Jamming Prevention by hiding Cryptographic

Size: px
Start display at page:

Download "Jamming Prevention by hiding Cryptographic"

Transcription

1 International Journal of Computational Intelligence Research ISSN Volume 13, Number 5 (2017), pp Research India Publications Jamming Prevention by hiding Cryptographic Ancients in the MANETs 1 N. Muthyala, 2 V.Kakulapati, 3 VB.Chodavarapu and 4 SR.Kattamuri 1,2,3,4 Sreenidhi Institute of Science and Technology, Yamnampet, Ghatkesar, Hyderabad, Telangana Abstract MANET becomes the significant system that is providing the world closer collectively. In this kind of system setting there may be further possibilities of assaults. It impacts the system efficiently degrade. Whereas eavesdropping as well as information insertion has prohibited utilizing cryptographic techniques, but selective jamming attacks tend to be difficult to counter (which is selectively launch the attack on TCP packet)? They were revealed in the direction of recognizing significant Denial-of-Service (DoS) assaults towards systems. During the easiest form antagonist prevents the packets which are sent over the wireless system. To conquer the described issue of network traffic as well as efficiency in this work we have viewed a three crypto primitives which uses one of the cryptographic algorithms (DES) that are securely send packets over the system. We are treating the issue of selective jamming attacks using internal threat model and also approach to avoid the real-time packet category of packets by incorporating hiding strategy according to cryptographic ancients. Keywords: Jamming, DOS, address manager, Packet Classification, Time-lock I. INTRODUCTION Wireless systems are computer systems which aren't associated with connections of any type. Wi-Fi allows wireless connection towards the Internet through radio waves instead of cables for a particular host system, the tablet, notebooks or else an equivalent cellular phone. Usage of a Wi-Fi device creates groups to save you the

2 768 N. Muthyala, V.Kakulapati, VB.Chodavarapu and SR.Kattamuri high-priced system of providing connections into systems or as an association around various tool places. The bases for wireless networks tend to be radio-waves; it signifies an execution with the intention of happens at the actual stage of system formation. During the processing time, the name Wi-Fi is used as unclear, as it can consider various assorted wireless systems. Wireless systems are being a progressively significant system to facilitate collectively. Wireless systems are used in areas like agriculture, education, medication, manufacturing, military, travelling as well as researching. So, the significance of Wireless systems protection is considerable. The main aim of the communication system is security attacks have been revealed over the past several years radio wireless operations is one of the Ad-hoc models. Here, we are conceptualizing Wireless networks with mobile Ad-hoc network by implementing distributed address manager which is the dynamic configuration of systems when systems are in mobile condition. It occurs at OSI layer [1], the physical layer, and it fundamentally implies that all gadgets can convey specifically to whatever the other device that is inside radio range. Ordinarily, in Infrastructure mode, remote devices can just speak with a focal Access Point or Router and that device is in charge of retransmitting parcels starting with one customer device then onto the next customer device (regardless of the possibility that they are ideal between each other). Ad-Hoc networks dispose of the center man that is the AP; however, they don't have any intrinsic capacity for the multi-bounce. That implies, if the device A can achieve the device B, and device B can achieve the device C, however A can't achieve C, then A and C can't convey in light of the fact that B won't re-transmit any parcels. A MANET is the infrastructure less type of a wireless Mesh Network. The clients (every one of the hubs have similar capacities concerning the system operation, i.e. there is no hub that is in control for verification or security administrations, for instance) don't have multi hop capacity. In WMN, there could be the infrastructure type where packets are being routed, using not only hop metrics but also other metrics for path selection. And some WMN operate in hybrid such that the network develops the hub s repetition of hubs and the self-arranging system worldview to defeat a few issues that are natural to remote systems (tradeoff amongst separation and exchange rates) or to systems when all is said in done (congestion, design and establishment costs). MANETs are exceptionally vulnerable to DoS assaults [2, 3]. DoS assaults are classified as an assault with the objective of blocking trustworthy users from utilizing a certain system resource like a website, web service, or computer system. The wireless connection channel is a broadcast network, revealing the physical layer of wireless connection to jamming [4]. Previous research has mainly aimed at protecting voice interaction with spread spectrum strategies [5]. The SS strategies incorporate bit- level security by distributing bits based on an undisclosed pseudo-clatter (PC) rule, recognized just before interacting parties. Strategy spreads the transmission into an extremely significant frequency band as well as creates a jammer with constrained energy sources not able to allow jamming the whole band. Such techniques only

3 Jamming Prevention by hiding Cryptographic Ancients in the MANETs 769 preserve wireless attacks using the external threat system. Non-continuous jamming exclusively leads to an elegant destruction of voice excellence. So, this strategy is efficient to preserve voice interaction towards jamming. II. RELATED WORK Timothy et.al [6] handles issue of an aggressor intruding on an encoded target remote specially appointed framework with sticking. Jamming is requested with layers furthermore this archive concentrates on Jamming inside the Transport or Network layer. Jamming in the mid of this layer misuses AODV and furthermore TCP models like manner is revealed to be best in reenacted as well as significant systems when it may sense target packet kinds, however encryption is presumed to hide the complete header than well as information of the packet to ensure just sachet range, point in time, also the series is designed in the direction of the goon for sensing. A sensor would be created that contains four components. The first will be a probabilistic arrangement of sizes and in addition between bundle snapshots of different packet sorts. The second will be a verifiable strategy for identifying perceived convention arrangements that will be used to make probabilistic frameworks, the third will be a compelling jamming strategy to constrain the objective framework to produce uncovered groupings towards chronicled analyzer, and furthermore the fourth will be the web classifier which makes bundle sort classification measures. The system is assessed on live data and uncovered that for different packet sorts the class is to a great degree dependable. The relative components of size, timing, the likewise arrangement have a tendency to be furnished with suggestions for producing frameworks significantly secure. M. Cagalj, et.al [7] With their incredibly quality, wireless sensor systems are definitely the more susceptible concept of wireless systems with "radio channel jamming"- based DoS strikes: A foe may easily conceal the exercises that the sensor system may decide by furtively jamming an important division with the hubs; like this, he hinders them to depict what basically detecting to the system administrator. Consequently, despite the fact that the reality an occasion will be detected by one or numerous hubs (likewise the sensor system is totally related), the system administrator can't be updated opportune. This archive uncovered how the sensor hubs may utilize the channel differing qualities being decide wormholes from the jammed area, by which a caution might be sent to the system administrator. Three remedies are recommended: 1. Indicated by wired arrangements of sensors; 2. Relies on upon recurrence, bouncing, and furthermore 3. A novel approach clumsy system jumping. Loukas Lazos et. al., [8] handles the issue of organize-divert congestion ambushes in multi-feed Ad-hoc systems. Veering off with the customary viewpoint which considers jamming strikes as physical-layer defenselessness, we pick a propelled opponent who misuses data for the model perspectives utilizing cryptographic amounts taken from influenced hubs to improve the effect of his attack on higherlayer highlights.

4 770 N. Muthyala, V.Kakulapati, VB.Chodavarapu and SR.Kattamuri This paper proposes novel safety analytics which survey the facility of the enemy to decrease openness to the control network, additionally the general delay managed in re-building up the control network. They even recommended a randomized administered technique that empowers hubs to decide another control station using frequency jumping. Our procedure changes from conventional frequency jumping where no two hubs uncover the comparable bouncing grouping, subsequently relieving the impact of hub holding back. Also, a hacked hub is particularly decided with its bounce arrangement, bringing about its confinement from each potential information identifying with the recurrence range of the control network. III. OUR APPROACH The issue of jamming using an internal threat design may contemplate. Antagonist who knows network techniques also the application information of the set of connection prototypes by every layer in the system load up may prepare. The opponent adventures the internal comprehension for setting up specific jamming attacks wherein specific data of "high significance" are engaged. A jammer may concentrate on route request/reply data with the routing layer to limit route revelation, or preferred TCP affirmations inside a TCP method to fundamentally debase the throughput on the end-to-end stream. Target this issue we suggested three strategies that incorporate encryption methods to conceal the packets from jammer. Also packets are sent to the recipient along with privacy with no packet loss. III. A. CONNECTION MODULE The set of connections incorporates a set of hubs associated using Wi-Fi with implementation of distributed address manager. Designing of the network is done 3x3 matrixes with the fixed number of nodes. Each block of matrix is consisting of 10 nodes and network gateway (router). All nodes are in mobile condition but network router is fixed in certain location. Each block is the representing autonomous system. Hubs can interface specifically in the event that they are inside cooperate with each other extended or in a roundabout way utilizing various bounces. Nodes interact together in the unique method as well as transmit method. Interactions may be whether decoded or encoded. If any node is moving from one autonomous network to another, dynamic configuration is creating by the distributed address manager. Dynamic configuration such as ip address, careof-address, subnet mask. Distributed address management is required due to lack of central administration and host mobility in MANETs. To ensure the right functioning of the system, the conventions endeavor to accomplish the accompanying targets: Allocate exclusive IP addresses: Ensure that at least two hubs don't get a similar IP address.

5 Jamming Prevention by hiding Cryptographic Ancients in the MANETs 771 Task accurately: An IP address is just connected with a hub for the time that it is kept in the system. At the point when a hub leaves the system, its IP address ought to then got to be distinctly accessible for the relationship to another hub. Fix the issues derived from the loss of messages: In the event of any hub disappointment or if message misfortune happens, the convention ought to work sufficiently snappy to keep at least two hubs from having a similar IP address Allocate multi-jump routing: A hub won't be designed with an IP address if there aren't any accessible in the entire system. Accordingly, if any hub of the system has a free IP address, it needs to connect itself with the hub which is asking for an IP address, despite the fact that it is at two-bounces of separation or more. Reduce the supplementary sachet passage in the network: The convention must limit the quantity of packets traded among the hubs in the auto-design prepare. As it were, the control packet movement must bring about as meager damage as conceivable to information bundle activity, given that in the extraordinary case, the system execution would diminish. Confirm the survival of competing requests for an IP address: At the point when two hubs ask for an IP address in the meantime, the convention must do the correlated treatment so that a similar IP deliver is not given to two hubs. Be adaptable to apportioning and converging with the versatile mobile ad hoc system: The convention must have the capacity to accomplish the union of two diverse portable impromptu systems and also the conceivable parceling into two networks. Perform management: The convention must adjust to the quick changes of the remote system topology because of the successive portability of the hubs. The synchronization is done occasionally to guarantee the setup of the system is as the breakthrough as could be expected under the circumstances. Fig 3.1: Conceptual Diagram of MANETs For encoded broadcast interactions, symmetric keys tend to be provided among each desired recipients. All these keys are produced utilizing pre distributed match savvy keys or lopsided cryptography. Our implementation is done similar to cellular networks.

6 772 N. Muthyala, V.Kakulapati, VB.Chodavarapu and SR.Kattamuri III. B. Adversary Module Adversary is in the treatment of the association channel likewise may jam writings at each part of the arrangement of finding. The foe could continue running in full-duplex mode, thusly to get and furthermore transmit all the while. This may be proficient, for instance, with the utilization of multi-radio handsets. The foe is outfitted with directional accepting wires which allow the response of a banner from the single center point, and furthermore jamming of the equivalent signal at the other. It is accumulated which foe may star effectively jam a measure of bits just underneath the ECC ability in front of schedule in the sending. Once the foe is revealed, data packets with the hub shouldn't be gotten to at beneficiary III.C. Synchronized sachet classification With the Physical layer, a sachet m will be prearranged, interrupted, and moreover directed when it is sent in the midst of the remote framework. With the recipient, the signal will be demodulated, de-interleaved and moreover deciphered to restore the hidden package m. Hubs A and furthermore B interface through remote affiliation. Inside the affiliation gathering of both A and moreover B there will be a jamming hub J. Once A sends a packet m to B, hub J shows m by receiving just the underlying couple of bytes of m. J maybe taints m facilitate change by upsetting with its reaction at B III.D. Dedication Method based Sturdy Hiding (SHDM) This is as indicated by symmetric cryptography. It delivers a sturdy hiding feature while maintaining the calculation as well as the connection elevated to a minimal. The SHDM component will be executed. Initially, cryptographic keys can be provided with any cryptographic algorithm such as DES. Subsequently the information is split into packets also these packets tend to be encrypted utilizing the newly produced key. After that many bits will be included using encrypted information as padding procedure to hide the identity of the information. Well the information is permutated as well as transmitted to the choice node. The cryptographic key is renewed regularly to hide the key with the jammer node.

7 Jamming Prevention by hiding Cryptographic Ancients in the MANETs 773 Sender SHDM Generat Encrypte Decrypt Receiv Fig 3.2: Module Diagram of SHDM Padding as well as Permutation tends to be two functions which can be used in the message. Initially, the message will split into various packets; likewise every packet encoded with subjective key qualities. This key value can be altered regularly to maintain the key values hidden with adversaries. The subsequent step is padding. At this time certain bits tend to be included in the encoded data to change the data. Lastly, the information will be permuted as well as submit to the destiny. Following attacker efforts to prevent the packets however, doesn't block as packets encoded. III. D. a. Implementation details of SHDM Considering, the correspondent S has Sachet P for R. S computes (C, d) = entrust (P), Where, C = Ek (π1(p)), d = k. The dedication work Ek() is an off-the-shelf algorithm. Here we are taking symmetric algorithm (e.g., DES), π1 is a known change, and k {0, 1} s is an arbitrary key. Now sender broadcasts (C d). After receiving of d, receiver R constructs P = π1 1 (Dk(C)) Where π1 1 is contrary variation of π1. Packet carrying d is modulated in the last physical layer symbol to satisfy hiding property. Decoding of last symbol is required for the transmitted packet to recover d. MAC and PHY layers both are needed to SHDM implementation.

8 774 N. Muthyala, V.Kakulapati, VB.Chodavarapu and SR.Kattamuri Fig 3.3: Diagram for the procedure of the hiding sub layer. Assume a frame P which is at MAC layer. Frame P contains MAC header and the payload, which is trailing by the CRC code. Firstly, P is permuted and Processing is done at the hiding sub layer. After the transformation, π1(p) is encrypted by using a arbitrary key k i.e., C = Ek (π1(p)). Secondly, a padding function pad () applied, creating a symbol size of multiple size. At last C pad(c) k is changed by using a recognized combination π2. Objective of π2 is to demonstrate that interleaving capacity connected at the physical layer don't change the bits of k to various symbols. Thirdly, a padding function pad () applied, creating a symbol size of multiple size. At last C pad(c) k is changed by using a recognized combination π1. Objective of π3 is to demonstrate that interleaving capacity connected at the physical layer don't change the bits of k to various symbols. III. E. Hiding Scheme based Cryptographic riddle Cryptographic riddles can be the ancients at first proposed by Merkle as a procedure for making a key in excess of a helpless transmission feed. Pick an assortment of projects from controlling Denial of Service strikes to providing communicate check and in addition key secure systems. In according to hiding strategy, cryptographic riddle features known as the time lock challenge is utilized. The key idea regarding these puzzles will be to compel the receiver of a riddle execute a predefined number of calculations prior to capable of drag an undisclosed of consideration.

9 Jamming Prevention by hiding Cryptographic Ancients in the MANETs 775 The required time for getting the cure of a problem relies on upon its hardness and furthermore the strategy capacity of the solver. The upside of bewilder subordinate system is that it's steady quality can't depend on upon the PHY layer necessities III. E. i. Implementation details of CRHS Let s, packet m is encrypted with any sized key k {0, 1} s We are taking symmetric encryption algorithm as earlier mechanism. Now the key k is combined by using cryptographic riddle P = riddle (k, tp), here tp is time required for solving the riddle. Sender will broadcast (C,P) where P = riddle (k, tp) and C = Ek (π1 (m)) Now at recipient side, R need to solve P to get k' and then m' = π1(dk'(c')) Because of computationally bounded, jammer cannot solve cryptographic riddle before the transmission of packet m which is completely encrypted. Hence, the classification of packet m is not possible for performing selective jamming. Correspondent S Produce: k, t p P = riddle (k, t p ) C = Ek(π 1 (m)) C,P Recipient R C', P' k' = solve (P) Calculate m' = π 1 (D k (C')) verify: m' is Time-lock riddles Time-lock riddles, designed by Rivest [9] based on the iterative controlled number of module operation. Several attractive features i.e., well grains in organizing tp and the chronological calculation is used. In such time-lock puzzle, a compound modulus is generated g = u * v Where u, v are two primary digits randomly taken. By selectting arbitrary values of a i.e. 1 < a < g and conceals the key K= k + a2t mod g Where t = tp *N, is needed time to answer k. Assumption made by calculating the N 2 module g /sec. K can be calculated if φ(g) = (u 1)(v 1) Otherwise the attacker may have to calculate all t 2 to get k. The riddle contains this assessment P = (g, K, t, a)

10 776 N. Muthyala, V.Kakulapati, VB.Chodavarapu and SR.Kattamuri III. F. Transformation based All-or-nothing Such type of transformation is used to minimize the brute force attack. It is preprocessing step and completely irreversible process such that after data is passed to block encryption. Minimization of brute force is directly proportional to the number of cipher blocks. Packet is fragmented with bisection function then encrypted with the pool of keys. III. F. i. Implementation details of AONT-HS Assume sachet m is fragmented just before the set of y key chunks, m = {m1,..., my},which act as input to an AONT f : {Fu}y {Fu}y Here, Fu indicates the alphabet of blocks mi and y is the number of output i.e y y. Therefore, a set of artificial-messages m = {m 1,...,m y } is transmitted. And at the receiver, the contrary alteration f 1 is applied to pull through m. AONT can be implemented two ways: a linear transformation [10], and the novel parcel transformation [11]. We implemented the parcel alteration in our project due its efficiency and less computational overhead. Package Transform In package transform designed by Rivest [11], message m, and random key k, and the output are calculated as follows: m i = mi Ek (i), for i = 1, 2,..., y m y+1 = k e1 e2. ey Where ei = Ek0 (m i i), for i = 1, 2,..., y and k0 is a fixed publicly known key. After the receiving all pseudo-messages m is calculated as follows: k = m x+1 e1 e2 ey mi = m i Ek (i), for i = 1, 2,..., y If m i is unknown, then any value of k is possible, as the corresponding ei is not guessed. Hence, Ek (i) cannot be calculated for any i. IV. EXPERIENMENTAL RESULTS In this Paper, we obtain applied Client server teen. We utilized mxml for creating GUI. We have generated a client server program that might be implemented in the network, where in the client may deliver data to server as well as server get the data in a protected manner. We examined the preventive jamming assaults using three special cases like Sturdy Hiding Dedication Method, Cryptographic Riddle, and All-ornothing transformation. Whenever a sender needs to deliver a data to the recipient, the transmitter encrypts the information also delivers in a protected manner.

11 Jamming Prevention by hiding Cryptographic Ancients in the MANETs 777 Here is a strategy utilized for hiding the data that are Dedication Method according to jamming anticipation by crypto mechanism. The packet concealing strategies will be implemented to deliver information by preventing jamming attack. Fig 4.1: The network model, executions of all algorithms are done on this layout IV.A. Jamming Analysis At first, experiment is executed without any prevention mechanism and number of jammers performing attacks is shown on the log file. We plotted the graph (like jamming probability, jamming the succession rate & jamming distribution graph by various jammer node) by analyzing the table over repeated experiments. Table 1: Probability & success rate against various test cases No. of test cases Jam Succeed Jamming Probability ( þ) Jamming Succession Rate( µ%)

12 778 N. Muthyala, V.Kakulapati, VB.Chodavarapu and SR.Kattamuri Fig 4.2: Graph for Jamming Probability Fig 4.3: Graph for Jamming Success Rate IV.B. Analysis of three Crypto mechanisms Efficiency graph is generated of three mechanisms by considering the values on over only three experiments. Table 2: Time (millisecond) taken by three mechanisms Experiment SHDM (milli sec) CRHS (milli sec) AONT (milli sec) Number

13 Jamming Prevention by hiding Cryptographic Ancients in the MANETs 779 Fig 4.4: Efficiency Graph Since, complexity prevention mechanism increases, which leads to decrease in efficiency. Efficiency order: SHDM > CRHS > AONT SHDM is most efficient and AONT is least efficient among three mechanisms. V. CONCLUSIONS The issue of selective jamming assaults in build threat design is regarded. Over here jammer will be the aspect of the system under assault, therefore learning the protocol requirements as well as provided network secrets. To prevent packet categorization in wireless communication, we suggested three techniques like persistence strategy, according to SHDM also no Prevention on cryptographic challenge. Such three strategies prevent the jammer with preventing the packets which is sent over the wireless system to ensure the data attains the recipient with no faults. VI. FUTURE SCOPE In this paper we analyzed the various prevention mechanisms and comparison of efficiency different mechanisms, we also discussed about security issues in Jamming prevention mechanism. In the future, we will concentrate on finding more efficient methods against the other kind of jamming attacks by considering the wireless network, the internet of things and other countermeasure of physical attacks. REFERENCES [1] Alejandro Proan~o and Loukas Lazos, Packet-Hiding Methods for Preventing Selective Jamming Attacks, ieee transactions on dependable and secure computing, vol. 9, no. 1, january/february 2012

14 780 N. Muthyala, V.Kakulapati, VB.Chodavarapu and SR.Kattamuri [2] L. Lazos, S. Liu, and M. Krunz. Mitigating control-channel jamming attacks in multi-channel ad hoc networks. In Proceedings of the 2nd ACM conference on wireless network security, pages , [3] G. Noubir and G. Lin. Low-power DoS attacks in data wireless lans and countermeasures. Mobile Computing and Communications Review,7(3):29-30, [4] M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. Levitt. Spread Spectrum Communications Handbook. McGraw-Hill, 2001.Y. Desmedt. Broadcast antijamming systems. Computer Networks,35(2-3): , February 2001 [5] M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. Levitt. Spread Spectrum Communications Handbook. McGraw-Hill, [6] T. X. Brown, J. E. James, and A. Sethi. Jamming and sensing of encrypted wireless ad hoc networks. In Proceedings of MobiHoc, pages , [7] M. Cagalj, S. Capkun, and J.-P. Hubaux. Wormhole-based antijamming techniques in sensor networks. IEEE Transactions on Mobile Computing, 6(1): , [8] L. Lazos, S. Liu, and M. Krunz. Mitigating control-channel jamming attacks in multi-channel ad hoc networks. In Proceedings of the 2ndACM conference on wireless network security, pages , [9] R. Rivest, A. Shamir, and D. Wagner. Time-lock puzzles and timed release crypto. Massachusetts Institute of Technology, [10] D. Stinson. Something about all or nothing (transforms). Designs, Codes and Cryptography, 22(2): , [11] R. Rivest. All-or-nothing encryption and the package transform. Lecture Notes in Computer Science, pages , 1997.

Interleaving And Channel Encoding Of Data Packets In Wireless Communications

Interleaving And Channel Encoding Of Data Packets In Wireless Communications Interleaving And Channel Encoding Of Data Packets In Wireless Communications B. Aparna M. Tech., Computer Science & Engineering Department DR.K.V.Subbareddy College Of Engineering For Women, DUPADU, Kurnool-518218

More information

Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods

Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods S.B.Gavali 1, A. K. Bongale 2 and A.B.Gavali 3 1 Department of Computer Engineering, Dr.D.Y.Patil College of Engineering,

More information

IJSER 1. INTRODUCTION 2. ANALYSIS

IJSER 1. INTRODUCTION 2. ANALYSIS International Journal of Scientific & Engineering Research, Volume 6, Issue 10, October-2015 1011 Packet-Hiding Methods for Preventing Selective Jamming Attacks Guttula Pavani Abstract The open nature

More information

ISSN Vol.06,Issue.09, October-2014, Pages:

ISSN Vol.06,Issue.09, October-2014, Pages: ISSN 2348 2370 Vol.06,Issue.09, October-2014, Pages:882-886 www.ijatir.org Wireless Network Packet Classification Selective Jamming Attacks VARTIKA GUPTA 1, M.VINAYA BABU 2 1 PG Scholar, Vishnu Sree Institute

More information

Avoiding Selective Attacks with using Packet Hiding Approaches in Wireless Network

Avoiding Selective Attacks with using Packet Hiding Approaches in Wireless Network Avoiding Selective Attacks with using Packet Hiding Approaches in Wireless Network Patel Dhaval Dhirubhai 1, Singh Kashkumar Nirmalsingh 2 1 Computer Network and Engineering, EastWest Institute of Technology,

More information

Performance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming Attacks in WLAN

Performance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming Attacks in WLAN IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 02 July 2016 ISSN (online): 2349-6010 Performance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming

More information

Cryptography Based Method for Preventing Jamming Attacks in Wireless Network Ms. Bhoomi Patel 1

Cryptography Based Method for Preventing Jamming Attacks in Wireless Network Ms. Bhoomi Patel 1 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 12, 2015 ISSN (online): 2321-0613 Cryptography Based Method for Preventing Jamming Attacks in Wireless Network Ms. Bhoomi

More information

Keywords: Network Security, Wireless Communications, piggybacking, Encryption.

Keywords: Network Security, Wireless Communications, piggybacking, Encryption. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Framework for

More information

Packet Classification Methods to Counter Jamming Attacks in Adhoc Networks

Packet Classification Methods to Counter Jamming Attacks in Adhoc Networks Packet Classification Methods to Counter Jamming Attacks in Adhoc Networks P.Ramesh Kumar 1, G.Nageswara Rao 2, P.Rambabu 3 1 Sasi Institute of Technology and Engineering, Tadepalligudem,W.G(dt) 2 Assoc

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like

More information

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 AN ATTEMPT TO FIND A SOLUTION FOR DESTRUCTING JAMMING PROBLEMS USING GAME THERORITIC ANALYSIS Abstract Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 1 P. G Scholar, E-mail: ghowsegk2326@gmail.com 2 Assistant

More information

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia Wireless Sensor Networks

More information

Wireless Sensor Networks

Wireless Sensor Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia June 19, 2007 Wireless

More information

Enhanced Packet Delivery Techniques Using Crypto-Logic on Jamming Attacks for Wireless Communication Medium

Enhanced Packet Delivery Techniques Using Crypto-Logic on Jamming Attacks for Wireless Communication Medium Enhanced Packet Delivery Techniques Using Crypto-Logic on Jamming Attacks for Wireless Communication Medium Ambarisha Malladi M. Chandra Naik Sayyed Nagul Meera, M.Tech(cse) Assoc. Professor, Asst. Professor,

More information

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.955

More information

Detection and Prevention of Physical Jamming Attacks in Vehicular Environment

Detection and Prevention of Physical Jamming Attacks in Vehicular Environment Detection and Prevention of Physical Jamming Attacks in Vehicular Environment M-Tech Student 1 Mahendri 1, Neha Sawal 2 Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal,

More information

Survey of MANET based on Routing Protocols

Survey of MANET based on Routing Protocols Survey of MANET based on Routing Protocols M.Tech CSE & RGPV ABSTRACT Routing protocols is a combination of rules and procedures for combining information which also received from other routers. Routing

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #4 Physical Layer Threats; Jamming 2016 Patrick Tague 1 Class #4 PHY layer basics and threats Jamming 2016 Patrick Tague 2 PHY 2016 Patrick Tague

More information

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification

More information

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA and Improvement with PCF in TORA using OPNET tool Anupam Sharma, Deepinderjeet Kaur Dhaliwal Desh Bhagat University Mandi Gobindgarh Punjab

More information

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks M. KIRAN KUMAR 1, M. KANCHANA 2, I. SAPTHAMI 3, B. KRISHNA MURTHY 4 1, 2, M. Tech Student, 3 Asst. Prof 1, 4, Siddharth Institute

More information

Control Channel Jamming: Resilience and Identification of Traitors

Control Channel Jamming: Resilience and Identification of Traitors Control Channel Jamming: Resilience and Identification of Traitors Agnes Chan, Xin Liu, Guevara Noubir, Bishal Thapa College of Computer and Information Scinece Northeastern University, Boston, MA 02115

More information

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme

Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Cryptanalysis of an Improved One-Way Hash Chain Self-Healing Group Key Distribution Scheme Yandong Zheng 1, Hua Guo 1 1 State Key Laboratory of Software Development Environment, Beihang University Beiing

More information

Using Channel Hopping to Increase Resilience to Jamming Attacks

Using Channel Hopping to Increase Resilience to Jamming Attacks Using Channel Hopping to Increase 82.11 Resilience to Jamming Attacks Vishnu Navda, Aniruddha Bohra, Samrat Ganguly NEC Laboratories America {vnavda,bohra,samrat}@nec-labs.com Dan Rubenstein Columbia University

More information

Jamming-resistant Broadcast Communication without Shared Keys

Jamming-resistant Broadcast Communication without Shared Keys 1/18 Jamming-resistant Broadcast Communication without Shared Keys Christina Pöpper Joint work with Mario Strasser and Srdjan Čapkun System Security Group ETH Zürich August 2009 Broadcast Communication

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication

More information

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS

Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 44 Chapter 3 LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING COMPRESSED ENCRYPTED DATA USING VARIOUS FILE FORMATS 45 CHAPTER 3 Chapter 3: LEAST SIGNIFICANT BIT STEGANOGRAPHY TECHNIQUE FOR HIDING

More information

CS 261 Notes: Zerocash

CS 261 Notes: Zerocash CS 261 Notes: Zerocash Scribe: Lynn Chua September 19, 2018 1 Introduction Zerocash is a cryptocurrency which allows users to pay each other directly, without revealing any information about the parties

More information

USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure

USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure An Liu, Peng Ning, Huaiyu Dai, Yao Liu North Carolina State University, Raleigh, NC 27695 {aliu3,

More information

Grundlagen der Rechnernetze. Introduction

Grundlagen der Rechnernetze. Introduction Grundlagen der Rechnernetze Introduction Overview Building blocks and terms Basics of communication Addressing Protocols and Layers Performance Historical development Grundlagen der Rechnernetze Introduction

More information

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Advanced Modeling and Simulation of Mobile Ad-Hoc Networks Prepared For: UMIACS/LTS Seminar March 3, 2004 Telcordia Contact: Stephanie Demers Robert A. Ziegler ziegler@research.telcordia.com 732.758.5494

More information

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale

Wireless ad hoc networks. Acknowledgement: Slides borrowed from Richard Y. Yale Wireless ad hoc networks Acknowledgement: Slides borrowed from Richard Y. Yang @ Yale Infrastructure-based v.s. ad hoc Infrastructure-based networks Cellular network 802.11, access points Ad hoc networks

More information

Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases.

Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases. Biomedical Research 2017; Special Issue: S315-S320 ISSN 0970-938X www.biomedres.info Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases. Deepa R 1*, Sutha J

More information

Intrusion Detection and Hindrance for Spot Jamming Attacks in Wireless Network for Packet Concealing Ways

Intrusion Detection and Hindrance for Spot Jamming Attacks in Wireless Network for Packet Concealing Ways International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 8, Issue 4 (August 2013), PP. 26-32 Intrusion Detection and Hindrance for Spot Jamming

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties

More information

Jamming Attack Detection and Isolation to Increase Efficiency of the Network in Mobile Ad-hoc Network

Jamming Attack Detection and Isolation to Increase Efficiency of the Network in Mobile Ad-hoc Network Jamming Attack Detection and Isolation to Increase Efficiency of the Network in Mobile Ad-hoc Network 1 Henna Khosla, Student, Department of Electronics and Communication Engineering, Punjabi University,

More information

Anti-Jamming: A Study

Anti-Jamming: A Study Anti-Jamming: A Study Karthikeyan Mahadevan, Sojeong Hong, John Dullum December 14, 25 Abstract Addressing jamming in wireless networks is important as the number of wireless networks is on the increase.

More information

Chaos based Communication System Using Reed Solomon (RS) Coding for AWGN & Rayleigh Fading Channels

Chaos based Communication System Using Reed Solomon (RS) Coding for AWGN & Rayleigh Fading Channels 2015 IJSRSET Volume 1 Issue 1 Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Engineering and Technology Chaos based Communication System Using Reed Solomon (RS) Coding for AWGN & Rayleigh

More information

Multicarrier Modulation For 5g Mobile Applications

Multicarrier Modulation For 5g Mobile Applications IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p-ISSN: 2278-8735 PP 01-05 www.iosrjournals.org Multicarrier Modulation For 5g Mobile Applications M.Banupriya #1

More information

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu

More information

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Security in Sensor Networks Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury Mobile Ad-hoc Networks (MANET) Mobile Random and perhaps constantly changing

More information

Jamming Attacks with its Various Techniques and AODV in Wireless Networks

Jamming Attacks with its Various Techniques and AODV in Wireless Networks IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 4 Ver. II (Jul. Aug. 2016), PP 48-52 www.iosrjournals.org Jamming Attacks with its

More information

Multiple Access System

Multiple Access System Multiple Access System TDMA and FDMA require a degree of coordination among users: FDMA users cannot transmit on the same frequency and TDMA users can transmit on the same frequency but not at the same

More information

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers Kwang-il Hwang, Kyung-tae Kim, and Doo-seop Eom Department of Electronics and Computer Engineering, Korea University 5-1ga,

More information

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Introduction. What is Kraken Coin. Why invest in Kraken Coin

Introduction. What is Kraken Coin. Why invest in Kraken Coin Table of Contents INTRODUCTION 2 What is Kraken Coin 2 Why invest in Kraken Coin 2 Features 3 Kraken Coin Specifications 4 Invest in masternodes to generate cryptocurrency yields 5 Masternodes building

More information

Innovative Science and Technology Publications

Innovative Science and Technology Publications Innovative Science and Technology Publications International Journal of Future Innovative Science and Technology, ISSN: 2454-194X Volume-4, Issue-2, May - 2018 RESOURCE ALLOCATION AND SCHEDULING IN COGNITIVE

More information

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering

More information

Minimization of Jamming Attack in Wireless Broadcast Networks Using Neighboring Node Technique

Minimization of Jamming Attack in Wireless Broadcast Networks Using Neighboring Node Technique International Journal of Scientific and Research Publications, Volume 2, Issue 5, May 2012 1 Minimization of Jamming Attack in Wireless Broadcast Networks Using Neighboring Node Technique R.Priyadarshini,

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #16 Cross-Layer Attack & Defense 2016 Patrick Tague 1 Cross-layer design Class #16 Attacks using cross-layer data Cross-layer defenses / games

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #16 Cross-Layer Attack & Defense 2015 Patrick Tague 1 Cross-layer design Class #16 Attacks using cross-layer data Cross-layer defenses / games

More information

An Effective Defensive Node against Jamming Attacks in Sensor Networks

An Effective Defensive Node against Jamming Attacks in Sensor Networks International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 6ǁ June. 2013 ǁ PP.41-46 An Effective Defensive Node against Jamming Attacks in Sensor

More information

Mitigating Inside Jammers in Manet Using Localized Detection Scheme

Mitigating Inside Jammers in Manet Using Localized Detection Scheme International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 7ǁ July 2013 ǁ PP.13-19 Mitigating Inside Jammers in Manet Using Localized Detection

More information

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor Avoiding Interference in the 2.4-GHz ISM Band Designers can create frequency-agile 2.4 GHz designs using procedures provided by standards bodies or by building their own protocol. By Ryan Winfield Woodings

More information

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR 802.11P INCLUDING PROPAGATION MODELS Mit Parmar 1, Kinnar Vaghela 2 1 Student M.E. Communication Systems, Electronics & Communication Department, L.D. College

More information

Isolation Mechanism for Jamming Attack in MANET

Isolation Mechanism for Jamming Attack in MANET Isolation Mechanism for Jamming Attack in MANET Aditi 1, Joy Karan Singh 2 1 M.tech Student, Dept. of CSE,CT Institute of Technology & Research, Jalandhar,India 2 Assistant Professor, Dept. of ECE,CT Institute

More information

Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004

Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 2004 Secure Localization Services Badri Nath Dept. of Computer Science/WINLAB Rutgers University Jointly with Wade Trappe, Yanyong Zhang WINLAB IAB meeting November, 24 badri@cs.rutgers.edu Importance of localization

More information

Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes

Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes 7th Mediterranean Conference on Control & Automation Makedonia Palace, Thessaloniki, Greece June 4-6, 009 Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes Theofanis

More information

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks

Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic

More information

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012

Fine-grained Channel Access in Wireless LAN. Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Fine-grained Channel Access in Wireless LAN Cristian Petrescu Arvind Jadoo UCL Computer Science 20 th March 2012 Physical-layer data rate PHY layer data rate in WLANs is increasing rapidly Wider channel

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK VISUAL CRYPTOGRAPHY FOR IMAGES MS. SHRADDHA SUBHASH GUPTA 1, DR. H. R. DESHMUKH

More information

Randomized Channel Hopping Scheme for Anti-Jamming Communication

Randomized Channel Hopping Scheme for Anti-Jamming Communication Randomized Channel Hopping Scheme for Anti-Jamming Communication Eun-Kyu Lee, Soon Y. Oh, and Mario Gerla Computer Science Department University of California at Los Angeles, Los Angeles, CA, USA {eklee,

More information

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,

More information

Channel Assignment with Route Discovery (CARD) using Cognitive Radio in Multi-channel Multi-radio Wireless Mesh Networks

Channel Assignment with Route Discovery (CARD) using Cognitive Radio in Multi-channel Multi-radio Wireless Mesh Networks Channel Assignment with Route Discovery (CARD) using Cognitive Radio in Multi-channel Multi-radio Wireless Mesh Networks Chittabrata Ghosh and Dharma P. Agrawal OBR Center for Distributed and Mobile Computing

More information

Cognitive Ultra Wideband Radio

Cognitive Ultra Wideband Radio Cognitive Ultra Wideband Radio Soodeh Amiri M.S student of the communication engineering The Electrical & Computer Department of Isfahan University of Technology, IUT E-Mail : s.amiridoomari@ec.iut.ac.ir

More information

RECOMMENDATION ITU-R BS

RECOMMENDATION ITU-R BS Rec. ITU-R BS.1350-1 1 RECOMMENDATION ITU-R BS.1350-1 SYSTEMS REQUIREMENTS FOR MULTIPLEXING (FM) SOUND BROADCASTING WITH A SUB-CARRIER DATA CHANNEL HAVING A RELATIVELY LARGE TRANSMISSION CAPACITY FOR STATIONARY

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #4 OMNET++ Intro; Physical Layer Threats 2015 Patrick Tague 1 Class #4 OMNET++ Intro PHY layer basics and threats 2015 Patrick Tague 2 Intro to

More information

On Practical Selective Jamming of Bluetooth Low Energy Advertising

On Practical Selective Jamming of Bluetooth Low Energy Advertising On Practical Selective Jamming of Bluetooth Low Energy Advertising S. Brauer, A. Zubow, S. Zehl, M. Roshandel, S. M. Sohi Technical University Berlin & Deutsche Telekom Labs Germany Outline Motivation,

More information

Why (Special Agent) Johnny (Still) Can t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System

Why (Special Agent) Johnny (Still) Can t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System Why (Special Agent) Johnny (Still) Can t Encrypt: A Security Analysis of the APCO Project 25 Two-Way Radio System Sandy Clark Travis Goodspeed Perry Metzger Zachary Wasserman Kevin Xu Matt Blaze Usenix

More information

On Symmetric Key Broadcast Encryption

On Symmetric Key Broadcast Encryption On Symmetric Key Broadcast Encryption Sanjay Bhattacherjee and Palash Sarkar Indian Statistical Institute, Kolkata Elliptic Curve Cryptography (This is not) 2014 Bhattacherjee and Sarkar Symmetric Key

More information

Robust Key Establishment in Sensor Networks

Robust Key Establishment in Sensor Networks Robust Key Establishment in Sensor Networks Yongge Wang Abstract Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research

More information

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University

T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Cross-layer design for video streaming over wireless ad hoc networks T. Yoo, E. Setton, X. Zhu, Pr. Goldsmith and Pr. Girod Department of Electrical Engineering Stanford University Outline Cross-layer

More information

Frequency Hopping Pattern Recognition Algorithms for Wireless Sensor Networks

Frequency Hopping Pattern Recognition Algorithms for Wireless Sensor Networks Frequency Hopping Pattern Recognition Algorithms for Wireless Sensor Networks Min Song, Trent Allison Department of Electrical and Computer Engineering Old Dominion University Norfolk, VA 23529, USA Abstract

More information

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau

ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS. Xiaohua Li and Wednel Cadeau ANTI-JAMMING PERFORMANCE OF COGNITIVE RADIO NETWORKS Xiaohua Li and Wednel Cadeau Department of Electrical and Computer Engineering State University of New York at Binghamton Binghamton, NY 392 {xli, wcadeau}@binghamton.edu

More information

MODBIT ALGORITHM BASED STEGANOGRAPHY ON IMAGES

MODBIT ALGORITHM BASED STEGANOGRAPHY ON IMAGES International Journal of Advanced Research in Computer Science and Emerging Engineering Technologies ISSN : 2454-9924 MODBIT ALGORITHM BASED STEGANOGRAPHY ON IMAGES D.Geethanjali 1 and. M.Margarat 2 1

More information

Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping

Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping Mario Strasser Computer Eng. and Networks Laboratory ETH Zurich, Switzerland strasser@tik.ee.ethz.ch Srdjan Čapkun Department of

More information

Thwarting Control-Channel Jamming Attacks from Inside Jammers

Thwarting Control-Channel Jamming Attacks from Inside Jammers IEEE TRANSACTIONS ON OBILE COPUTING, VOL. X, NO. X, 1 Thwarting Control-Channel Jamming Attacks from Inside Jammers Sisi Liu, Student ember, IEEE, Loukas Lazos, ember, IEEE, and arwan runz, Fellow, IEEE

More information

Performance Evaluation of MANET Using Quality of Service Metrics

Performance Evaluation of MANET Using Quality of Service Metrics Performance Evaluation of MANET Using Quality of Service Metrics C.Jinshong Hwang 1, Ashwani Kush 2, Ruchika,S.Tyagi 3 1 Department of Computer Science Texas State University, San Marcos Texas, USA 2,

More information

An Improved DV-Hop Localization Algorithm Based on Hop Distance and Hops Correction

An Improved DV-Hop Localization Algorithm Based on Hop Distance and Hops Correction , pp.319-328 http://dx.doi.org/10.14257/ijmue.2016.11.6.28 An Improved DV-Hop Localization Algorithm Based on Hop Distance and Hops Correction Xiaoying Yang* and Wanli Zhang College of Information Engineering,

More information

Chapter 10 Mobile Communication Systems

Chapter 10 Mobile Communication Systems Chapter 10 Mobile Communication Systems Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Cellular System Infrastructure Registration Handoff Parameters and Underlying

More information

Wireless in the Real World. Principles

Wireless in the Real World. Principles Wireless in the Real World Principles Make every transmission count E.g., reduce the # of collisions E.g., drop packets early, not late Control errors Fundamental problem in wless Maximize spatial reuse

More information

Webpage: Volume 4, Issue VI, June 2016 ISSN

Webpage:   Volume 4, Issue VI, June 2016 ISSN 4-P Secret Sharing Scheme Deepa Bajaj 1, Navneet Verma 2 1 Master s in Technology (Dept. of CSE), 2 Assistant Professr (Dept. of CSE) 1 er.deepabajaj@gmail.com, 2 navneetcse@geeta.edu.in Geeta Engineering

More information

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR 5 th Scandinavian Workshop on Wireless Ad-hoc Networks May 3-4, 2005 Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR Mikael Fredin - Ericsson Microwave Systems, Sweden

More information

Performance Analysis of Optimal Scheduling Based Firefly algorithm in MIMO system

Performance Analysis of Optimal Scheduling Based Firefly algorithm in MIMO system Performance Analysis of Optimal Scheduling Based Firefly algorithm in MIMO system Nidhi Sindhwani Department of ECE, ASET, GGSIPU, Delhi, India Abstract: In MIMO system, there are several number of users

More information

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN

Wireless LAN Applications LAN Extension Cross building interconnection Nomadic access Ad hoc networks Single Cell Wireless LAN Wireless LANs Mobility Flexibility Hard to wire areas Reduced cost of wireless systems Improved performance of wireless systems Wireless LAN Applications LAN Extension Cross building interconnection Nomadic

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #8 Interference and Jamming Announcements Homework #1 is due today Questions? Not everyone has signed up for a Survey These are required,

More information

Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies

Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 6.047 Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey

More information

Denial of Service Attacks in Wireless Networks: The case of Jammers

Denial of Service Attacks in Wireless Networks: The case of Jammers Denial of Service Attacks in Wireless Networks: The case of Jammers Konstantinos Pelechrinis and Marios Iliofotou Department of Computer Science and Engineering UC Riverside, Riverside CA 92521 {kpele,marios}@cs.ucr.edu

More information

Jamming-resistant Broadcast Communication without Shared Keys

Jamming-resistant Broadcast Communication without Shared Keys Jamming-resistant Broadcast Communication without Shared Keys Christina Pöpper System Security Group ETH Zurich, Switzerland poepperc@inf.ethz.ch Mario Strasser Communication Systems Group ETH Zurich,

More information

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( )

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( ) CHAPTER 2 Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication (2170710) Syllabus Chapter-2.4 Spread Spectrum Spread Spectrum SS was developed initially for military and intelligence

More information

Contents. IEEE family of standards Protocol layering TDD frame structure MAC PDU structure

Contents. IEEE family of standards Protocol layering TDD frame structure MAC PDU structure Contents Part 1: Part 2: IEEE 802.16 family of standards Protocol layering TDD frame structure MAC PDU structure Dynamic QoS management OFDM PHY layer S-72.3240 Wireless Personal, Local, Metropolitan,

More information

Performance Evaluation System of Communication Network for Train Control System Using Radio Communication

Performance Evaluation System of Communication Network for Train Control System Using Radio Communication PAPER Performance Evaluation System of Communication Network for Train Control System Using Radio Communication Hiroyuki SUGAHARA Train Control Systems Laboratory, Signalling and Transport Information

More information

A Practical Approach to Bitrate Control in Wireless Mesh Networks using Wireless Network Utility Maximization

A Practical Approach to Bitrate Control in Wireless Mesh Networks using Wireless Network Utility Maximization A Practical Approach to Bitrate Control in Wireless Mesh Networks using Wireless Network Utility Maximization EE359 Course Project Mayank Jain Department of Electrical Engineering Stanford University Introduction

More information

Trust Based Suspicious Route Categorization for Wireless Networks and its Applications to Physical Layer Attack S. RAJA RATNA 1, DR. R.

Trust Based Suspicious Route Categorization for Wireless Networks and its Applications to Physical Layer Attack S. RAJA RATNA 1, DR. R. Trust Based Suspicious Route Categorization for Wireless Networks and its Applications to Physical Layer Attack S. RAJA RATNA 1, DR. R. RAVI 2 1 Research Scholar, Department of Computer Science and Engineering,

More information

An Efficient Forward Error Correction Scheme for Wireless Sensor Network

An Efficient Forward Error Correction Scheme for Wireless Sensor Network Available online at www.sciencedirect.com Procedia Technology 4 (2012 ) 737 742 C3IT-2012 An Efficient Forward Error Correction Scheme for Wireless Sensor Network M.P.Singh a, Prabhat Kumar b a Computer

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 ISSN Md. Delwar Hossain

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 ISSN Md. Delwar Hossain International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 732 A Neighbor Discovery Approach for Cognitive Radio Network Using intersect Sequence Based Channel Rendezvous

More information

INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. A Dissertation by. Dan Wang

INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS. A Dissertation by. Dan Wang INTELLIGENT SPECTRUM MOBILITY AND RESOURCE MANAGEMENT IN COGNITIVE RADIO AD HOC NETWORKS A Dissertation by Dan Wang Master of Science, Harbin Institute of Technology, 2011 Bachelor of Engineering, China

More information