Performance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming Attacks in WLAN
|
|
- Oswald Owen
- 5 years ago
- Views:
Transcription
1 IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 02 July 2016 ISSN (online): Performance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming Attacks in WLAN Parikh D A Dr. Wandra K. H. PG Scholar Principal Department of Computer Engineering Department of Computer Engineering L D College Of Engineering Ahmedabad(Guj) India C U Shah Engineering College, Wadhawan City (Guj)India Abstract Jamming is always an issue in wireless network. An internal threat model of wireless network is vulnerable to the selective jamming attacks. In these attacks, the adversary node with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. The adversary node is active only for short period of time and selectively targets specific packets of high importance by exploiting his knowledge on the implementation details of network that leads network performance degradation. To reduce this attack, we develop an algorithm that prevents real-time packet classification by combining cryptographic primitives with physical-layer attributes. In NS2 simulation environment, we analyze the effects of AODV, DSDV and DSR routing protocol on selective jamming attacks and prevention of these attacks in wireless network by our proposed algorithm. The performance of network analyzed in terms of various performance parameters like packet delivery ratio (PDR), packet loss ratio (PLR), end to end delay (E2E). Keywords: Selective Jamming, Internal Threat Model, Routing Protocol, PDR, PLR I. INTRODUCTION In Wireless Network, Anyone with a transceiver can eavesdrop on wireless transmissions, inject spurious messages, or jam legitimate ones. A Wireless communication standard such as IEEE and Bluetooth are easy targets of DoS attacks.other wireless data standards that make use of error-correction codes are also not secured. Jamming attacks have been considered under an external threat model, in which the jammer is not part of the network. At present, anti-jamming systems rely on an extensive use of spread-spectrum techniques. These techniques separately protect bits against jammers. They are used in voice communication where the jammer has to keep jamming the channel to prevent a communication. Our work aims at building antijamming techniques, used at the bit level to protect data packets from jamming. In the context of internal threat model, a small number of smart jammers located across a geographical area can last for a long period of time with limited energy. The adversary node sends the continuous or random transmission of high- power interference signals. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. The adversary nodes can stay in sleep mode most of the time and be triggered to jam some communication between specific nodes. In this case, the attackers would only wake-up to detect some MAC/IP address and, if needed, jam only few bits of the packet to destroy. The attacking nodes receivers can be designed to consume very little energy even if anti-jamming techniques, such as spread-spectrum, are used, the substantial gain achieved by having to jam only few bits out of 1500 bytes IP packets can be invested in a higher signal power (for DSSS) or multi-channel jamming (for FHSS) [5]. II. TYPES OF JAMMING Following two techniques are discussed as per our work scenarios [4]. Physical Jamming (Physical Layer) Physical or Radio jamming in a wireless network is done by either continuous emission of radio signals or by sending random bits onto the channel. The jammers causing these attacks can refuse complete access to the channel by monopolizing the wireless medium. This has an adverse propagating effect as the nodes enter into large exponential back-off periods [4]. Virtual Jamming (MAC Layer) In IEEE based MAC protocols, Jamming can be launched at the MAC layer through attacks on the RTS/CTSframes or DATA frames. A significant advantage of MAC layer jamming is that the adversary node consumes less power in targeting these attacks as compared to the physical radio jamming [4]. All rights reserved by 165
2 III. DETECTION & PREVENTION OF JAMMING The network implements a monitoring mechanism for detecting potential malicious activity by a jammer. The monitoring mechanism [4], [5] consists of the following: (i) determination of a subset of nodes m that will act as network monitors, and (ii) employment of a detection algorithm at each monitor node. The assignment of the role of monitor to a node can be affected by energy limitations and detection performance specifications. In this work, we fix m and formulate optimization problems for one or more monitor nodes. We now check detection at one monitor node. First, we define the quantity to be observed at each monitor node. In our case, available metric is probability of collision that node experiences, namely the percentage of packets that are erroneously received..a detection algorithm takes observation sample so obtained at the monitor node (i.e, collision or not collision) and decides whether there exists an attack. On one hand, the observation window should be small enough, such that the attack is detected on time and appropriate countermeasures are initiated. On the other hand, this window should be sufficiently large, such that the chance of a false alarm notification is minimized. A Mapping to Commitment Scheme [4],[5] for Selective Jamming attack prevention for countering selective jamming, the goal of this scheme is to transform a selective jammer to a random one. This can be achieved by overwhelming the adversary s computational ability to perform real-time packet classification. Commitment schemes are fundamental cryptographic primitives that allow a committer P, commit to a value m to a verifier V while keeping m hidden. Initially, P provides V with a commitment C = commit(m, r), where commit is some commitment operation, and r is a random number. At a later stage, P can release additional information that reveals m. A scheme that does not allow the computation of m from C without additional information from P is called perfect or hiding, while a scheme that does not allow P to change m to a value m_ once C is released, is called binding. The role of the committer is assumed by the transmitting node S. The role of the verifier V is assumed by any receiver R within the communication range of S, including the jammer J. We now provide a scheme that prevents packet classification based on the idea of commitments. IV. PROPOSED ALGORITHM Algorithm for prevention of selective jamming attack by selecting packets at physical layer is using SHCS and add hiding layer between PHY and MAC layer. A Strong Hiding Commitment Scheme (SHCS) Fig. 1: Header with various encryption algorithms on different layers A strong hiding commitment scheme (SHCS) consider PHY and MAC layer [5], which is based on symmetric cryptography. Assume that the sender has a packet for Receiver. First, S constructs commit ( message ) C the commitment function is an offthe-shelf symmetric encryption algorithm is a publicly known permutation, and k is a randomly selected key of some desired key length s (the length of k is a security parameter). Upon reception of d, any receiver R computes. Hiding sublayer is inserted between PHY and MAC layer and storing key k with C pad(c).the functions of hiding sublayer is shown in Fig.1. The hiding sublayer also perform permutation Π1 and Π2 at different processing stages[5]. All rights reserved by 166
3 Steps of Proposed Anti-Jamming Algorithm Identification of Neighbor node Step 1: Create Topology for wireless network for node N. Step 2: Select center node as an access point- AP. Step 3: Set Range r1 as neighbor distance between AP and other node. Set Range r2 as a neighbor distance between node to node. Step 4: Calculate Euclidian distance-e1between neighboring node and create a list L1of node based on E1. Step 5: Arrange L1 ascending order. Step 6: Identify Jammer node (Random method) Step 7: Assign Traffic Agent to Jammer node. Identify Peripheral Node with its neighbor Identify Mapper node for intermediate node to pass the massage. Anti-jamming method (To detect the Jammer node) Identify the Jammer and transmit the message to alternate route(applying SHCS) Apply Encryption1 C=Ek 1 (m) Apply permutation π2 (C pad(c) k) Apply Encryption2 Ek 2 (π2(c pad(c) k)) And create hiding layer This will prevent Jammer node to jam network. V. PROPOSED SOLUTION A solution to selective jamming would be the encryption of transmitted packets (including headers) with a static key. However, for broadcast communications, this static decryption key must be known to all intended receivers and hence, is susceptible to compromise[5]. Moreover, even if the encryption key of a hiding scheme were to remain secret, the static portions of a transmitted packet could potentially lead to packet classification. TCP header is a most common part of the data packet. In a TCP header there are six reserved bits which remains always unused. In this paper we propose a new approach to enhance the security by using the six reserved bits of a TCP header. Real Time Packet Classification At the Physical layer, a packet m is encoded, interleaved, and modulated before it is transmitted over the wireless channel [5]. At the receiver, the signal is demodulated, de-interleaved and decoded to recover the original packet m. Nodes A and B communicate via a wireless link. Within the communication range of both A and B there is a jamming node J. When A transmits a packet m to B, node J classifies m by receiving only the first few bytes of m. J then corrupts m beyond recovery by interfering with its reception at B. In our proposed system we have proved that the open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. And also this intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. We addressed the problem of selective jamming in wireless networks. We illustrated the effectiveness of selective jamming attacks by implementing such attacks against the TCP protocol. We showed that an adversary can exploit its knowledge of the protocol implementation to increase the impact of his attack at a significantly lower energy cost. We illustrated the feasibility of selective jamming attacks by performing real time packet classification. To mitigate selective jamming, we proposed several methods that combine cryptographic primitives such as commitment schemes, cryptographic puzzles, all-or-nothing transformations and MD5 algorithm with physical layer attributes as in Fig.1. VI. SIMULATION RESULT In NS2 Simulator [13], we tested various scenarios for 10,20,30,40 and 50 no of node with area of 1000 X 1000 m 2 topology with fix locations of nodes. Route discovery protocol AODV, DSDV and DSR are used for communication between nodes. First without our proposed algorithm, selective jamming is applied and result is taken for 40 ms duration in NS2 simulator. In second scenario, our proposed algorithm for anti-jamming is applied to mitigate selective jamming and results are taken by analyzing packet delivery ratio in Fig.2 and Fig.3, packet delivery ratio in Fig.4 and Fig. 5, and end to end delay in Fig.6 and Fig.7 for 5,25 and 35 no of nodes by using xgraph. By seeing this results, we also check results for 55 no of nodes and get comparison for packet loss ration in Fig.8, packet delivery ratio in Fig.9 and end to end delay in Fig. 10. By seeing result we see the improvement in all matrices in terms of performance. All rights reserved by 167
4 Fig. 2: Packet Delivery Ratio by Proposed Anti-jamming algo for 50 nodes (AODV) Fig. 3: Packet Delivery Ratio by Proposed Anti-jamming algo for 50 nodes (DSDV) All rights reserved by 168
5 Fig. 4: Packet Delivery Ratio by Proposed Anti-jamming algo for 50 nodes (DSR) Fig. 5: Packet Loss Ratio by Proposed Anti-jamming algo for 50 nodes (AODV) All rights reserved by 169
6 Fig. 6: Packet Loss Ratio by Proposed Anti-jamming algo for 50 nodes (AODV) Fig. 7: Packet Loss Ratio by Proposed Anti-jamming algo for 50 nodes (DSR) All rights reserved by 170
7 Fig. 8: Packet Loss Ratio by jamming algo for 50 nodes (AODV, DSDV, DSR) Fig. 9: Packet Delivery Ratio by jamming algo for 50 nodes (AODV, DSDV, DSR) All rights reserved by 171
8 Fig. 10: Packet Loss Ratio by Proposed Anti-Jamming algo for 50 nodes (AODV,DSDV,DSR) Fig. 11: End to End Delay by jamming algo for 50 nodes (AODV, DSDV, DSR) All rights reserved by 172
9 Fig. 12: End to End Delay by Proposed anti-jamming algo for 50 nodes (AODV, DSDV, DSR) Fig. 13: Packet Delivery Ratio by Proposed Anti Jamming Algo for 50 nodes (AODV, DSDV, DSR) All rights reserved by 173
10 VII. CONCLUSION We analyze the problem of selective jamming attacks in wireless networks with different routing protocols AODV, DSDV and DSR. We tested the effectiveness of selective jamming attacks against the TCP protocol. We showed that an adversary can exploit its knowledge of the protocol implementation to increase the impact of the attack at a significantly lower energy cost. We illustrated the feasibility of selective jamming attacks by performing real time packet classification. To mitigate selective jamming, we proposed a method that combine cryptographic primitives such as commitment schemes (SHCS) and analyzes various parameters like PDR, PLR and End to End Delay for all three routing protocols AODV, DSDV and DSR and conclude that it improves performance in all three protocols. REFERENCES [1] P.Rameshkumar, G.Nageshwarrao,P.Rambabbu, Packet Classification Methods to counte r Jamming attacks in Adhoc Networks, IJDCST, vol. 1, pp , Aug [2] Sisi Liu, Loukas Lazos, Marwan Krunz, Thwarting Inside Jamming Attacks on Wireless Broadcast Communication, ACM Trans ,2006 [3] Jue hans, Fanggang wang, Tony Q.S. Qzek, Jamming-Aided Secure Communication in Massive MIMO Rician Channels, Proc. IEEE ITRANSACTIONS ON WIRELESS Communications, pp. 1-15, [4] Pushphas Chaturvedi, Kunas Gupta, Detection and Prevention of various types of Jamming Attacks in Wireless Networks IRACST, vol. 3, no. 2, pp.75-79, Aug [5] Alejandro Proan õ, Loukas Lazos, Packet-Hiding Methods for Preventing Selective Jamming Attacks, IEEE Transactions on Dependable And Secure Computing, VOL. 9, NO. 1,pp ,Feb [6] Nand Dhandhukia, Dr. Kiran Parmar, Effects of Jamming Attacks on Wireless Communication Systems, IJSRD,,Vol 3,No.7,pp. 1-6, 212 [7] O. Goldreich, Foundations of Cryptography: Basic Applications. Cambridge Univ. Press, [8] IEEE, IEEE Standard, getieee802/download/ pdf, [9] Y.W. Law, M. Palaniswami, L.V. Hoesel, J. Doumen, P. Hartel, and P. Havinga, Energy-Efficient Link-Layer Jamming Attacks against WSN MAC Protocols, ACM Trans. Sensor Networks, vol. 5, no. 1, pp. 1-38, [10] L. Lazos, S. Liu, and M. Krunz, Mitigating Control-Channel Jamming Attacks in Multi-Channel Ad Hoc Networks, Proc. Second ACM Conf. Wireless Network Security, pp ,2009. [11] G. Lin and G. Noubir, On Link Layer Denial of Service in Data Wireless LANs, Wireless Comm. and Mobile Computing, vol. 5, no. 3, pp , May [12] Y. Liu, P. Ning, H. Dai, and A. Liu, Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication, Proc. IEEE INFOCOM, [13] Ns2 Simulator [14] C. Perkins, E. Belding-Royer, and S. Das, RFC 3561: Ad Hoc On-Demand Distance Vector (AODV) Routing, Internet RFCs, [15] D. Stinson, Something about All or Nothing (Transforms), Designs, Codes and Cryptography, vol. 22, no. 2, pp , [16] M. Strasser, C. Po pper, and S. _Capkun, Efficient Uncoordinated fhss Anti-Jamming Communication, Proc. ACM Int l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), pp , [17] P. Tague, M. Li, and R. Poovendran, Mitigation of Control Channel Jamming under Node Capture Attacks, IEEE Trans. Mobile Computing, vol. 8, no. 9, pp , Sept [18] B. Thapa, G. Noubir, R. Rajaramanand, and B. Sheng, On the Robustness of IEEE Rate Adaptation Algorithms against Smart Jamming, Proc. ACM Conf. Wireless Network Security (WiSec), All rights reserved by 174
Interleaving And Channel Encoding Of Data Packets In Wireless Communications
Interleaving And Channel Encoding Of Data Packets In Wireless Communications B. Aparna M. Tech., Computer Science & Engineering Department DR.K.V.Subbareddy College Of Engineering For Women, DUPADU, Kurnool-518218
More informationIJSER 1. INTRODUCTION 2. ANALYSIS
International Journal of Scientific & Engineering Research, Volume 6, Issue 10, October-2015 1011 Packet-Hiding Methods for Preventing Selective Jamming Attacks Guttula Pavani Abstract The open nature
More informationPrevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods
Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods S.B.Gavali 1, A. K. Bongale 2 and A.B.Gavali 3 1 Department of Computer Engineering, Dr.D.Y.Patil College of Engineering,
More informationISSN Vol.06,Issue.09, October-2014, Pages:
ISSN 2348 2370 Vol.06,Issue.09, October-2014, Pages:882-886 www.ijatir.org Wireless Network Packet Classification Selective Jamming Attacks VARTIKA GUPTA 1, M.VINAYA BABU 2 1 PG Scholar, Vishnu Sree Institute
More informationCryptography Based Method for Preventing Jamming Attacks in Wireless Network Ms. Bhoomi Patel 1
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 12, 2015 ISSN (online): 2321-0613 Cryptography Based Method for Preventing Jamming Attacks in Wireless Network Ms. Bhoomi
More informationKeywords: Network Security, Wireless Communications, piggybacking, Encryption.
Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Framework for
More informationAvoiding Selective Attacks with using Packet Hiding Approaches in Wireless Network
Avoiding Selective Attacks with using Packet Hiding Approaches in Wireless Network Patel Dhaval Dhirubhai 1, Singh Kashkumar Nirmalsingh 2 1 Computer Network and Engineering, EastWest Institute of Technology,
More informationPacket Classification Methods to Counter Jamming Attacks in Adhoc Networks
Packet Classification Methods to Counter Jamming Attacks in Adhoc Networks P.Ramesh Kumar 1, G.Nageswara Rao 2, P.Rambabu 3 1 Sasi Institute of Technology and Engineering, Tadepalligudem,W.G(dt) 2 Assoc
More informationDetection and Prevention of Physical Jamming Attacks in Vehicular Environment
Detection and Prevention of Physical Jamming Attacks in Vehicular Environment M-Tech Student 1 Mahendri 1, Neha Sawal 2 Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal,
More informationJamming Attacks with its Various Techniques and AODV in Wireless Networks
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 4 Ver. II (Jul. Aug. 2016), PP 48-52 www.iosrjournals.org Jamming Attacks with its
More informationLOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.955
More informationWireless Network Security Spring 2012
Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #8 Interference and Jamming Announcements Homework #1 is due today Questions? Not everyone has signed up for a Survey These are required,
More informationDEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks
DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia Wireless Sensor Networks
More informationWireless Sensor Networks
DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia June 19, 2007 Wireless
More informationIntrusion Detection and Hindrance for Spot Jamming Attacks in Wireless Network for Packet Concealing Ways
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 8, Issue 4 (August 2013), PP. 26-32 Intrusion Detection and Hindrance for Spot Jamming
More informationLightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network
International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,
More informationWireless Network Security Spring 2014
Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like
More informationJamming Attack Detection and Isolation to Increase Efficiency of the Network in Mobile Ad-hoc Network
Jamming Attack Detection and Isolation to Increase Efficiency of the Network in Mobile Ad-hoc Network 1 Henna Khosla, Student, Department of Electronics and Communication Engineering, Punjabi University,
More informationANTI-JAMMING BROADCAST COMMUNICATION USING UNCOORDINATED FREQUENCY HOPPING
ANTI-JAMMING BROADCAST COMMUNICATION USING UNCOORDINATED FREQUENCY HOPPING P.MANJULA 1, S.SHARMILA 2 1&2 Assistant Professor, Veltech Multitech Engg College ABSTRACT This paper proposes a technique called
More informationMinimization of Jamming Attack in Wireless Broadcast Networks Using Neighboring Node Technique
International Journal of Scientific and Research Publications, Volume 2, Issue 5, May 2012 1 Minimization of Jamming Attack in Wireless Broadcast Networks Using Neighboring Node Technique R.Priyadarshini,
More informationTrust Based Suspicious Route Categorization for Wireless Networks and its Applications to Physical Layer Attack S. RAJA RATNA 1, DR. R.
Trust Based Suspicious Route Categorization for Wireless Networks and its Applications to Physical Layer Attack S. RAJA RATNA 1, DR. R. RAVI 2 1 Research Scholar, Department of Computer Science and Engineering,
More informationUSD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure
USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure An Liu, Peng Ning, Huaiyu Dai, Yao Liu North Carolina State University, Raleigh, NC 27695 {aliu3,
More informationRandomized Channel Hopping Scheme for Anti-Jamming Communication
Randomized Channel Hopping Scheme for Anti-Jamming Communication Eun-Kyu Lee, Soon Y. Oh, and Mario Gerla Computer Science Department University of California at Los Angeles, Los Angeles, CA, USA {eklee,
More informationMeliorated Detection Mechanism for the detection of Physical Jamming Attacks under AODV and DSR protocols in MANETs
Meliorated Detection Mechanism for the detection of Physical Jamming Attacks under AODV and DSR protocols in MANETs Upma Goyal 1, Mansi Gupta 2 and Kiranveer Kaur 3 1 Upma Goyal is pursuing Masters in
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #4 Physical Layer Threats; Jamming 2016 Patrick Tague 1 Class #4 PHY layer basics and threats Jamming 2016 Patrick Tague 2 PHY 2016 Patrick Tague
More informationJamming-resistant Broadcast Communication without Shared Keys
1/18 Jamming-resistant Broadcast Communication without Shared Keys Christina Pöpper Joint work with Mario Strasser and Srdjan Čapkun System Security Group ETH Zürich August 2009 Broadcast Communication
More informationMohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2
AN ATTEMPT TO FIND A SOLUTION FOR DESTRUCTING JAMMING PROBLEMS USING GAME THERORITIC ANALYSIS Abstract Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 1 P. G Scholar, E-mail: ghowsegk2326@gmail.com 2 Assistant
More information/13/$ IEEE
A Game-Theoretical Anti-Jamming Scheme for Cognitive Radio Networks Changlong Chen and Min Song, University of Toledo ChunSheng Xin, Old Dominion University Jonathan Backens, Old Dominion University Abstract
More informationMitigating Inside Jammers in Manet Using Localized Detection Scheme
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 7ǁ July 2013 ǁ PP.13-19 Mitigating Inside Jammers in Manet Using Localized Detection
More informationAvoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks
Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks M. KIRAN KUMAR 1, M. KANCHANA 2, I. SAPTHAMI 3, B. KRISHNA MURTHY 4 1, 2, M. Tech Student, 3 Asst. Prof 1, 4, Siddharth Institute
More informationPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR 802.11P INCLUDING PROPAGATION MODELS Mit Parmar 1, Kinnar Vaghela 2 1 Student M.E. Communication Systems, Electronics & Communication Department, L.D. College
More informationControl Channel Jamming: Resilience and Identification of Traitors
Control Channel Jamming: Resilience and Identification of Traitors Agnes Chan, Xin Liu, Guevara Noubir, Bishal Thapa College of Computer and Information Scinece Northeastern University, Boston, MA 02115
More informationMitigation of Periodic Jamming in a Spread Spectrum System by Adaptive Filter Selection
Mitigation of Periodic Jamming in a Spread Spectrum System by Adaptive Filter Selection Bruce DeBruhl and Patrick Tague Carnegie Mellon University { debruhl, tague} @cmu.edu Keywords: Abstract: Adaptive
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties
More informationInnovative Science and Technology Publications
Innovative Science and Technology Publications International Journal of Future Innovative Science and Technology, ISSN: 2454-194X Volume-4, Issue-2, May - 2018 RESOURCE ALLOCATION AND SCHEDULING IN COGNITIVE
More informationAn Effective Defensive Node against Jamming Attacks in Sensor Networks
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 6ǁ June. 2013 ǁ PP.41-46 An Effective Defensive Node against Jamming Attacks in Sensor
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #4 OMNET++ Intro; Physical Layer Threats 2015 Patrick Tague 1 Class #4 OMNET++ Intro PHY layer basics and threats 2015 Patrick Tague 2 Intro to
More informationThwarting Control-Channel Jamming Attacks from Inside Jammers
IEEE TRANSACTIONS ON OBILE COPUTING, VOL. X, NO. X, 1 Thwarting Control-Channel Jamming Attacks from Inside Jammers Sisi Liu, Student ember, IEEE, Loukas Lazos, ember, IEEE, and arwan runz, Fellow, IEEE
More informationImproving Reliability of Jamming Attack Detection in Ad hoc Networks
Improving Reliability of Jamming Attack Detection in Ad hoc Networks Geethapriya Thamilarasu 1, Sumita Mishra 2 and Ramalingam Sridhar 3 1 State University of New York, Institute of Technology, Utica,
More informationVulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR
5 th Scandinavian Workshop on Wireless Ad-hoc Networks May 3-4, 2005 Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR Mikael Fredin - Ericsson Microwave Systems, Sweden
More informationA survey on broadcast protocols in multihop cognitive radio ad hoc network
A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels
More informationUnderstanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø
Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification
More informationPerformance Evaluation of MANET Using Quality of Service Metrics
Performance Evaluation of MANET Using Quality of Service Metrics C.Jinshong Hwang 1, Ashwani Kush 2, Ruchika,S.Tyagi 3 1 Department of Computer Science Texas State University, San Marcos Texas, USA 2,
More informationSimulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool
Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA and Improvement with PCF in TORA using OPNET tool Anupam Sharma, Deepinderjeet Kaur Dhaliwal Desh Bhagat University Mandi Gobindgarh Punjab
More informationIsolation Mechanism for Jamming Attack in MANET
Isolation Mechanism for Jamming Attack in MANET Aditi 1, Joy Karan Singh 2 1 M.tech Student, Dept. of CSE,CT Institute of Technology & Research, Jalandhar,India 2 Assistant Professor, Dept. of ECE,CT Institute
More informationPerformance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic
International Journal of Computer Science & Communication Vol. 1, No. 1, January-June 2010, pp. 67-71 Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic Dhiraj
More informationThe Pennsylvania State University The Graduate School COMPROMISE-RESILIENT ANTI-JAMMING COMMUNICATION IN WIRELESS SENSOR NETWORKS
The Pennsylvania State University The Graduate School COMPROMISE-RESILIENT ANTI-JAMMING COMMUNICATION IN WIRELESS SENSOR NETWORKS A Thesis in Computer Science and Engineering by Xuan Jiang c 2011 Xuan
More informationA Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University
More informationEnhanced Packet Delivery Techniques Using Crypto-Logic on Jamming Attacks for Wireless Communication Medium
Enhanced Packet Delivery Techniques Using Crypto-Logic on Jamming Attacks for Wireless Communication Medium Ambarisha Malladi M. Chandra Naik Sayyed Nagul Meera, M.Tech(cse) Assoc. Professor, Asst. Professor,
More informationVolume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 6.047 Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey
More informationAnti-Jamming: A Study
Anti-Jamming: A Study Karthikeyan Mahadevan, Sojeong Hong, John Dullum December 14, 25 Abstract Addressing jamming in wireless networks is important as the number of wireless networks is on the increase.
More informationINTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 3,
More informationJamming-resistant Key Establishment using Uncoordinated Frequency Hopping
Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping Mario Strasser Computer Eng. and Networks Laboratory ETH Zurich, Switzerland strasser@tik.ee.ethz.ch Srdjan Čapkun Department of
More informationInternational Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 5,May 2014, e-issn: , print-issn:
Modified Route Maintenance in AODV Routing Protocol ChiragBhalodia (M.Tech, Research Scholar) 1, Prof. Amit M. Lathigara 2 Pg Scholar, Computer Engineering Department & R K University, chiragsbhalodia@gmail.com
More informationPerformance Comparison of AODV, DSDV and ZRP Routing Protocols
Performance Comparison of AODV, DSDV and ZRP Routing Protocols Ajay Singh 1, Anil yadav 2, Dr. mukesh Sharma 2 1 Research Scholar (M.Tech), Department of Computer Science, T.I.T&S, bhiwani 1 Faculty, Department
More informationMore Efficient Routing Algorithm for Ad Hoc Network
More Efficient Routing Algorithm for Ad Hoc Network ENSC 835: HIGH-PERFORMANCE NETWORKS INSTRUCTOR: Dr. Ljiljana Trajkovic Mark Wang mrw@sfu.ca Carl Qian chunq@sfu.ca Outline Quick Overview of Ad hoc Networks
More informationADAPTIVE FORWARDING RATE CONTROL FOR NETWORK CODING IN TACTICAL MANETS
The Military Communications Conference - Unclassified Program - Networking Protocols and Performance Track ADAPTIVE FORWARDING RATE CONTROL FOR NETWORK CODING IN TACTICAL MANETS Soon Y. Oh UtopiaCompression
More informationRobust Key Establishment in Sensor Networks
Robust Key Establishment in Sensor Networks Yongge Wang Abstract Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research
More informationPerformance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network
Performance comparison of AODV, DSDV and EE-DSDV routing algorithm for wireless sensor network Mohd.Taufiq Norhizat a, Zulkifli Ishak, Mohd Suhaimi Sauti, Md Zaini Jamaludin a Wireless Sensor Network Group,
More informationA Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks
A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT
More informationA Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks
A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu
More informationTowards Self-Healing Smart Grid via Intelligent Local Controller Switching under Jamming
Towards Self-Healing Smart Grid via Intelligent Local Controller Switching under Jamming Hongbo Liu, Yingying Chen Department of ECE Stevens Institute of Technology Hoboken, NJ 73 {hliu3, yingying.chen}@stevens.edu
More informationPROBABILISTIC MITIGATION OF CONTROL CHANNEL JAMMING VIA RANDOM KEY DISTRIBUTION
PROBABILISTIC MITIGATION OF CONTROL CHANNEL JAMMING VIA RANDOM KEY DISTRIBUTION Patrick Tague, Mingyan Li, and Radha Poovendran Network Security Lab NSL, Department of Electrical Engineering, University
More informationJamming Prevention by hiding Cryptographic
International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 5 (2017), pp. 767-780 Research India Publications http://www.ripublication.com Jamming Prevention by hiding
More informationDenial of Service Attacks in Wireless Networks: The case of Jammers
Denial of Service Attacks in Wireless Networks: The case of Jammers Konstantinos Pelechrinis and Marios Iliofotou Department of Computer Science and Engineering UC Riverside, Riverside CA 92521 {kpele,marios}@cs.ucr.edu
More informationEvaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models
Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models Rohit Kumar Department of Computer Sc. & Engineering Chandigarh University, Gharuan Mohali, Punjab
More informationEnergy-Efficient MANET Routing: Ideal vs. Realistic Performance
Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Paper by: Thomas Knuz IEEE IWCMC Conference Aug. 2008 Presented by: Farzana Yasmeen For : CSE 6590 2013.11.12 Contents Introduction Review:
More informationAd Hoc Networks - Routing and Security Issues
Ad Hoc Networks - Routing and Security Issues Mahalingam Ramkumar Mississippi State University, MS January 25, 2005 1 2 Some Basic Terms Basic Terms Ad Hoc vs Infrastructured AHN MANET (Mobile Ad hoc NETwork)
More informationIncreasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn
Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background
More informationDetection of Reactive Jamming in Sensor Networks
Detection of Reactive Jamming in Sensor Networks MARIO STRASSER, BORIS DANEV, and SRDJAN ČAPKUN ETH Zurich, Switzerland An integral part of most security- and safety-critical applications is a dependable
More informationJADE: Jamming-Averse Routing on Cognitive Radio Mesh Networks
JADE: Jamming-Averse Routing on Cognitive Radio Mesh Networks (Invited Paper) Yu Seung Kim, Bruce DeBruhl, and Patrick Tague Carnegie Mellon University Email: {yuseungk, bdebruhl, tague}@cmu.edu Abstract
More informationSyed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University
Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous
More informationTowards Optimal UFH-based Anti-jamming Wireless Communication
Towards Optimal UFH-based Anti-jamming Wireless Communication 1 Qian Wang, Ping Xu, Kui Ren, and Xiang-yang Li Department of Electrical and Computer Engineering Department of Computer Science Illinois
More informationSecure Ad-Hoc Routing Protocols
Secure Ad-Hoc Routing Protocols ARIADNE (A secure on demand RoutIng protocol for Ad-Hoc Networks & TESLA ARAN (A Routing protocol for Ad-hoc Networks SEAD (Secure Efficient Distance Vector Routing Protocol
More informationUnderwater Communication in 2.4 Ghz ISM Frequency Band for Submarines
Underwater Communication in 2.4 Ghz ISM Frequency Band for Submarines S.Arulmozhi 1, M.Ashokkumar 2 PG Scholar, Department of ECE, Adhiyamaan College of Engineering, Hosur, Tamilnadu, India 1 Asst. Professor,
More informationPapers. Ad Hoc Routing. Outline. Motivation
CS 15-849E: Wireless Networks (Spring 2006) Ad Hoc Routing Discussion Leads: Abhijit Deshmukh Sai Vinayak Srinivasan Seshan Dave Andersen Papers Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms
More informationUNDERSTANDING AND MITIGATING
UNDERSTANDING AND MITIGATING THE IMPACT OF RF INTERFERENCE ON 802.11 NETWORKS RAMAKRISHNA GUMMADI UCS DAVID WETHERALL INTEL RESEARCH BEN GREENSTEIN UNIVERSITY OF WASHINGTON SRINIVASAN SESHAN CMU 1 Presented
More informationMultiple Access System
Multiple Access System TDMA and FDMA require a degree of coordination among users: FDMA users cannot transmit on the same frequency and TDMA users can transmit on the same frequency but not at the same
More informationInternational Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 ISSN Md. Delwar Hossain
International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 732 A Neighbor Discovery Approach for Cognitive Radio Network Using intersect Sequence Based Channel Rendezvous
More informationEfficient Anti-Jamming Technique Based on Detecting a Hopping Sequence of a Smart Jammer
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 12, Issue 3 Ver. II (May June 2017), PP 118-123 www.iosrjournals.org Efficient Anti-Jamming
More informationAchieving Network Consistency. Octav Chipara
Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures
More informationChannel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service
Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang WINLAB, Rutgers University IAB 2004 Roadmap Motivation and Introduction
More informationLow Power DoS Attacks in Data Wireless LANs and Countermeasures Abstract: 1 Introduction one
Low Power DoS Attacks in Data Wireless LANs and Countermeasures G. Lin, G. Noubir Wireless Security Laboratory College of Computer Science Northeastern University {lingl, noubir}@ccs.neu.edu Abstract:
More informationSMACK - A SMart ACKnowledgement Scheme for Broadcast Messages in Wireless Networks. COMP Paper Presentation Junhua Yan Nov.
SMACK - A SMart ACKnowledgement Scheme for Broadcast Messages in Wireless Networks COMP635 -- Paper Presentation Junhua Yan Nov. 28, 2017 1 Reliable Transmission in Wireless Network Transmit at the lowest
More informationA Routing Approach to Jamming Effects Mitigation in Wireless Multihop Networks. by Umang Sureshbhai Patel
ABSTRACT PATEL, UMANG SURESHBHAI. A Routing Approach to Jamming Effects Mitigation in Wireless Multihop Networks. (Under the direction of Dr. Rudra Dutta.) Wireless networks are susceptible to radio jamming
More informationAttack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks
Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Wenkai Wang, Husheng Li, Yan (Lindsay) Sun, and Zhu Han Department of Electrical, Computer and Biomedical Engineering University
More informationDetecting Malicious Nodes in RSS-Based Localization
Detecting Malicious Nodes in RSS-Based Localization Manas Maheshwari*, Sai Ananthanarayanan P.R.**, Arijit Banerjee*, Neal Patwari**, Sneha K. Kasera* *School of Computing University of Utah Salt Lake
More informationLink Duration, Path Stability and Comparesion of MANET. Routing Protcols. Sanjay Kumar, Haresh Kumar and Zahid Yousif
Link Duration, Path Stability and Comparesion of MANET Routing Protcols Sanjay Kumar, Haresh Kumar and Zahid Yousif A Bachelor thesis submitted to the Department of Electrical Engineering COMSATS Institute
More informationThe Pennsylvania State University. The Graduate School. College of Engineering PERFORMANCE ANALYSIS OF END-TO-END
The Pennsylvania State University The Graduate School College of Engineering PERFORMANCE ANALYSIS OF END-TO-END SMALL SEQUENCE NUMBERS ROUTING PROTOCOL A Thesis in Computer Science and Engineering by Jang
More informationHybrid throughput aware variable puncture rate coding for PHY-FEC in video processing
IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 PP 19-21 www.iosrjen.org Hybrid throughput aware variable puncture rate coding for PHY-FEC in video processing 1 S.Lakshmi,
More informationShort Paper: Reactive Jamming in Wireless Networks How Realistic is the Threat?
Short Paper: Reactive Jamming in Wireless Networks How Realistic is the Threat? Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt, and Vincent Lenders Disco Labs, TU Kaiserslautern, Germany Armasuisse,
More informationWireless Network Security Spring 2016
Wireless Network Security Spring 2016 Patrick Tague Class #16 Cross-Layer Attack & Defense 2016 Patrick Tague 1 Cross-layer design Class #16 Attacks using cross-layer data Cross-layer defenses / games
More informationLoad- and Interference-Aware Channel Assignment for Dual-Radio Mesh Backhauls
Load- and Interference-Aware Channel Assignment for Dual-Radio Mesh Backhauls Michelle X. Gong, Shiwen Mao and Scott F. Midkiff Networking Technology Lab, Intel Corporation, Santa Clara, CA 9 Dept. of
More informationWireless Network Security Spring 2015
Wireless Network Security Spring 2015 Patrick Tague Class #16 Cross-Layer Attack & Defense 2015 Patrick Tague 1 Cross-layer design Class #16 Attacks using cross-layer data Cross-layer defenses / games
More informationSo Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks
So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks Tyler W Moore (joint work with Jolyon Clulow, Gerhard Hancke and Markus Kuhn) Computer Laboratory University of Cambridge Third European
More informationSense in Order: Channel Selection for Sensing in Cognitive Radio Networks
Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,
More informationIN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes
IN4181 Lecture 2 Ad-hoc and Sensor Networks Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes Outline: discuss impact of wireless Ad-hoc networks link layer: medium access control network layer:
More informationHybrid throughput aware variable puncture rate coding for PHY-FEC in video processing
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p-issn: 2278-8727, Volume 20, Issue 3, Ver. III (May. - June. 2018), PP 78-83 www.iosrjournals.org Hybrid throughput aware variable puncture
More information