NANO SCIENTIFIC RESEARCH CENTRE PVT.LTD., AMEERPET, HYD
WWW.NSRCNANO.COM, 09640648777, 09652926926
JAVA PROJECTS LIST--2013
JAVA IEEE PAPERS
Packet-Hiding Methods for Preventing Selective
Jamming Attacks
Abstract
The
open nature of the wireless medium leaves it vulnerable to intentional
interference attacks, typically referred to as jamming. This intentional
interference with wireless transmissions can be used as a launchpad for
mounting Denial-of-Service attacks on wireless networks. Typically, jamming has
been addressed under an external threat model. However, adversaries with
internal knowledge of protocol specifications and network secrets can launch
low-effort jamming attacks that are difficult to detect and counter. In this
work, we address the problem of selective jamming attacks in wireless networks.
In these attacks, the adversary is active only for a short period of time,
selectively targeting messages of high importance. We illustrate the advantages
of selective jamming in terms of network performance degradation and adversary
effort by presenting two case studies; a selective attack on TCP and one on
routing.We show that selective jamming attacks can be launched by performing
real-time packet classification at the physical layer. To mitigate these
attacks, we develop three schemes that prevent real-time packet classification
by combining cryptographic primitives with physical-layer attributes. We
analyze the security of our methods and evaluate their computational and
communication overhead.
Existing System
Jamming
attacks are much harder to counter and more security problems. They have been
shown to actualize severe Denial-of-Service (DoS) attacks against wireless
networks. In the simplest form of jamming, the adversary interferes with the
reception of messages by transmitting a continuous jamming signal , or several
short jamming pulses jamming attacks have been considered under an external
threat model, in which the jammer is not part of the network. Under this model,
jamming strategies include the continuous or random transmission of highpower
interference signals
Proposed System
In
this paper, we address the problem of jamming under an internal threat model.
We consider a sophisticated adversary who is aware of network secrets and the
implementation details of network protocols at any layer in the network stack.
The adversary exploits his internal knowledge for launching selective jamming attacks in which
specific messages of “high importance” are targeted. For example, a jammer can
target route-request/route-reply messages at the routing layer to prevent route
discovery, or target TCP acknowledgments in a TCP session to severely degrade
the throughput of an end-to-end flow
To
launch selective jamming attacks, the adversary must be capable of implementing
a “classify-then-jam” strategy before the completion of a wireless
transmission. Such strategy can be actualized either by classifying transmitted
packets using protocol semantics, or by decoding
packets on the fly. In the latter method, the
jammer may decode the first few bits of a packet for recovering useful packet
identifiers such as packet type, source and destination address. After
classification, the adversary must induce a sufficient number of bit errors so
that the packet cannot be recovered at the receiver [34]. Selective jamming
requires an intimate knowledge of the physical (PHY) layer, as well as of the
specifics of upper layers
Modules:-
1. Network module
2. Real Time Packet Classification
3.
Selective Jamming Module
4. Strong Hiding Commitment Scheme (SHCS)
5. Cryptographic Puzzle Hiding Scheme (CPHS)
Hardware
Requirements:
•
System :
Pentium IV 2.4 GHz.
•
Hard Disk : 40
GB.
•
Floppy Drive : 1.44 Mb.
•
Monitor : 15
VGA Colour.
•
Mouse : Logitech.
•
Ram :
256 Mb.
Software
Requirements:
•
Operating system :-
Windows XP Professional
•
Front End :-
JAVA, Swing(JFC),RMI
•
Tool :Eclipse 3.3
No comments:
Post a Comment