preventing jamming attack by combining cryptography

20
Presented by Anusha H N Avinasha H N Niha Noorain Syed Musthak K S Under the guidance of Mrs. Shylaja L.N., B.E., M.Tech . Associate Professor Department of Information Science and Engineering

Upload: rumana-firdose

Post on 22-Jul-2015

138 views

Category:

Engineering


1 download

TRANSCRIPT

Presented by

Anusha H NAvinasha H NNiha Noorain

Syed Musthak K S

Under the guidance ofMrs. Shylaja L.N., B.E., M.Tech.

Associate Professor Department of Information Science and Engineering

Aim

Scope

Objectives

Introduction

Literature Survey

Methodology

Expected Result

References

Gantt Chart

Contents

2

To prevent the selective jamming attack bycombining three cryptographic primitives such asstrong hiding commitment scheme, cryptographicpuzzle hiding scheme and all-or-nothingtransformations scheme.

3

Aim

Project show that selective jamming attacks can be

launched by performing real time packetclassification at the physical layer.

To mitigate these attacks, proposed project developthree schemes that prevent real-time packetclassification by combining cryptographic primitiveswith physical-layer attributes.

4

Scope

Strong Hiding Commitment Scheme (SHCS),

Cryptographic Puzzle Hiding Scheme(CPHS) andAll-Or-Nothing Transformation (AONT) scheme.

This project analyze the security of methods andevaluate their computational and communicationoverhead.

5

Contd…

To prevent the selective jamming attack.

To avoid packet dropouts due to collisions betweenneighboring nodes.

To show that a selective jammer can significantlyimpact performance with very low effort on networkprotocol such as TCP and routing.

To secure the packet transmission in wirelessnetworks.

Objectives

6

“Coping with a Smart Jammer in WirelessNetworks: A Stackelberg Game Approach”[2013]

-Dejun Yang

Technique used: Power Control Smart Jammer game.

Drawback: Jammer improves its utility inUNAWARE condition.

7

Literature Survey

“Denial of Service Attacks in Wireless Network: The

Case of Jammer”.[2011]

-Konstantinos Pelechrinis

Technique used: Intrusion Detection Scheme(IDS)used to detect the attack.

Intrusion Prevention System(IPS) used to preventthe attack.

8

Contd…

“Detection of Jamming Attacks in Wireless Ad Hoc

Networks using Error Distribution”.[2009]

-Ali Hamieh

Technique used: detection by correlation to detectthe jammer.

Drawback: to detect the jamming attack dependencymeasure is needed from all nodes.

There is no technique to prevent selective jammingattack

9

Contd…

“Effects of Denial-of-Sleep attacks on Wireless Sensor

Network mac protocols”.[2009]

-David R. Raymond

Technique used: jamming identification & mitigation,anti-reply protection

Drawback: Transmitted message from a node can easilyread by attacker because message is not encrypted.

Attacker can access any node using received message as aauthorized and make busy state such attacks are selectivejamming attack.

10

Contd…

“JAMMING”

How does it happen?

Realization of selective jamming attack

11

Fig.1: Jamming Attack

1. Strong Hiding Commitment Scheme (SHCS)

2. Cryptographic Puzzle Hiding Scheme (CPHS)

3.All-Or-Nothing-Transformation Scheme(AONT)

Methodology

12

Proposing a strong hiding commitment scheme(SHCS), which is based on symmetric cryptography.The main motivation is to satisfy the strong hidingproperty while keeping the computation andcommunication overhead to a minimum.

13

SHCS

Presenting a packet hiding scheme based oncryptographic puzzles. The main idea behind suchpuzzles is to force the recipient of a puzzle execute apre-defined set of computations before he is able toextract a secret of interest.

14

CPHS

Here proposed project send a sequence of pseudomessages corresponding to original messages. Thejammer cannot perform packet classification until allpseudo messages corresponding to the originalpacket have been received and the inversetransformation has been applied.

15

AONT

The Selective Jamming attack will be avoided and the packets will be transmitted safely to the proper

destination

16

Expected Result

1. M. Strasser, C. Po ¨pper, and S. Capkun, “Efficient

Uncoordinated fhss Anti-Jamming Communication,”Proc. ACM Int’l Symp. Mobile Ad Hoc Networking andComputing (MobiHoc), pp. 207-218, 2009.

2. P. Tague, M. Li, and R. Poovendran, “Mitigation ofControl Channel Jamming under Node CaptureAttacks,” IEEE Trans. Mobile Computing, vol. 8, no. 9,pp. 1221-1234, Sept. 2009.

3. B. Thapa, G. Noubir, R. Rajaramanand, and B. Sheng,“On the Robustness of IEEE802.11 Rate AdaptationAlgorithms against Smart Jamming,” Proc. ACM Conf.Wireless Network Security (WiSec), 2011.

References

17

Gantt Chart - Schedule for carrying different actvities during project work

18

19

Contd…

20