preventthe attack.
8
Contd…
“Detection of Jamming Attacks in Wireless Ad Hoc
Networks using Error Distribution”.[2009]
-Ali Hamieh
Technique used: detection by correlation to detectthe jammer.
Drawback: to detect the jamming attack dependencymeasure is needed from all nodes.
There is no technique to prevent selective jammingattack
9
Contd…
“Effects of Denial-of-Sleep attacks on Wireless Sensor
Network mac protocols”.[2009]
-David R. Raymond
Technique used: jamming identification & mitigation,anti-reply protection
Drawback: Transmitted message from a node can easilyread by attacker because message is not encrypted.
Attacker can access any node using received message as aauthorized and make busy state such attacks are selectivejamming attack.
10
Contd…
1. Strong Hiding Commitment Scheme (SHCS)
2. Cryptographic Puzzle Hiding Scheme (CPHS)
3.All-Or-Nothing-Transformation Scheme(AONT)
Methodology
12
Proposing a strong hiding commitment scheme(SHCS), which is based on symmetric cryptography.The main motivation is to satisfy the strong hidingproperty while keeping the computation andcommunication overhead to a minimum.
13
SHCS
Presenting a packet hiding scheme based oncryptographic puzzles. The main idea behind suchpuzzles is to force the recipient of a puzzle execute apre-defined set of computations before he is able toextract a secret of interest.
14
CPHS
Here proposed project send a sequence of pseudomessages corresponding to original messages. Thejammer cannot perform packet classification until allpseudo messages corresponding to the originalpacket have been received and the inversetransformation has been applied.
15
AONT
The Selective Jamming attack will be avoided and the packets will be transmitted safely to the proper
destination
16
Expected Result
1. M. Strasser, C. Po ¨pper, and S. Capkun, “Efficient
Uncoordinated fhss Anti-Jamming Communication,”Proc. ACM Int’l Symp. Mobile Ad Hoc Networking andComputing (MobiHoc), pp. 207-218, 2009.
2. P. Tague, M. Li, and R. Poovendran, “Mitigation ofControl Channel Jamming under Node CaptureAttacks,” IEEE Trans. Mobile Computing, vol. 8, no. 9,pp. 1221-1234, Sept. 2009.
3. B. Thapa, G. Noubir, R. Rajaramanand, and B. Sheng,“On the Robustness of IEEE802.11 Rate AdaptationAlgorithms against Smart Jamming,” Proc. ACM Conf.Wireless Network Security (WiSec), 2011.
References
17