Project Login
Registration No:
Password:
MAIL ALERTS SMS ALERTS
 
     
   
     

Packet-Hiding Methods for Preventing Selective Jamming Attacks

Platform : java

IEEE Projects Years : 2012 - 13

Packet-Hiding Methods for Preventing

Selective Jamming Attacks

 

Abstract

 

 

 

            The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as Jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks On wireless networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal Knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In this work, we address the problem of selective jamming attacks in wireless networks. In these attacks, the adversary is active only For a short period of time, selectively targeting messages of high importance. We illustrate the advantages of selective jamming in Terms of network performance degradation and adversary effort by presenting two case studies; a selective attack on TCP and one on Routing. We show that selective jamming attacks can be launched by performing real-time packet classification at the physical layer. To Mitigate these attacks; we develop three schemes that prevent real-time packet classification by combining cryptographic primitives With physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication overhead

 

 

 

Existing System

 

                        The jammer was placed within the proximity of one of the intermediate hops of the TCPconnection. Four jamming strategies were considered:

 

 

 

1. Selective jamming of cumulative TCP-ACKs.

 

2. Selective jamming of RTS/CTS messages.

 

3. Selective jamming of data packets.

 

4. Random jamming of any packet.

 

In each of the strategies, a fraction p of the targeted packets is jammed.

 

 

 

TCP performance under jamming of TCP-ACKs can be interpreted by the Congestion control mechanism of the TCP protocol. When Cumulative ACKs are lost (in our case jammed), the sender has to retransmit all unacknowledged data packets, thus increasing the incurred delay while reducing the effective throughput. At the same time, the sender interprets the loss of ACKs as congestion and throttles its packet transmission rate by reducing the size of the transmission window. This leads to a further slow down of the application.

 

 

 

 

 

 

 

 

 

 

 

Proposed System

 

                       

 

Jamming has been addressed under an external threat model. However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In this work, we address the problem of selective jamming attacks in wireless networks. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. We illustrate the advantages of selective jamming in terms of network Performance degradation and adversary effort by presenting two case studies; a selective attack on TCP and one on Routing. We show that selective jamming attacks can be launched by performing real-time packet classification at the physical layer. To Mitigate these attacks; we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication overhead we show that the problem of real-time packet classification can be mapped to the hiding property of commitment schemes, and propose a packet-hiding scheme based on commitments.

 

 

 

System Requirements

 

 

 

Hardware requirement

 

 

 

Processor   :  Pentium IV

 

Speed         :1.1GHz

 

RAM          :512 MB

 

Hard Disk   : 40 GB

 

General Keyboard, monitor, and mouse.

 

 

 

Software Requirement

 

           

 

Operating System: Windows XP

 

Software              :  Net Beans IDE 6.1

 

Front End         : JAVA (JDK 6.1),

 

Back End          : SQL Server 2000

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Module Description

 

@  Authentication

 

@  Registration

 

@  Source

 

@  Packet Separation

 

@  Path Selection

 

@  Packet Hiding

 

@  Destination

 

 

 

Authentication

 

 

 

                        This section is being used to check the username and password to avoid the unwanted users. Here we have to give username and password to enter into the source. It is unique to each user.

 

 

 

Registration

 

 

 

                         This module contains collect the user details and stored in database for authentication purpose.

 

 

 

Source

 

                         Source is performing select file for sending to Destination. The source is identifying to ip address and port number then sends data to destination.

 

Packet Separation

 

                        Files are transferring from source to Destination. During the transmission files are converted into several packets then packet are transferring through transmitter to destination.

 

Path selection

 

This module contains finding jamming attacks immediately applying packet-hiding method. Packet hiding means more un understand format or invisible formatted.

 

Packet Hiding

 

            Packet hiding means covert packet to more un understandable or invisible. This method for preventing packet from Selective jamming Attacks.

 

Destination

 

            Finally packet reaches the destination with out any affection and time delay.

 

Conclusion

 

 We addressed the problem of selective jamming attacks in Wireless networks. We considered an internal adversary model in which the jammed is part of the network under attack, thus being aware of the protocol specifications and shared network secrets. We showed that the hammer can Classify transmitted packets in real time by decoding the first few symbols of an ongoing transmission. We evaluated the impact of selective jamming attacks on network protocols such as TCP and routing. Our findings show that a selective jammed can significantly impact performance with very low effort. We developed three schemes that transform a selective jammed to a random one by preventing real-time packet classification. Our schemes combine cryptographic primitives such as commitment physical-layer characteristics. We analyzed the security of our schemes and quantified their Computational and communication overhead.

 

 

 

 

 

 

 

 



NOW GET PROJECTS ! GET TRAINED ! GET PLACED !

IEEE, NON-IEEE, REAL TIME LIVE ACADEMIC PROJECTS,

PROJECTS WITH COMPLETE COURSES,SOFT SKILLS & PLACEMENTS

ALLOVER INDIA & WORLD WIDE,

HOSTEL FACILITY AVAILABLE FOR GIRLS & BOYS SEPARATELY,

CALL: 08985129129 ,  E-Mail Id: support@ascentit.in

REGISTER FOR PROJECTS NOW ! GET DISCOUNT
   
1