packet-hiding methods: to prevent selective jamming attacks
DESCRIPTION
TRANSCRIPT
Packet-Hiding Methods:To Prevent Selective Jamming Attacks
Presented BySwapnil Salunke
1. Introduction
2 Literature Survey
3. Existing System
4. Problem Statement
5. Proposed Work(It's own solution)
6. Conclusion
7. References
Index
• Vulnerable nature of Wireless Media• Jamming Attacks[1][2]
1)Continuous Jamming
2)Random Jamming
3)Selective Jamming
Introduction
• Selective Jamming
1) Jams Important Communication
2) Feasible than other Jamming techniques.
3) Difficult to detect[1]
4) Internal Threats compromised with External
Threats
5) Real Time Packet Classification
Cont’d..
• Current Jamming Attacks[1][2]
• Conventional Anti-Jamming Attacks[3][4]
• Commitment Schemes[7]
• All or Nothing Transformations[5]
Literature Survey
Paper Name Information Advantages Disadvantage
Jamming and sensing of encrypted wireless ad hoc networks. 2008
Current Jamming attacks description
----- -----
Spread Spectrum Communications Handbook2010
Technique to defend against jamming attacks.
Strong defend against jamming.
Fails for internal threat jamming attack.
Broadcast Anti-Jamming Systems2010
Encrypt packets and send broadcast them.
Best for External Threat Model
Fails against Internal Threat Model , because inside threat may compromise decryption information.
Channel surfing and spatial retreats: defenses against wireless denial of service2011
Advanced Anti -jamming Technique:Move Mobile nodes to safe locations.
Easiest Way to fight against jamming.
Every Time it is not possible to move mobile devices.
Literature Survey
• Spread Spectrum Communication[3]• Spreading bits according to a secret pseudo-noise (PN) code known only to the communicating parties.• Transmitted Signal is spread to a larger bandwidth
following a PN sequence.• Requires large amount of energy without knowledge
of PN sequence to interfere ongoing transmission.Disadvantage:• Cant Work against Internal Threat Model
Existing Systems
• Spatial Retreats[4] Working :
1)Detect Interference
2) Exit Interference Region.
3)Move to the No interference Radio Range. • Disadvantages: Each Time it is not possible to get safe area.
Existing System Cont’d..
• Advantage:
• Jammer cant decode C to get m without d.
• To get d Jammer must receive last symbols of transmitted packets.
• So jammer cant classify packets by reading some initial bits of
packets, so in this way we mitigate ability of jammer to classify
packets.
• Disadvantages:
High Computational work
Exiting System : SCHS
• Advantages:
• Jammer cant access information required to classify packet
without solving cryptographic puzzles.
• After solving puzzle jammer gets decryption key to decrypt
data.
• Hence CPHS mitigates jammer’s ability of real time
classification.
• Disadvantage : High Computation Work
Existing Scheme : CPHS
• Based on : All or Nothing Transformation • All or Nothing Transformation: Message m is transformed to pseudo message m’.
A transformation f, mapping message
m = {m1,… …,mx}
to a sequence of pseudo-messages
m′ = {m′1,……..,m′x) is an AONT if
(a) f is bijection function
(b) computationally infeasible to obtain any part of the original
plaintext, if one of the pseudo-messages is unknown
(c) f and its inverse of f are efficiently computable.
Existing Scheme : AONT-based Hiding Scheme
AONT-HS• Sender1)Compute : m||pad(m)2)Transform: m’=f (m || pad (m))
• Receiver1)Receive m’2) Compute m||pad(m)=f’(m’)3)Recover m
m’
Advantage:Minimum computation power
Wherem={m1,m2,…….,mx}m’={m1’,m2’,……..mx’}
• Advantages
• Packets are preprocessed i.e. converted to pseudo
messages and transmitted.
• At Jammer side , when Jammer can’t perform
classification until all pseudo messages are received
and inverse transformation applied.
• Hence we mitigate the jammer’s ability of real time
packet classification.
Cont’d..
• Continuous sending of data in these scheme causes
Packet loss.
Disadvantage of AONT-HS
• Preventing the jamming node from classifying m in real time, thus mitigating J’s ability to perform selective jamming.
[A-Sender Node ,B-Receiver Node ,J-Jamming Node m-Packets in Wireless media transmitted from A To B]
Problem Statement
• We proposed a new scheme in which ,we will
overcome disadvantage of AONT and which also
Prevents selective Jamming.
• In these scheme ,packets are send with headers,
sequence ID and the Host name
• And the Data is send directly to the selected host.
Proposed Scheme :Packet Hiding Scheme without packet loss(PHSPL)
We proposed new scheme : Packet Hiding
Scheme without packet loss(PHSPL)prevents to
mitigate selective jamming attacks , which prevents
jammer from real time packet classification.
Conclusion
[1] Jamming and sensing of encrypted wireless ad hoc networks. n Proceedings of Mobi Hoc, pages120–130, 2006.
[2]Low-power DoS attacks in data wireless lans and countermeasures. Mobile Computing and Communications Review,7(3):29–30, 2003.
[3] Spread Spectrum Communications Handbook. McGraw-Hill, 2001.[4]Channel surfing and spatial retreats: defenses against wireless denial of
service. In Proceedings of the 3rd ACM workshop on Wireless security, pages 80–89, 2004.
[5] All-or-nothing encryption and the package transform.Lecture Notes in Computer Science, pages 210–218, 1997.
[6] Something about all or nothing (transforms). Designs, Codes and Cryptography, 22(2):133–138, 2001.
[7] Foundations of cryptography: Basic applications. Cambridge University Press, 2004.
[8] Client puzzles: A cryptographic counter measure against connection depletion attacks
References: