packet-hiding methods: to prevent selective jamming attacks

18
Packet-Hiding Methods: To Prevent Selective Jamming Attacks Presented By Swapnil Salunke

Upload: swapnil-salunke

Post on 22-Nov-2014

1.187 views

Category:

Technology


2 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Packet-Hiding Methods: To Prevent Selective Jamming Attacks

Packet-Hiding Methods:To Prevent Selective Jamming Attacks

Presented BySwapnil Salunke

Page 2: Packet-Hiding Methods: To Prevent Selective Jamming Attacks

1. Introduction

2 Literature Survey

3. Existing System

4. Problem Statement

5. Proposed Work(It's own solution)

6. Conclusion

7. References

Index

Page 3: Packet-Hiding Methods: To Prevent Selective Jamming Attacks

• Vulnerable nature of Wireless Media• Jamming Attacks[1][2]

1)Continuous Jamming

2)Random Jamming

3)Selective Jamming

Introduction

Page 4: Packet-Hiding Methods: To Prevent Selective Jamming Attacks

• Selective Jamming

1) Jams Important Communication

2) Feasible than other Jamming techniques.

3) Difficult to detect[1]

4) Internal Threats compromised with External

Threats

5) Real Time Packet Classification

Cont’d..

Page 5: Packet-Hiding Methods: To Prevent Selective Jamming Attacks

• Current Jamming Attacks[1][2]

• Conventional Anti-Jamming Attacks[3][4]

• Commitment Schemes[7]

• All or Nothing Transformations[5]

Literature Survey

Page 6: Packet-Hiding Methods: To Prevent Selective Jamming Attacks

Paper Name Information Advantages Disadvantage

Jamming and sensing of encrypted wireless ad hoc networks. 2008

Current Jamming attacks description

----- -----

Spread Spectrum Communications Handbook2010

Technique to defend against jamming attacks.

Strong defend against jamming.

Fails for internal threat jamming attack.

Broadcast Anti-Jamming Systems2010

Encrypt packets and send broadcast them.

Best for External Threat Model

Fails against Internal Threat Model , because inside threat may compromise decryption information.

Channel surfing and spatial retreats: defenses against wireless denial of service2011

Advanced Anti -jamming Technique:Move Mobile nodes to safe locations.

Easiest Way to fight against jamming.

Every Time it is not possible to move mobile devices.

Literature Survey

Page 7: Packet-Hiding Methods: To Prevent Selective Jamming Attacks

• Spread Spectrum Communication[3]• Spreading bits according to a secret pseudo-noise (PN) code known only to the communicating parties.• Transmitted Signal is spread to a larger bandwidth

following a PN sequence.• Requires large amount of energy without knowledge

of PN sequence to interfere ongoing transmission.Disadvantage:• Cant Work against Internal Threat Model

Existing Systems

Page 8: Packet-Hiding Methods: To Prevent Selective Jamming Attacks

• Spatial Retreats[4] Working :

1)Detect Interference

2) Exit Interference Region.

3)Move to the No interference Radio Range. • Disadvantages: Each Time it is not possible to get safe area.

Existing System Cont’d..

Page 9: Packet-Hiding Methods: To Prevent Selective Jamming Attacks

• Advantage:

• Jammer cant decode C to get m without d.

• To get d Jammer must receive last symbols of transmitted packets.

• So jammer cant classify packets by reading some initial bits of

packets, so in this way we mitigate ability of jammer to classify

packets.

• Disadvantages:

High Computational work

Exiting System : SCHS

Page 10: Packet-Hiding Methods: To Prevent Selective Jamming Attacks

• Advantages:

• Jammer cant access information required to classify packet

without solving cryptographic puzzles.

• After solving puzzle jammer gets decryption key to decrypt

data.

• Hence CPHS mitigates jammer’s ability of real time

classification.

• Disadvantage : High Computation Work

Existing Scheme : CPHS

Page 11: Packet-Hiding Methods: To Prevent Selective Jamming Attacks

• Based on : All or Nothing Transformation • All or Nothing Transformation: Message m is transformed to pseudo message m’.

A transformation f, mapping message

m = {m1,… …,mx}

to a sequence of pseudo-messages

m′ = {m′1,……..,m′x) is an AONT if

(a) f is bijection function

(b) computationally infeasible to obtain any part of the original

plaintext, if one of the pseudo-messages is unknown

(c) f and its inverse of f are efficiently computable.

Existing Scheme : AONT-based Hiding Scheme

Page 12: Packet-Hiding Methods: To Prevent Selective Jamming Attacks

AONT-HS• Sender1)Compute : m||pad(m)2)Transform: m’=f (m || pad (m))

• Receiver1)Receive m’2) Compute m||pad(m)=f’(m’)3)Recover m

m’

Advantage:Minimum computation power

Wherem={m1,m2,…….,mx}m’={m1’,m2’,……..mx’}

Page 13: Packet-Hiding Methods: To Prevent Selective Jamming Attacks

• Advantages

• Packets are preprocessed i.e. converted to pseudo

messages and transmitted.

• At Jammer side , when Jammer can’t perform

classification until all pseudo messages are received

and inverse transformation applied.

• Hence we mitigate the jammer’s ability of real time

packet classification.

Cont’d..

Page 14: Packet-Hiding Methods: To Prevent Selective Jamming Attacks

• Continuous sending of data in these scheme causes

Packet loss.

Disadvantage of AONT-HS

Page 15: Packet-Hiding Methods: To Prevent Selective Jamming Attacks

• Preventing the jamming node from classifying m in real time, thus mitigating J’s ability to perform selective jamming.

[A-Sender Node ,B-Receiver Node ,J-Jamming Node m-Packets in Wireless media transmitted from A To B]

Problem Statement

Page 16: Packet-Hiding Methods: To Prevent Selective Jamming Attacks

• We proposed a new scheme in which ,we will

overcome disadvantage of AONT and which also

Prevents selective Jamming.

• In these scheme ,packets are send with headers,

sequence ID and the Host name

• And the Data is send directly to the selected host.

Proposed Scheme :Packet Hiding Scheme without packet loss(PHSPL)

Page 17: Packet-Hiding Methods: To Prevent Selective Jamming Attacks

We proposed new scheme : Packet Hiding

Scheme without packet loss(PHSPL)prevents to

mitigate selective jamming attacks , which prevents

jammer from real time packet classification.

Conclusion

Page 18: Packet-Hiding Methods: To Prevent Selective Jamming Attacks

[1] Jamming and sensing of encrypted wireless ad hoc networks. n Proceedings of Mobi Hoc, pages120–130, 2006.

[2]Low-power DoS attacks in data wireless lans and countermeasures. Mobile Computing and Communications Review,7(3):29–30, 2003.

[3] Spread Spectrum Communications Handbook. McGraw-Hill, 2001.[4]Channel surfing and spatial retreats: defenses against wireless denial of

service. In Proceedings of the 3rd ACM workshop on Wireless security, pages 80–89, 2004.

[5] All-or-nothing encryption and the package transform.Lecture Notes in Computer Science, pages 210–218, 1997.

[6] Something about all or nothing (transforms). Designs, Codes and Cryptography, 22(2):133–138, 2001.

[7] Foundations of cryptography: Basic applications. Cambridge University Press, 2004.

[8] Client puzzles: A cryptographic counter measure against connection depletion attacks

References: