Packet-Hiding Methods for Preventing Selective Jamming Attacks
#1

Abstract 

The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. However, adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In this work, we address the problem of selective jamming attacks in wireless networks. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. We illustrate the advantages of selective jamming in terms of network performance degradation and

adversary effort by presenting two case studies; a selective attack on TCP and one on routing.We show that selective jamming attacks can be launched by performing real-time packet classification at the physical layer. To mitigate these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication overhead.
Reply
#2
Wireless local area networks (WLANs) are becoming an increasingly important technology that is approaching the world. WLANs are used in every area, such as education, agriculture, pharmaceuticals, manufacturing, transportation, military, and research. Therefore, the importance of WLAN security is significant. There are two popular WLAN styles: client-server networks and ad-hoc networks. The difference between these two networks is that client-server networks use access points or routers to transmit data, but ad-hoc networks do not depend on any pre-existing transmitter. Instead, all nodes in an adhoc network participate in the routing process by sending messages to each other. According to the Institute of Electronic and Electronic Engineers (IEEE) 802.11g standards (IEEE Org., 2012), all wireless network nodes transmit packets of data in different channels. Since the channels in the WLANs are defined by the frequencies, they are susceptible to malicious interference attacks. It is easy for attackers to manage to send multitudes of useless packets on a specific frequency. Blocking attacks attempt to lock the system by flooding it with useless traffic and use all network resources so that users on the network can not connect to the system. It is constantly used by hackers to break down network systems due to ease and security issues. In this case, sis, clienterver and ad-hoc networks were simulated using the OPNET Modeler simulation tool (OPNET Technologies, Inc., 2012). During the simulation, factors that may influence the simulation result, such as distance, power level and protocols used in ad hoc networks were taken into account.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Secured Data Hiding and Extractions Using BPCS project report helper 4 3,653 04-02-2016, 12:52 PM
Last Post: seminar report asees
  Data Hiding in Binary Images for Authentication & Annotation project topics 2 1,821 06-11-2015, 02:27 PM
Last Post: seminar report asees
  Packet-Hiding Methods for Preventing Selective Jamming Attacks Projects9 5 4,347 30-07-2013, 05:30 PM
Last Post: mounikabujji
  Revisiting Defenses against Large-Scale Online Password Guessing Attacks Projects9 5 3,906 18-03-2013, 12:25 PM
Last Post: computer topic
  A Geometric Approach to Improving Active Packet Loss Measurement full report project topics 2 2,622 09-04-2012, 06:01 PM
Last Post: [email protected]
  Mitigating Selective Forwarding Attacks With A Channel-Aware Approach In Wmns project topics 3 2,012 02-03-2012, 11:05 AM
Last Post: seminar paper
  A New TCP For Persistent Packet Reordering mechanical engineering crazy 2 2,425 01-03-2012, 02:54 PM
Last Post: seminar paper
  COMBINATORIAL APPROACH FOR PREVENTING SQL INJECTION ATTACKS electronics seminars 7 7,312 23-02-2012, 05:05 PM
Last Post: seminar paper
  CONSTRUCTING INTER-DOMAIN PACKET FILTERS TO CONTROL IP SPOOFING BASED ON BGP UPDATES- electronics seminars 2 4,303 20-02-2012, 01:04 PM
Last Post: seminar paper
  Flexible Deterministic Packet Marking: An IP Traceback System to Find the Real Source electronics seminars 12 7,400 15-02-2012, 10:48 AM
Last Post: coimbatore

Forum Jump: