Performance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming Attacks in WLAN

Size: px
Start display at page:

Download "Performance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming Attacks in WLAN"

Transcription

1 IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 02 July 2016 ISSN (online): Performance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming Attacks in WLAN Parikh D A Dr. Wandra K. H. PG Scholar Principal Department of Computer Engineering Department of Computer Engineering L D College Of Engineering Ahmedabad(Guj) India C U Shah Engineering College, Wadhawan City (Guj)India Abstract Jamming is always an issue in wireless network. An internal threat model of wireless network is vulnerable to the selective jamming attacks. In these attacks, the adversary node with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. The adversary node is active only for short period of time and selectively targets specific packets of high importance by exploiting his knowledge on the implementation details of network that leads network performance degradation. To reduce this attack, we develop an algorithm that prevents real-time packet classification by combining cryptographic primitives with physical-layer attributes. In NS2 simulation environment, we analyze the effects of AODV, DSDV and DSR routing protocol on selective jamming attacks and prevention of these attacks in wireless network by our proposed algorithm. The performance of network analyzed in terms of various performance parameters like packet delivery ratio (PDR), packet loss ratio (PLR), end to end delay (E2E). Keywords: Selective Jamming, Internal Threat Model, Routing Protocol, PDR, PLR I. INTRODUCTION In Wireless Network, Anyone with a transceiver can eavesdrop on wireless transmissions, inject spurious messages, or jam legitimate ones. A Wireless communication standard such as IEEE and Bluetooth are easy targets of DoS attacks.other wireless data standards that make use of error-correction codes are also not secured. Jamming attacks have been considered under an external threat model, in which the jammer is not part of the network. At present, anti-jamming systems rely on an extensive use of spread-spectrum techniques. These techniques separately protect bits against jammers. They are used in voice communication where the jammer has to keep jamming the channel to prevent a communication. Our work aims at building antijamming techniques, used at the bit level to protect data packets from jamming. In the context of internal threat model, a small number of smart jammers located across a geographical area can last for a long period of time with limited energy. The adversary node sends the continuous or random transmission of high- power interference signals. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. The adversary nodes can stay in sleep mode most of the time and be triggered to jam some communication between specific nodes. In this case, the attackers would only wake-up to detect some MAC/IP address and, if needed, jam only few bits of the packet to destroy. The attacking nodes receivers can be designed to consume very little energy even if anti-jamming techniques, such as spread-spectrum, are used, the substantial gain achieved by having to jam only few bits out of 1500 bytes IP packets can be invested in a higher signal power (for DSSS) or multi-channel jamming (for FHSS) [5]. II. TYPES OF JAMMING Following two techniques are discussed as per our work scenarios [4]. Physical Jamming (Physical Layer) Physical or Radio jamming in a wireless network is done by either continuous emission of radio signals or by sending random bits onto the channel. The jammers causing these attacks can refuse complete access to the channel by monopolizing the wireless medium. This has an adverse propagating effect as the nodes enter into large exponential back-off periods [4]. Virtual Jamming (MAC Layer) In IEEE based MAC protocols, Jamming can be launched at the MAC layer through attacks on the RTS/CTSframes or DATA frames. A significant advantage of MAC layer jamming is that the adversary node consumes less power in targeting these attacks as compared to the physical radio jamming [4]. All rights reserved by 165

2 III. DETECTION & PREVENTION OF JAMMING The network implements a monitoring mechanism for detecting potential malicious activity by a jammer. The monitoring mechanism [4], [5] consists of the following: (i) determination of a subset of nodes m that will act as network monitors, and (ii) employment of a detection algorithm at each monitor node. The assignment of the role of monitor to a node can be affected by energy limitations and detection performance specifications. In this work, we fix m and formulate optimization problems for one or more monitor nodes. We now check detection at one monitor node. First, we define the quantity to be observed at each monitor node. In our case, available metric is probability of collision that node experiences, namely the percentage of packets that are erroneously received..a detection algorithm takes observation sample so obtained at the monitor node (i.e, collision or not collision) and decides whether there exists an attack. On one hand, the observation window should be small enough, such that the attack is detected on time and appropriate countermeasures are initiated. On the other hand, this window should be sufficiently large, such that the chance of a false alarm notification is minimized. A Mapping to Commitment Scheme [4],[5] for Selective Jamming attack prevention for countering selective jamming, the goal of this scheme is to transform a selective jammer to a random one. This can be achieved by overwhelming the adversary s computational ability to perform real-time packet classification. Commitment schemes are fundamental cryptographic primitives that allow a committer P, commit to a value m to a verifier V while keeping m hidden. Initially, P provides V with a commitment C = commit(m, r), where commit is some commitment operation, and r is a random number. At a later stage, P can release additional information that reveals m. A scheme that does not allow the computation of m from C without additional information from P is called perfect or hiding, while a scheme that does not allow P to change m to a value m_ once C is released, is called binding. The role of the committer is assumed by the transmitting node S. The role of the verifier V is assumed by any receiver R within the communication range of S, including the jammer J. We now provide a scheme that prevents packet classification based on the idea of commitments. IV. PROPOSED ALGORITHM Algorithm for prevention of selective jamming attack by selecting packets at physical layer is using SHCS and add hiding layer between PHY and MAC layer. A Strong Hiding Commitment Scheme (SHCS) Fig. 1: Header with various encryption algorithms on different layers A strong hiding commitment scheme (SHCS) consider PHY and MAC layer [5], which is based on symmetric cryptography. Assume that the sender has a packet for Receiver. First, S constructs commit ( message ) C the commitment function is an offthe-shelf symmetric encryption algorithm is a publicly known permutation, and k is a randomly selected key of some desired key length s (the length of k is a security parameter). Upon reception of d, any receiver R computes. Hiding sublayer is inserted between PHY and MAC layer and storing key k with C pad(c).the functions of hiding sublayer is shown in Fig.1. The hiding sublayer also perform permutation Π1 and Π2 at different processing stages[5]. All rights reserved by 166

3 Steps of Proposed Anti-Jamming Algorithm Identification of Neighbor node Step 1: Create Topology for wireless network for node N. Step 2: Select center node as an access point- AP. Step 3: Set Range r1 as neighbor distance between AP and other node. Set Range r2 as a neighbor distance between node to node. Step 4: Calculate Euclidian distance-e1between neighboring node and create a list L1of node based on E1. Step 5: Arrange L1 ascending order. Step 6: Identify Jammer node (Random method) Step 7: Assign Traffic Agent to Jammer node. Identify Peripheral Node with its neighbor Identify Mapper node for intermediate node to pass the massage. Anti-jamming method (To detect the Jammer node) Identify the Jammer and transmit the message to alternate route(applying SHCS) Apply Encryption1 C=Ek 1 (m) Apply permutation π2 (C pad(c) k) Apply Encryption2 Ek 2 (π2(c pad(c) k)) And create hiding layer This will prevent Jammer node to jam network. V. PROPOSED SOLUTION A solution to selective jamming would be the encryption of transmitted packets (including headers) with a static key. However, for broadcast communications, this static decryption key must be known to all intended receivers and hence, is susceptible to compromise[5]. Moreover, even if the encryption key of a hiding scheme were to remain secret, the static portions of a transmitted packet could potentially lead to packet classification. TCP header is a most common part of the data packet. In a TCP header there are six reserved bits which remains always unused. In this paper we propose a new approach to enhance the security by using the six reserved bits of a TCP header. Real Time Packet Classification At the Physical layer, a packet m is encoded, interleaved, and modulated before it is transmitted over the wireless channel [5]. At the receiver, the signal is demodulated, de-interleaved and decoded to recover the original packet m. Nodes A and B communicate via a wireless link. Within the communication range of both A and B there is a jamming node J. When A transmits a packet m to B, node J classifies m by receiving only the first few bytes of m. J then corrupts m beyond recovery by interfering with its reception at B. In our proposed system we have proved that the open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. And also this intentional interference with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks on wireless networks. We addressed the problem of selective jamming in wireless networks. We illustrated the effectiveness of selective jamming attacks by implementing such attacks against the TCP protocol. We showed that an adversary can exploit its knowledge of the protocol implementation to increase the impact of his attack at a significantly lower energy cost. We illustrated the feasibility of selective jamming attacks by performing real time packet classification. To mitigate selective jamming, we proposed several methods that combine cryptographic primitives such as commitment schemes, cryptographic puzzles, all-or-nothing transformations and MD5 algorithm with physical layer attributes as in Fig.1. VI. SIMULATION RESULT In NS2 Simulator [13], we tested various scenarios for 10,20,30,40 and 50 no of node with area of 1000 X 1000 m 2 topology with fix locations of nodes. Route discovery protocol AODV, DSDV and DSR are used for communication between nodes. First without our proposed algorithm, selective jamming is applied and result is taken for 40 ms duration in NS2 simulator. In second scenario, our proposed algorithm for anti-jamming is applied to mitigate selective jamming and results are taken by analyzing packet delivery ratio in Fig.2 and Fig.3, packet delivery ratio in Fig.4 and Fig. 5, and end to end delay in Fig.6 and Fig.7 for 5,25 and 35 no of nodes by using xgraph. By seeing this results, we also check results for 55 no of nodes and get comparison for packet loss ration in Fig.8, packet delivery ratio in Fig.9 and end to end delay in Fig. 10. By seeing result we see the improvement in all matrices in terms of performance. All rights reserved by 167

4 Fig. 2: Packet Delivery Ratio by Proposed Anti-jamming algo for 50 nodes (AODV) Fig. 3: Packet Delivery Ratio by Proposed Anti-jamming algo for 50 nodes (DSDV) All rights reserved by 168

5 Fig. 4: Packet Delivery Ratio by Proposed Anti-jamming algo for 50 nodes (DSR) Fig. 5: Packet Loss Ratio by Proposed Anti-jamming algo for 50 nodes (AODV) All rights reserved by 169

6 Fig. 6: Packet Loss Ratio by Proposed Anti-jamming algo for 50 nodes (AODV) Fig. 7: Packet Loss Ratio by Proposed Anti-jamming algo for 50 nodes (DSR) All rights reserved by 170

7 Fig. 8: Packet Loss Ratio by jamming algo for 50 nodes (AODV, DSDV, DSR) Fig. 9: Packet Delivery Ratio by jamming algo for 50 nodes (AODV, DSDV, DSR) All rights reserved by 171

8 Fig. 10: Packet Loss Ratio by Proposed Anti-Jamming algo for 50 nodes (AODV,DSDV,DSR) Fig. 11: End to End Delay by jamming algo for 50 nodes (AODV, DSDV, DSR) All rights reserved by 172

9 Fig. 12: End to End Delay by Proposed anti-jamming algo for 50 nodes (AODV, DSDV, DSR) Fig. 13: Packet Delivery Ratio by Proposed Anti Jamming Algo for 50 nodes (AODV, DSDV, DSR) All rights reserved by 173

10 VII. CONCLUSION We analyze the problem of selective jamming attacks in wireless networks with different routing protocols AODV, DSDV and DSR. We tested the effectiveness of selective jamming attacks against the TCP protocol. We showed that an adversary can exploit its knowledge of the protocol implementation to increase the impact of the attack at a significantly lower energy cost. We illustrated the feasibility of selective jamming attacks by performing real time packet classification. To mitigate selective jamming, we proposed a method that combine cryptographic primitives such as commitment schemes (SHCS) and analyzes various parameters like PDR, PLR and End to End Delay for all three routing protocols AODV, DSDV and DSR and conclude that it improves performance in all three protocols. REFERENCES [1] P.Rameshkumar, G.Nageshwarrao,P.Rambabbu, Packet Classification Methods to counte r Jamming attacks in Adhoc Networks, IJDCST, vol. 1, pp , Aug [2] Sisi Liu, Loukas Lazos, Marwan Krunz, Thwarting Inside Jamming Attacks on Wireless Broadcast Communication, ACM Trans ,2006 [3] Jue hans, Fanggang wang, Tony Q.S. Qzek, Jamming-Aided Secure Communication in Massive MIMO Rician Channels, Proc. IEEE ITRANSACTIONS ON WIRELESS Communications, pp. 1-15, [4] Pushphas Chaturvedi, Kunas Gupta, Detection and Prevention of various types of Jamming Attacks in Wireless Networks IRACST, vol. 3, no. 2, pp.75-79, Aug [5] Alejandro Proan õ, Loukas Lazos, Packet-Hiding Methods for Preventing Selective Jamming Attacks, IEEE Transactions on Dependable And Secure Computing, VOL. 9, NO. 1,pp ,Feb [6] Nand Dhandhukia, Dr. Kiran Parmar, Effects of Jamming Attacks on Wireless Communication Systems, IJSRD,,Vol 3,No.7,pp. 1-6, 212 [7] O. Goldreich, Foundations of Cryptography: Basic Applications. Cambridge Univ. Press, [8] IEEE, IEEE Standard, getieee802/download/ pdf, [9] Y.W. Law, M. Palaniswami, L.V. Hoesel, J. Doumen, P. Hartel, and P. Havinga, Energy-Efficient Link-Layer Jamming Attacks against WSN MAC Protocols, ACM Trans. Sensor Networks, vol. 5, no. 1, pp. 1-38, [10] L. Lazos, S. Liu, and M. Krunz, Mitigating Control-Channel Jamming Attacks in Multi-Channel Ad Hoc Networks, Proc. Second ACM Conf. Wireless Network Security, pp ,2009. [11] G. Lin and G. Noubir, On Link Layer Denial of Service in Data Wireless LANs, Wireless Comm. and Mobile Computing, vol. 5, no. 3, pp , May [12] Y. Liu, P. Ning, H. Dai, and A. Liu, Randomized Differential DSSS: Jamming-Resistant Wireless Broadcast Communication, Proc. IEEE INFOCOM, [13] Ns2 Simulator [14] C. Perkins, E. Belding-Royer, and S. Das, RFC 3561: Ad Hoc On-Demand Distance Vector (AODV) Routing, Internet RFCs, [15] D. Stinson, Something about All or Nothing (Transforms), Designs, Codes and Cryptography, vol. 22, no. 2, pp , [16] M. Strasser, C. Po pper, and S. _Capkun, Efficient Uncoordinated fhss Anti-Jamming Communication, Proc. ACM Int l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), pp , [17] P. Tague, M. Li, and R. Poovendran, Mitigation of Control Channel Jamming under Node Capture Attacks, IEEE Trans. Mobile Computing, vol. 8, no. 9, pp , Sept [18] B. Thapa, G. Noubir, R. Rajaramanand, and B. Sheng, On the Robustness of IEEE Rate Adaptation Algorithms against Smart Jamming, Proc. ACM Conf. Wireless Network Security (WiSec), All rights reserved by 174

Interleaving And Channel Encoding Of Data Packets In Wireless Communications

Interleaving And Channel Encoding Of Data Packets In Wireless Communications Interleaving And Channel Encoding Of Data Packets In Wireless Communications B. Aparna M. Tech., Computer Science & Engineering Department DR.K.V.Subbareddy College Of Engineering For Women, DUPADU, Kurnool-518218

More information

IJSER 1. INTRODUCTION 2. ANALYSIS

IJSER 1. INTRODUCTION 2. ANALYSIS International Journal of Scientific & Engineering Research, Volume 6, Issue 10, October-2015 1011 Packet-Hiding Methods for Preventing Selective Jamming Attacks Guttula Pavani Abstract The open nature

More information

Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods

Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods S.B.Gavali 1, A. K. Bongale 2 and A.B.Gavali 3 1 Department of Computer Engineering, Dr.D.Y.Patil College of Engineering,

More information

ISSN Vol.06,Issue.09, October-2014, Pages:

ISSN Vol.06,Issue.09, October-2014, Pages: ISSN 2348 2370 Vol.06,Issue.09, October-2014, Pages:882-886 www.ijatir.org Wireless Network Packet Classification Selective Jamming Attacks VARTIKA GUPTA 1, M.VINAYA BABU 2 1 PG Scholar, Vishnu Sree Institute

More information

Cryptography Based Method for Preventing Jamming Attacks in Wireless Network Ms. Bhoomi Patel 1

Cryptography Based Method for Preventing Jamming Attacks in Wireless Network Ms. Bhoomi Patel 1 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 12, 2015 ISSN (online): 2321-0613 Cryptography Based Method for Preventing Jamming Attacks in Wireless Network Ms. Bhoomi

More information

Keywords: Network Security, Wireless Communications, piggybacking, Encryption.

Keywords: Network Security, Wireless Communications, piggybacking, Encryption. Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Framework for

More information

Avoiding Selective Attacks with using Packet Hiding Approaches in Wireless Network

Avoiding Selective Attacks with using Packet Hiding Approaches in Wireless Network Avoiding Selective Attacks with using Packet Hiding Approaches in Wireless Network Patel Dhaval Dhirubhai 1, Singh Kashkumar Nirmalsingh 2 1 Computer Network and Engineering, EastWest Institute of Technology,

More information

Packet Classification Methods to Counter Jamming Attacks in Adhoc Networks

Packet Classification Methods to Counter Jamming Attacks in Adhoc Networks Packet Classification Methods to Counter Jamming Attacks in Adhoc Networks P.Ramesh Kumar 1, G.Nageswara Rao 2, P.Rambabu 3 1 Sasi Institute of Technology and Engineering, Tadepalligudem,W.G(dt) 2 Assoc

More information

Detection and Prevention of Physical Jamming Attacks in Vehicular Environment

Detection and Prevention of Physical Jamming Attacks in Vehicular Environment Detection and Prevention of Physical Jamming Attacks in Vehicular Environment M-Tech Student 1 Mahendri 1, Neha Sawal 2 Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal,

More information

Jamming Attacks with its Various Techniques and AODV in Wireless Networks

Jamming Attacks with its Various Techniques and AODV in Wireless Networks IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 4 Ver. II (Jul. Aug. 2016), PP 48-52 www.iosrjournals.org Jamming Attacks with its

More information

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.955

More information

Wireless Network Security Spring 2012

Wireless Network Security Spring 2012 Wireless Network Security 14-814 Spring 2012 Patrick Tague Class #8 Interference and Jamming Announcements Homework #1 is due today Questions? Not everyone has signed up for a Survey These are required,

More information

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia Wireless Sensor Networks

More information

Wireless Sensor Networks

Wireless Sensor Networks DEEJAM: Defeating Energy-Efficient Jamming in IEEE 802.15.4-based Wireless Networks Anthony D. Wood, John A. Stankovic, Gang Zhou Department of Computer Science University of Virginia June 19, 2007 Wireless

More information

Intrusion Detection and Hindrance for Spot Jamming Attacks in Wireless Network for Packet Concealing Ways

Intrusion Detection and Hindrance for Spot Jamming Attacks in Wireless Network for Packet Concealing Ways International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 8, Issue 4 (August 2013), PP. 26-32 Intrusion Detection and Hindrance for Spot Jamming

More information

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network International Journal Of Computational Engineering Research (ijceronline.com) Vol. 3 Issue. 3 Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network 1, Vinothkumar.G,

More information

Wireless Network Security Spring 2014

Wireless Network Security Spring 2014 Wireless Network Security 14-814 Spring 2014 Patrick Tague Class #5 Jamming 2014 Patrick Tague 1 Travel to Pgh: Announcements I'll be on the other side of the camera on Feb 4 Let me know if you'd like

More information

Jamming Attack Detection and Isolation to Increase Efficiency of the Network in Mobile Ad-hoc Network

Jamming Attack Detection and Isolation to Increase Efficiency of the Network in Mobile Ad-hoc Network Jamming Attack Detection and Isolation to Increase Efficiency of the Network in Mobile Ad-hoc Network 1 Henna Khosla, Student, Department of Electronics and Communication Engineering, Punjabi University,

More information

ANTI-JAMMING BROADCAST COMMUNICATION USING UNCOORDINATED FREQUENCY HOPPING

ANTI-JAMMING BROADCAST COMMUNICATION USING UNCOORDINATED FREQUENCY HOPPING ANTI-JAMMING BROADCAST COMMUNICATION USING UNCOORDINATED FREQUENCY HOPPING P.MANJULA 1, S.SHARMILA 2 1&2 Assistant Professor, Veltech Multitech Engg College ABSTRACT This paper proposes a technique called

More information

Minimization of Jamming Attack in Wireless Broadcast Networks Using Neighboring Node Technique

Minimization of Jamming Attack in Wireless Broadcast Networks Using Neighboring Node Technique International Journal of Scientific and Research Publications, Volume 2, Issue 5, May 2012 1 Minimization of Jamming Attack in Wireless Broadcast Networks Using Neighboring Node Technique R.Priyadarshini,

More information

Trust Based Suspicious Route Categorization for Wireless Networks and its Applications to Physical Layer Attack S. RAJA RATNA 1, DR. R.

Trust Based Suspicious Route Categorization for Wireless Networks and its Applications to Physical Layer Attack S. RAJA RATNA 1, DR. R. Trust Based Suspicious Route Categorization for Wireless Networks and its Applications to Physical Layer Attack S. RAJA RATNA 1, DR. R. RAVI 2 1 Research Scholar, Department of Computer Science and Engineering,

More information

USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure

USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure An Liu, Peng Ning, Huaiyu Dai, Yao Liu North Carolina State University, Raleigh, NC 27695 {aliu3,

More information

Randomized Channel Hopping Scheme for Anti-Jamming Communication

Randomized Channel Hopping Scheme for Anti-Jamming Communication Randomized Channel Hopping Scheme for Anti-Jamming Communication Eun-Kyu Lee, Soon Y. Oh, and Mario Gerla Computer Science Department University of California at Los Angeles, Los Angeles, CA, USA {eklee,

More information

Meliorated Detection Mechanism for the detection of Physical Jamming Attacks under AODV and DSR protocols in MANETs

Meliorated Detection Mechanism for the detection of Physical Jamming Attacks under AODV and DSR protocols in MANETs Meliorated Detection Mechanism for the detection of Physical Jamming Attacks under AODV and DSR protocols in MANETs Upma Goyal 1, Mansi Gupta 2 and Kiranveer Kaur 3 1 Upma Goyal is pursuing Masters in

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #4 Physical Layer Threats; Jamming 2016 Patrick Tague 1 Class #4 PHY layer basics and threats Jamming 2016 Patrick Tague 2 PHY 2016 Patrick Tague

More information

Jamming-resistant Broadcast Communication without Shared Keys

Jamming-resistant Broadcast Communication without Shared Keys 1/18 Jamming-resistant Broadcast Communication without Shared Keys Christina Pöpper Joint work with Mario Strasser and Srdjan Čapkun System Security Group ETH Zürich August 2009 Broadcast Communication

More information

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 AN ATTEMPT TO FIND A SOLUTION FOR DESTRUCTING JAMMING PROBLEMS USING GAME THERORITIC ANALYSIS Abstract Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2 1 P. G Scholar, E-mail: ghowsegk2326@gmail.com 2 Assistant

More information

/13/$ IEEE

/13/$ IEEE A Game-Theoretical Anti-Jamming Scheme for Cognitive Radio Networks Changlong Chen and Min Song, University of Toledo ChunSheng Xin, Old Dominion University Jonathan Backens, Old Dominion University Abstract

More information

Mitigating Inside Jammers in Manet Using Localized Detection Scheme

Mitigating Inside Jammers in Manet Using Localized Detection Scheme International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 7ǁ July 2013 ǁ PP.13-19 Mitigating Inside Jammers in Manet Using Localized Detection

More information

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks M. KIRAN KUMAR 1, M. KANCHANA 2, I. SAPTHAMI 3, B. KRISHNA MURTHY 4 1, 2, M. Tech Student, 3 Asst. Prof 1, 4, Siddharth Institute

More information

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR 802.11P INCLUDING PROPAGATION MODELS Mit Parmar 1, Kinnar Vaghela 2 1 Student M.E. Communication Systems, Electronics & Communication Department, L.D. College

More information

Control Channel Jamming: Resilience and Identification of Traitors

Control Channel Jamming: Resilience and Identification of Traitors Control Channel Jamming: Resilience and Identification of Traitors Agnes Chan, Xin Liu, Guevara Noubir, Bishal Thapa College of Computer and Information Scinece Northeastern University, Boston, MA 02115

More information

Mitigation of Periodic Jamming in a Spread Spectrum System by Adaptive Filter Selection

Mitigation of Periodic Jamming in a Spread Spectrum System by Adaptive Filter Selection Mitigation of Periodic Jamming in a Spread Spectrum System by Adaptive Filter Selection Bruce DeBruhl and Patrick Tague Carnegie Mellon University { debruhl, tague} @cmu.edu Keywords: Abstract: Adaptive

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #5 Jamming (cont'd); Physical Layer Security 2016 Patrick Tague 1 Class #5 Anti-jamming Physical layer security Secrecy using physical layer properties

More information

Innovative Science and Technology Publications

Innovative Science and Technology Publications Innovative Science and Technology Publications International Journal of Future Innovative Science and Technology, ISSN: 2454-194X Volume-4, Issue-2, May - 2018 RESOURCE ALLOCATION AND SCHEDULING IN COGNITIVE

More information

An Effective Defensive Node against Jamming Attacks in Sensor Networks

An Effective Defensive Node against Jamming Attacks in Sensor Networks International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 6ǁ June. 2013 ǁ PP.41-46 An Effective Defensive Node against Jamming Attacks in Sensor

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #5 Jamming, Physical Layer Security 2015 Patrick Tague 1 Class #5 Jamming attacks and defenses Secrecy using physical layer properties Authentication

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #4 OMNET++ Intro; Physical Layer Threats 2015 Patrick Tague 1 Class #4 OMNET++ Intro PHY layer basics and threats 2015 Patrick Tague 2 Intro to

More information

Thwarting Control-Channel Jamming Attacks from Inside Jammers

Thwarting Control-Channel Jamming Attacks from Inside Jammers IEEE TRANSACTIONS ON OBILE COPUTING, VOL. X, NO. X, 1 Thwarting Control-Channel Jamming Attacks from Inside Jammers Sisi Liu, Student ember, IEEE, Loukas Lazos, ember, IEEE, and arwan runz, Fellow, IEEE

More information

Improving Reliability of Jamming Attack Detection in Ad hoc Networks

Improving Reliability of Jamming Attack Detection in Ad hoc Networks Improving Reliability of Jamming Attack Detection in Ad hoc Networks Geethapriya Thamilarasu 1, Sumita Mishra 2 and Ramalingam Sridhar 3 1 State University of New York, Institute of Technology, Utica,

More information

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR 5 th Scandinavian Workshop on Wireless Ad-hoc Networks May 3-4, 2005 Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR Mikael Fredin - Ericsson Microwave Systems, Sweden

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø

Understanding and Mitigating the Impact of Interference on Networks. By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø Understanding and Mitigating the Impact of Interference on 802.11 Networks By Gulzar Ahmad Sanjay Bhatt Morteza Kheirkhah Adam Kral Jannik Sundø 1 Outline Background Contributions 1. Quantification & Classification

More information

Performance Evaluation of MANET Using Quality of Service Metrics

Performance Evaluation of MANET Using Quality of Service Metrics Performance Evaluation of MANET Using Quality of Service Metrics C.Jinshong Hwang 1, Ashwani Kush 2, Ruchika,S.Tyagi 3 1 Department of Computer Science Texas State University, San Marcos Texas, USA 2,

More information

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA and Improvement with PCF in TORA using OPNET tool Anupam Sharma, Deepinderjeet Kaur Dhaliwal Desh Bhagat University Mandi Gobindgarh Punjab

More information

Isolation Mechanism for Jamming Attack in MANET

Isolation Mechanism for Jamming Attack in MANET Isolation Mechanism for Jamming Attack in MANET Aditi 1, Joy Karan Singh 2 1 M.tech Student, Dept. of CSE,CT Institute of Technology & Research, Jalandhar,India 2 Assistant Professor, Dept. of ECE,CT Institute

More information

Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic

Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic International Journal of Computer Science & Communication Vol. 1, No. 1, January-June 2010, pp. 67-71 Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic Dhiraj

More information

The Pennsylvania State University The Graduate School COMPROMISE-RESILIENT ANTI-JAMMING COMMUNICATION IN WIRELESS SENSOR NETWORKS

The Pennsylvania State University The Graduate School COMPROMISE-RESILIENT ANTI-JAMMING COMMUNICATION IN WIRELESS SENSOR NETWORKS The Pennsylvania State University The Graduate School COMPROMISE-RESILIENT ANTI-JAMMING COMMUNICATION IN WIRELESS SENSOR NETWORKS A Thesis in Computer Science and Engineering by Xuan Jiang c 2011 Xuan

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University

More information

Enhanced Packet Delivery Techniques Using Crypto-Logic on Jamming Attacks for Wireless Communication Medium

Enhanced Packet Delivery Techniques Using Crypto-Logic on Jamming Attacks for Wireless Communication Medium Enhanced Packet Delivery Techniques Using Crypto-Logic on Jamming Attacks for Wireless Communication Medium Ambarisha Malladi M. Chandra Naik Sayyed Nagul Meera, M.Tech(cse) Assoc. Professor, Asst. Professor,

More information

Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies

Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) e-isjn: A4372-3114 Impact Factor: 6.047 Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey

More information

Anti-Jamming: A Study

Anti-Jamming: A Study Anti-Jamming: A Study Karthikeyan Mahadevan, Sojeong Hong, John Dullum December 14, 25 Abstract Addressing jamming in wireless networks is important as the number of wireless networks is on the increase.

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) International Journal of Computer Engineering and Technology (IJCET), ISSN 0976 ISSN 0976 6367(Print) ISSN 0976 6375(Online) Volume 3,

More information

Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping

Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping Jamming-resistant Key Establishment using Uncoordinated Frequency Hopping Mario Strasser Computer Eng. and Networks Laboratory ETH Zurich, Switzerland strasser@tik.ee.ethz.ch Srdjan Čapkun Department of

More information

International Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 5,May 2014, e-issn: , print-issn:

International Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 5,May 2014, e-issn: , print-issn: Modified Route Maintenance in AODV Routing Protocol ChiragBhalodia (M.Tech, Research Scholar) 1, Prof. Amit M. Lathigara 2 Pg Scholar, Computer Engineering Department & R K University, chiragsbhalodia@gmail.com

More information

Performance Comparison of AODV, DSDV and ZRP Routing Protocols

Performance Comparison of AODV, DSDV and ZRP Routing Protocols Performance Comparison of AODV, DSDV and ZRP Routing Protocols Ajay Singh 1, Anil yadav 2, Dr. mukesh Sharma 2 1 Research Scholar (M.Tech), Department of Computer Science, T.I.T&S, bhiwani 1 Faculty, Department

More information

More Efficient Routing Algorithm for Ad Hoc Network

More Efficient Routing Algorithm for Ad Hoc Network More Efficient Routing Algorithm for Ad Hoc Network ENSC 835: HIGH-PERFORMANCE NETWORKS INSTRUCTOR: Dr. Ljiljana Trajkovic Mark Wang mrw@sfu.ca Carl Qian chunq@sfu.ca Outline Quick Overview of Ad hoc Networks

More information

ADAPTIVE FORWARDING RATE CONTROL FOR NETWORK CODING IN TACTICAL MANETS

ADAPTIVE FORWARDING RATE CONTROL FOR NETWORK CODING IN TACTICAL MANETS The Military Communications Conference - Unclassified Program - Networking Protocols and Performance Track ADAPTIVE FORWARDING RATE CONTROL FOR NETWORK CODING IN TACTICAL MANETS Soon Y. Oh UtopiaCompression

More information

Robust Key Establishment in Sensor Networks

Robust Key Establishment in Sensor Networks Robust Key Establishment in Sensor Networks Yongge Wang Abstract Secure communication guaranteeing reliability, authenticity, and privacy in sensor networks with active adversaries is a challenging research

More information

Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network

Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network Performance comparison of AODV, DSDV and EE-DSDV routing algorithm for wireless sensor network Mohd.Taufiq Norhizat a, Zulkifli Ishak, Mohd Suhaimi Sauti, Md Zaini Jamaludin a Wireless Sensor Network Group,

More information

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks

A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks Elisabeth M. Royer, Chai-Keong Toh IEEE Personal Communications, April 1999 Presented by Hannu Vilpponen 1(15) Hannu_Vilpponen.PPT

More information

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks

A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks A Location-Aware Routing Metric (ALARM) for Multi-Hop, Multi-Channel Wireless Mesh Networks Eiman Alotaibi, Sumit Roy Dept. of Electrical Engineering U. Washington Box 352500 Seattle, WA 98195 eman76,roy@ee.washington.edu

More information

Towards Self-Healing Smart Grid via Intelligent Local Controller Switching under Jamming

Towards Self-Healing Smart Grid via Intelligent Local Controller Switching under Jamming Towards Self-Healing Smart Grid via Intelligent Local Controller Switching under Jamming Hongbo Liu, Yingying Chen Department of ECE Stevens Institute of Technology Hoboken, NJ 73 {hliu3, yingying.chen}@stevens.edu

More information

PROBABILISTIC MITIGATION OF CONTROL CHANNEL JAMMING VIA RANDOM KEY DISTRIBUTION

PROBABILISTIC MITIGATION OF CONTROL CHANNEL JAMMING VIA RANDOM KEY DISTRIBUTION PROBABILISTIC MITIGATION OF CONTROL CHANNEL JAMMING VIA RANDOM KEY DISTRIBUTION Patrick Tague, Mingyan Li, and Radha Poovendran Network Security Lab NSL, Department of Electrical Engineering, University

More information

Jamming Prevention by hiding Cryptographic

Jamming Prevention by hiding Cryptographic International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 5 (2017), pp. 767-780 Research India Publications http://www.ripublication.com Jamming Prevention by hiding

More information

Denial of Service Attacks in Wireless Networks: The case of Jammers

Denial of Service Attacks in Wireless Networks: The case of Jammers Denial of Service Attacks in Wireless Networks: The case of Jammers Konstantinos Pelechrinis and Marios Iliofotou Department of Computer Science and Engineering UC Riverside, Riverside CA 92521 {kpele,marios}@cs.ucr.edu

More information

Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models

Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models Evaluation of Mobile Ad Hoc Network with Reactive and Proactive Routing Protocols and Mobility Models Rohit Kumar Department of Computer Sc. & Engineering Chandigarh University, Gharuan Mohali, Punjab

More information

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Energy-Efficient MANET Routing: Ideal vs. Realistic Performance Paper by: Thomas Knuz IEEE IWCMC Conference Aug. 2008 Presented by: Farzana Yasmeen For : CSE 6590 2013.11.12 Contents Introduction Review:

More information

Ad Hoc Networks - Routing and Security Issues

Ad Hoc Networks - Routing and Security Issues Ad Hoc Networks - Routing and Security Issues Mahalingam Ramkumar Mississippi State University, MS January 25, 2005 1 2 Some Basic Terms Basic Terms Ad Hoc vs Infrastructured AHN MANET (Mobile Ad hoc NETwork)

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

Detection of Reactive Jamming in Sensor Networks

Detection of Reactive Jamming in Sensor Networks Detection of Reactive Jamming in Sensor Networks MARIO STRASSER, BORIS DANEV, and SRDJAN ČAPKUN ETH Zurich, Switzerland An integral part of most security- and safety-critical applications is a dependable

More information

JADE: Jamming-Averse Routing on Cognitive Radio Mesh Networks

JADE: Jamming-Averse Routing on Cognitive Radio Mesh Networks JADE: Jamming-Averse Routing on Cognitive Radio Mesh Networks (Invited Paper) Yu Seung Kim, Bruce DeBruhl, and Patrick Tague Carnegie Mellon University Email: {yuseungk, bdebruhl, tague}@cmu.edu Abstract

More information

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University

Syed Obaid Amin. Date: February 11 th, Networking Lab Kyung Hee University Detecting Jamming Attacks in Ubiquitous Sensor Networks Networking Lab Kyung Hee University Date: February 11 th, 2008 Syed Obaid Amin obaid@networking.khu.ac.kr Contents Background Introduction USN (Ubiquitous

More information

Towards Optimal UFH-based Anti-jamming Wireless Communication

Towards Optimal UFH-based Anti-jamming Wireless Communication Towards Optimal UFH-based Anti-jamming Wireless Communication 1 Qian Wang, Ping Xu, Kui Ren, and Xiang-yang Li Department of Electrical and Computer Engineering Department of Computer Science Illinois

More information

Secure Ad-Hoc Routing Protocols

Secure Ad-Hoc Routing Protocols Secure Ad-Hoc Routing Protocols ARIADNE (A secure on demand RoutIng protocol for Ad-Hoc Networks & TESLA ARAN (A Routing protocol for Ad-hoc Networks SEAD (Secure Efficient Distance Vector Routing Protocol

More information

Underwater Communication in 2.4 Ghz ISM Frequency Band for Submarines

Underwater Communication in 2.4 Ghz ISM Frequency Band for Submarines Underwater Communication in 2.4 Ghz ISM Frequency Band for Submarines S.Arulmozhi 1, M.Ashokkumar 2 PG Scholar, Department of ECE, Adhiyamaan College of Engineering, Hosur, Tamilnadu, India 1 Asst. Professor,

More information

Papers. Ad Hoc Routing. Outline. Motivation

Papers. Ad Hoc Routing. Outline. Motivation CS 15-849E: Wireless Networks (Spring 2006) Ad Hoc Routing Discussion Leads: Abhijit Deshmukh Sai Vinayak Srinivasan Seshan Dave Andersen Papers Outdoor Experimental Comparison of Four Ad Hoc Routing Algorithms

More information

UNDERSTANDING AND MITIGATING

UNDERSTANDING AND MITIGATING UNDERSTANDING AND MITIGATING THE IMPACT OF RF INTERFERENCE ON 802.11 NETWORKS RAMAKRISHNA GUMMADI UCS DAVID WETHERALL INTEL RESEARCH BEN GREENSTEIN UNIVERSITY OF WASHINGTON SRINIVASAN SESHAN CMU 1 Presented

More information

Multiple Access System

Multiple Access System Multiple Access System TDMA and FDMA require a degree of coordination among users: FDMA users cannot transmit on the same frequency and TDMA users can transmit on the same frequency but not at the same

More information

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 ISSN Md. Delwar Hossain

International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 ISSN Md. Delwar Hossain International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 732 A Neighbor Discovery Approach for Cognitive Radio Network Using intersect Sequence Based Channel Rendezvous

More information

Efficient Anti-Jamming Technique Based on Detecting a Hopping Sequence of a Smart Jammer

Efficient Anti-Jamming Technique Based on Detecting a Hopping Sequence of a Smart Jammer IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 12, Issue 3 Ver. II (May June 2017), PP 118-123 www.iosrjournals.org Efficient Anti-Jamming

More information

Achieving Network Consistency. Octav Chipara

Achieving Network Consistency. Octav Chipara Achieving Network Consistency Octav Chipara Reminders Homework is postponed until next class if you already turned in your homework, you may resubmit Please send me your peer evaluations 2 Next few lectures

More information

Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service

Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service Wenyuan Xu, Timothy Wood, Wade Trappe, Yanyong Zhang WINLAB, Rutgers University IAB 2004 Roadmap Motivation and Introduction

More information

Low Power DoS Attacks in Data Wireless LANs and Countermeasures Abstract: 1 Introduction one

Low Power DoS Attacks in Data Wireless LANs and Countermeasures Abstract: 1 Introduction one Low Power DoS Attacks in Data Wireless LANs and Countermeasures G. Lin, G. Noubir Wireless Security Laboratory College of Computer Science Northeastern University {lingl, noubir}@ccs.neu.edu Abstract:

More information

SMACK - A SMart ACKnowledgement Scheme for Broadcast Messages in Wireless Networks. COMP Paper Presentation Junhua Yan Nov.

SMACK - A SMart ACKnowledgement Scheme for Broadcast Messages in Wireless Networks. COMP Paper Presentation Junhua Yan Nov. SMACK - A SMart ACKnowledgement Scheme for Broadcast Messages in Wireless Networks COMP635 -- Paper Presentation Junhua Yan Nov. 28, 2017 1 Reliable Transmission in Wireless Network Transmit at the lowest

More information

A Routing Approach to Jamming Effects Mitigation in Wireless Multihop Networks. by Umang Sureshbhai Patel

A Routing Approach to Jamming Effects Mitigation in Wireless Multihop Networks. by Umang Sureshbhai Patel ABSTRACT PATEL, UMANG SURESHBHAI. A Routing Approach to Jamming Effects Mitigation in Wireless Multihop Networks. (Under the direction of Dr. Rudra Dutta.) Wireless networks are susceptible to radio jamming

More information

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Wenkai Wang, Husheng Li, Yan (Lindsay) Sun, and Zhu Han Department of Electrical, Computer and Biomedical Engineering University

More information

Detecting Malicious Nodes in RSS-Based Localization

Detecting Malicious Nodes in RSS-Based Localization Detecting Malicious Nodes in RSS-Based Localization Manas Maheshwari*, Sai Ananthanarayanan P.R.**, Arijit Banerjee*, Neal Patwari**, Sneha K. Kasera* *School of Computing University of Utah Salt Lake

More information

Link Duration, Path Stability and Comparesion of MANET. Routing Protcols. Sanjay Kumar, Haresh Kumar and Zahid Yousif

Link Duration, Path Stability and Comparesion of MANET. Routing Protcols. Sanjay Kumar, Haresh Kumar and Zahid Yousif Link Duration, Path Stability and Comparesion of MANET Routing Protcols Sanjay Kumar, Haresh Kumar and Zahid Yousif A Bachelor thesis submitted to the Department of Electrical Engineering COMSATS Institute

More information

The Pennsylvania State University. The Graduate School. College of Engineering PERFORMANCE ANALYSIS OF END-TO-END

The Pennsylvania State University. The Graduate School. College of Engineering PERFORMANCE ANALYSIS OF END-TO-END The Pennsylvania State University The Graduate School College of Engineering PERFORMANCE ANALYSIS OF END-TO-END SMALL SEQUENCE NUMBERS ROUTING PROTOCOL A Thesis in Computer Science and Engineering by Jang

More information

Hybrid throughput aware variable puncture rate coding for PHY-FEC in video processing

Hybrid throughput aware variable puncture rate coding for PHY-FEC in video processing IOSR Journal of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 PP 19-21 www.iosrjen.org Hybrid throughput aware variable puncture rate coding for PHY-FEC in video processing 1 S.Lakshmi,

More information

Short Paper: Reactive Jamming in Wireless Networks How Realistic is the Threat?

Short Paper: Reactive Jamming in Wireless Networks How Realistic is the Threat? Short Paper: Reactive Jamming in Wireless Networks How Realistic is the Threat? Matthias Wilhelm, Ivan Martinovic, Jens B. Schmitt, and Vincent Lenders Disco Labs, TU Kaiserslautern, Germany Armasuisse,

More information

Wireless Network Security Spring 2016

Wireless Network Security Spring 2016 Wireless Network Security Spring 2016 Patrick Tague Class #16 Cross-Layer Attack & Defense 2016 Patrick Tague 1 Cross-layer design Class #16 Attacks using cross-layer data Cross-layer defenses / games

More information

Load- and Interference-Aware Channel Assignment for Dual-Radio Mesh Backhauls

Load- and Interference-Aware Channel Assignment for Dual-Radio Mesh Backhauls Load- and Interference-Aware Channel Assignment for Dual-Radio Mesh Backhauls Michelle X. Gong, Shiwen Mao and Scott F. Midkiff Networking Technology Lab, Intel Corporation, Santa Clara, CA 9 Dept. of

More information

Wireless Network Security Spring 2015

Wireless Network Security Spring 2015 Wireless Network Security Spring 2015 Patrick Tague Class #16 Cross-Layer Attack & Defense 2015 Patrick Tague 1 Cross-layer design Class #16 Attacks using cross-layer data Cross-layer defenses / games

More information

So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks

So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks So Near and Yet So Far: Distance-Bounding Attacks in Wireless Networks Tyler W Moore (joint work with Jolyon Clulow, Gerhard Hancke and Markus Kuhn) Computer Laboratory University of Cambridge Third European

More information

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks

Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Sense in Order: Channel Selection for Sensing in Cognitive Radio Networks Ying Dai and Jie Wu Department of Computer and Information Sciences Temple University, Philadelphia, PA 19122 Email: {ying.dai,

More information

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes

IN4181 Lecture 2. Ad-hoc and Sensor Networks. Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes IN4181 Lecture 2 Ad-hoc and Sensor Networks Koen Langendoen Muneeb Ali, Aline Baggio Gertjan Halkes Outline: discuss impact of wireless Ad-hoc networks link layer: medium access control network layer:

More information

Hybrid throughput aware variable puncture rate coding for PHY-FEC in video processing

Hybrid throughput aware variable puncture rate coding for PHY-FEC in video processing IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p-issn: 2278-8727, Volume 20, Issue 3, Ver. III (May. - June. 2018), PP 78-83 www.iosrjournals.org Hybrid throughput aware variable puncture

More information