Detection and Prevention of Physical Jamming Attacks in Vehicular Environment

Similar documents
Meliorated Detection Mechanism for the detection of Physical Jamming Attacks under AODV and DSR protocols in MANETs

IJSER 1. INTRODUCTION 2. ANALYSIS

LOCALIZATION AND ROUTING AGAINST JAMMERS IN WIRELESS NETWORKS

Interleaving And Channel Encoding Of Data Packets In Wireless Communications

ISSN Vol.06,Issue.09, October-2014, Pages:

Prevention of Selective Jamming Attack Using Cryptographic Packet Hiding Methods

Lightweight Decentralized Algorithm for Localizing Reactive Jammers in Wireless Sensor Network

Mohammed Ghowse.M.E 1, Mr. E.S.K.Vijay Anand 2

An Effective Defensive Node against Jamming Attacks in Sensor Networks

Simulation Based Analysis of Jamming Attack in OLSR, GRP, TORA. and Improvement with PCF in TORA using OPNET tool

Performance Evaluation of AODV, DSDV and DSR or Avoiding Selective Jamming Attacks in WLAN

USD-FH: Jamming-resistant Wireless Communication using Frequency Hopping with Uncoordinated Seed Disclosure

Jamming-resistant Broadcast Communication without Shared Keys

Trust Based Suspicious Route Categorization for Wireless Networks and its Applications to Physical Layer Attack S. RAJA RATNA 1, DR. R.

Avoid Impact of Jamming Using Multipath Routing Based on Wireless Mesh Networks

/13/$ IEEE

Wireless Network Security Spring 2012

ANTI-JAMMING BROADCAST COMMUNICATION USING UNCOORDINATED FREQUENCY HOPPING

Survey of MANET based on Routing Protocols

Mitigating Inside Jammers in Manet Using Localized Detection Scheme

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Improving Reliability of Jamming Attack Detection in Ad hoc Networks

A survey on broadcast protocols in multihop cognitive radio ad hoc network

Randomized Channel Hopping Scheme for Anti-Jamming Communication

Wireless Network Security Spring 2014

Jamming Attacks with its Various Techniques and AODV in Wireless Networks

Packet Classification Methods to Counter Jamming Attacks in Adhoc Networks

Jamming Attack Detection and Isolation to Increase Efficiency of the Network in Mobile Ad-hoc Network

Channel Surfing and Spatial Retreats: Defenses against Wireless Denial of Service

Anti-Jamming: A Study

Energy-Efficient MANET Routing: Ideal vs. Realistic Performance

ENHANCEMENT OF OLSR ROUTING PROTOCOL IN MANET Kanu Bala 1, Monika Sachdeva 2 1,2

Volume 5, Issue 3, March 2017 International Journal of Advance Research in Computer Science and Management Studies

sensors ISSN

On Denial of Service Attacks for Wireless Sensor Networks

Using Channel Hopping to Increase Resilience to Jamming Attacks

Wireless Sensor Networks

DEEJAM: Defeating Energy-Efficient Jamming in IEEE based Wireless Networks

PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS FOR P INCLUDING PROPAGATION MODELS

International Journal of Advance Engineering and Research Development (IJAERD) Volume 1,Issue 5,May 2014, e-issn: , print-issn:

IMPROVED OLSR AND TORA ROUTING PROTOCOLS FOR MANETS

Keywords - Ad-hoc Networks, TCP variants, Routing Protocols, AODV, DSR.

Isolation Mechanism for Jamming Attack in MANET

Wireless Internet Routing. IEEE s

Efficient Anti-Jamming Technique Based on Detecting a Hopping Sequence of a Smart Jammer

Keywords: Network Security, Wireless Communications, piggybacking, Encryption.

APS Implementation over Vehicular Ad Hoc Networks

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

Minimization of Jamming Attack in Wireless Broadcast Networks Using Neighboring Node Technique

Local Density Estimation for Contention Window Adaptation in Vehicular Networks

A Framework for Energy-efficient Adaptive Jamming of Adversarial Communications

ENHANCEMENT OF LINK STABILITY USING RDGR IN VANET

Analysis and Optimization on Jamming-resistant Collaborative Broadcast in Large-Scale Networks

Security in Sensor Networks. Written by: Prof. Srdjan Capkun & Others Presented By : Siddharth Malhotra Mentor: Roland Flury

ENERGY EFFICIENT SENSOR NODE DESIGN IN WIRELESS SENSOR NETWORKS

Simple Modifications in HWMP for Wireless Mesh Networks with Smart Antennas

Cognitive Wireless Network : Computer Networking. Overview. Cognitive Wireless Networks

Starvation Mitigation Through Multi-Channel Coordination in CSMA Multi-hop Wireless Networks

Performance Improvement of AODV Protocol In Vehicular Ad hoc Network (VANET)

An Adaptive Multichannel Protocol for Large scale Machine-to-Machine (M2M) Networks

Analysis of Bottleneck Delay and Throughput in Wireless Mesh Networks

DDRS algorithm over DoS Attack in Wireless Communication Due to Jammers Prof. Bhaumik Machhi 1

Advanced Modeling and Simulation of Mobile Ad-Hoc Networks

Performance Evaluation of MANET Using Quality of Service Metrics

Performance Evaluation of Energy Consumption of Reactive Protocols under Self- Similar Traffic

Avoiding Selective Attacks with using Packet Hiding Approaches in Wireless Network

Wireless Network Security Spring 2015

Exhaustive Study on the Infulence of Hello Packets in OLSR Routing Protocol

Performance Evaluation of a Hybrid Sensor and Vehicular Network to Improve Road Safety

Dynamic Zonal Broadcasting for Effective Data Dissemination in VANET

Partial overlapping channels are not damaging

Mitigation of Periodic Jamming in a Spread Spectrum System by Adaptive Filter Selection

Using Vision-Based Driver Assistance to Augment Vehicular Ad-Hoc Network Communication

JADE: Jamming-Averse Routing on Cognitive Radio Mesh Networks

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Multiple Access System

Wireless Network Security Spring 2016

A Secure Transmission of Cognitive Radio Networks through Markov Chain Model

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks

MIMO-Based Vehicle Positioning System for Vehicular Networks

Wireless Network Security Spring 2016

GAME THEORY MANET ROUTING FOR JAMMING ENVIRONMENT. Yi Zhu

Performance comparison of AODV, DSDV and EE-DSDV routing protocol algorithm for wireless sensor network

Efficiently multicasting medical images in mobile Adhoc network for patient diagnosing diseases.

Performance Evaluation of a Video Broadcasting System over Wireless Mesh Network

Communication Networks. Braunschweiger Verkehrskolloquium

INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

ROUTING PROTOCOLS. Dr. Ahmed Khattab. EECE Department Cairo University Fall 2012 ELC 659/ELC724

PERFORMANCE EVALUATION OF AODV AND DSR IN FEASIBLE AND RANDOM PLACEMENT MODELS

Research Article A Joint Vehicle-Vehicle/Vehicle-Roadside Communication Protocol for Highway Traffic Safety

A Fuzzy logic based Next-hop Selection Scheme for Emergency Message Propagation in VANETs

Cryptography Based Method for Preventing Jamming Attacks in Wireless Network Ms. Bhoomi Patel 1

Vulnerability modelling of ad hoc routing protocols a comparison of OLSR and DSR

Towards Self-Healing Smart Grid via Intelligent Local Controller Switching under Jamming

Chutima Prommak and Boriboon Deeka. Proceedings of the World Congress on Engineering 2007 Vol II WCE 2007, July 2-4, 2007, London, U.K.

Denial of Service Attacks in Wireless Networks: The case of Jammers

Wireless Network Security Spring 2016

Wireless Network Security Spring 2015

Real Time Implementation of Overcome Frequency Jammer

Transcription:

Detection and Prevention of Physical Jamming Attacks in Vehicular Environment M-Tech Student 1 Mahendri 1, Neha Sawal 2 Assit. Prof. 2 &Department of CSE & NGF College of Engineering &Technology Palwal, Haryana, India Abstract Various studies in the literature have been covered by the researchers to solve security problems of vehicular Ad- Hoc Networks (VANET). Because of the wireless nature of the channel and particular features of VANETs, the radio interference attacks cannot be mitigated by traditional security methods. These attacks lead a important reduction on packet transmission rates, total network throughput and delay on the MAC layer since other nodes step back from the interaction. A harmful node can continuously transmit a radio signal in order to stop any kind of logical access to the medium and/or infer with reception. This procedure is known as jamming and the harmful nodes are called as jammers. VANET routing protocols could enhance system performance by improving throughput and data lost. To reduce the effect of the interruption, it is significant to identify its existence. So, in this paper, an improved detection mechanism has been suggested in order to determine the physical jamming at-tacks in Ad Hoc On Demand (AODV) Routing protocol thus improving the throughput and reduce the delay. The results of the suggested technique are compared with the available techniques USM and. are several security issues in VANET i.e. maintaining the validity of data packet, certifying sender of message, offering node secrecy with non-repudiation, existence, certificate cancellation etc. All these performance and security requirements coordinate to form VANET safety applications more challenging in comparison of other wireless applications. Keywords: AODV, Defense, Delay, Jamming attack. I. INTRODUCTION The developing demand of wireless communications and wireless devices tends to research on self-configuring and self curing networks without the help of any centralized framework or pre-established authority/infrastructure. This type of networks is called Ad hoc networks. Vehicular Ad hoc Networks (VANETs) is a part of Mobile Ad Hoc Networks (MANETs) that has came out because of latest development in wireless technology and sensor network. Vehicular Ad hoc Networks (VANETs) are ad-hoc network s real applications where real-time interaction between nearby roadside static infrastructure and vehicles is offered over wireless connections. It reduces both traffic congestion and vehicle crashes which are main problems around the whole world. The wireless interaction between two or more nodes in a VANET (Vehicular Ad hoc Networks) faces several unique issues. This is specifically appropriate for safety-critical applications i.e. lane change, pre-crash feeling, collision avoidance etc. Factors i.e. high vehicle speeds, low signal latencies, varying topology, traffic density, overall message size etc. are primary challenges that makes traditional wireless protocols and technologies unsuitable for VANETs (Vehicular Ad hoc Networks). Along with performance challenges, there Fig.1. Vehicular Ad hoc Network The routing protocols in VANET are categorized into three major categories:- 1. Proactive Routing Protocol-In proactive routing protocol, the mobile nodes transfer routing information and maintain the network topology information in routing table at periodic interval of time. These protocols are also called as table driven routing protocol. 2. Reactive Routing Protocol- Here the mobile nodes do not transfer routing information at regular interval of time. These protocols get a new path when it is needed. These protocols are also called as on demand routing protocol. 3. Hybrid Routing Protocol- It is the combination of both proactive and reactive routing protocols. A table driven mechanism is applied inside the routing zone of each node while an on demand mechanism is 2201

applied for the nodes that are not inside the routing zone [10]. II. RELATED WORK Wenyuan Xu et al. (2005) provide a detailed explanation of the radio interference attacks and identifying the vital issue of the existence of the jamming attack. Four different jamming attack frameworks were suggested that can be utilized by an antagonist to disable the operation of a wireless network, and measured their efficiency in terms of how every method influences the capability of a wireless node to send and obtain packets to and from the destination node. The author also talked about various evaluations that supports as the basis for determining a jamming attack, and revealed different scenarios where every measurement is not sufficient to reliably classify the existence of a jamming attack. Mario Strasser et al. (2008) addresses the problem of how can two devices that do not share any private information demonstrate a shared secret key over a wireless radio channel in the existence of a communication jammer. An inherent issue in solving this problem was that called anti-jamming techniques (e.g., frequency hopping or direct-sequence spread spectrum) which should support device communication at the time of the key establishment needed that the devices shared a secret spreading key (or code) before to the beginning of their communication Sisi Liu et al. (2012) consider the problem of preventing control-channel DoS attacks demonstrated in the form of jamming. The author considered a sophisticated antagonist who has information of the protocol particulars and of the cryptographic quantities utilized to protect network operations. This kind of antagonist cannot be prevented by anti jamming mechanisms that rely spread spectrum. The author suggested a new security metrics to quantify the capability of the antagonist to refuse access to the control channel, and presented a randomized distributed strategy that permits nodes to demonstrate and manage the control channel in the existence of the jammer. The suggested method is suitable to networks with fixed or dynamically distributed spectrum. III. System Model 3.1 Description of the First Scenario: This scenario composed of 50 mobile nodes deployed arbitrarily in the region of 1000 x 1000 m. Nodes move in this region based on random waypoint mobility model with a constant speed of 10 m/s. The scenarios are modeled and examined based on two parameters- Throughput and Delay. 1. Throughput- Represents the total number of bits (in bits/sec) forwarded from wireless LAN layers to the higher layers in all WLAN nodes of the network. 2. Delay- Represents the end to end delay of all the packets obtained by the wireless LAN Macs of all the WLAN nodes in the network and forwarded to the higher layers. Table 1. Parameters for the first Scenario Parameters Involved Value used No. of mobile nodes 50 Area of the network 1000*1000 Mobility speed of the mobile 10 m/s nodes Ad-hoc Routing protocol AODV Start time 10 seconds Stop time Packet Size Simulation time No. of Seeds 300 Simulation Kernel End of Simulation 2000(exponential) 300 seconds Optimized 3.2 Description of the Attack Scenario: Here, we have positioned two jammer nodes for engaging the physical jamming attack in the network. The jammer employed here is mobile pulse jammer Parameters involved Type of Jammer Table2 Jammer characteristics Value used Pulse Jammer Jammer bandwidth 100000 Jammer base band frequency 2402 Pulse width 2.0 Start time Stop time 10 seconds End of the simulation 3.3 Description of the Third Scenario: For implementing the suggested technique for the determination of the physical jamming attack, following detection technique is suggested. Proposed Technique For enhancing the throughput of the overall network, the existence of the jammer node is very essential to be stated. Several techniques were adopted for the discovery, prevention 2202

and mitigation of the jamming attack. For enhancing the throughput and reducing the delay in comparison of the available approaches, an improved detection mechanism is suggested in this paper, for the determination of the physical jamming attack. 1. In case, if packet size increased to a specific RTS threshold, that packet would have to wait for a specific RTS/CTS interval in order to completely route that packet to its destination node. So, the buffer size is considered as 102400000. 2. Also, high data rate of 54 mbps is considered which was formerly 11 mbps during the simple and the attack scenario. 3. The value of the physical characteristics is adjusted to Extended Rate PHY. 4. So, apart from performing the changes in the buffer size and data rate for the prevention of penalties lead by the disadvantages of the available techniques and for improving the throughput, enhanced AODV parameters are also followed. Here, the active route timeout is considered as 30 seconds. IV. PERFORMANCE RESULTS 4.1 Analysis of jamming attack under : When the attack nodes were employed into the network of the mobile nodes under, the throughput of the network reduced, thus describing the existence of the physical jamming attack. Fig 2. Detection of physical jamming attack under AODV on the basis of delay 4.2 Analysis of jamming attack under when the suggested technique was employed: When the suggested technique was employed to the network of the mobile nodes in which the attack was detected, the throughput of the network first enhanced slowly and then arrived to a expecting level. On the other side, the delay of the net-work reduced to a important value in comparison of the attack scenario. Fig 3. Throughput of the network under AODV with the proposed approach Fig 1. Detection of physical jamming attack under AODV on the basis of throughput Fig 4. Delay of the network with the proposed approach under 2203

4.3 Comparison of the results received from the pro-posed mechanism to the available techniques- USM and under : The available techniques were also simulated in OPNET Simulator. Following graphs display that USM was better than in terms of the throughput but could not deal with the problem of enhanced delay. However the graphs drawn above, depict that the suggested mechanism provides better results as compared to and USM technique in terms of throughput and delay. 1 Throughput in bits/sec 2 Delay in seconds highest Less than propose-d scheme and larger than Larger Less than than proposed and less scheme but than USM more than least least Table 3: Value based Comparison of the simulation results of the suggested mechanism with and USM under s.no Parameters used 1 Throughput in bits/sec 2 Delay in seconds Proposed scheme Near about 4,000,000 USM Near about 2,200,000 25 Near about 50 s Near about 1,600,000 10 Fig 5. Throughput of USM and under AODV protocol CONCLUSION A network-wide security is needed for the VANETs. So, for serving the aim, jamming attack must be detected. Several researchers attempt to discover the solution and did well in their attempts by offering us with various techniques. For improving the throughput and reducing the delay, an improved Detection mechanism is suggested which came out to be predicting, both in terms of delay and throughput, when compared to USM and. For demonstrating this, the results of the suggested mechanism were examined and compared under AODV in OPNET SIMULATOR. REFERENCES Fig 6. Delay of USM and under Table 3: Theoretical Comparison of the simulation results of the suggested mechanism with and USM under S.no Parameters used Proposed Scheme USM [1] W. Xu, W. Trappe, Y. Zhang, T. Wood, The feasibility of launching and detecting jamming attacks in wireless networks, in MobiHoc 05: Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, pp. 46 57, 2005. [2] D. Chen, J. Deng, and P. K. Varshney, Protecting wireless networks against a denial of service attack based on virtual jamming, in MO-BICOM -Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking, ACM, 2003. [3] D. Thuente, M. Acharya, Intelligent jamming in wireless networks with applications to 802.11b and other networks, in Proceedings of the 25th IEEE Communications Society 2204

Military Communications Conference (MIL-COM), October 2006. [4] Chiang, J. T.; Hu, Y. C.; Cross-layer jamming detection and mitigation in wireless broadcast networks, in Proc. 13th Annu. ACM MobiCom, Montréal, QC, Canada, pp. 346 349, 2007. [5] R. L. Pickholtz, D. L. Schilling, L. B. Milstein, Theory of spread spec-trum communications A tutorial, in IEEE Trans. Commun., vol. COM-30, no. 5, pt. 2, pp. 855 884, May 1982. [6] M. Strasser, S. Capkun, C. Pöpper, M. Cagalj, Jammingresistant key establishment using uncoordinated frequency hopping, in Proc. IEEE Symp. Security Privacy, Berkley, CA, pp. 64 78, May 2008. [7] W. Xu, W. Trappe, Y. Zhang, Jamming Sensor Networks: Attacks and Defense Strategies, in IEEE Network, May/June 2006. [8] T. X. Brown, J. E. James, A. Sethi, Jamming and Sensing of Encrypted Wireless Ad Hoc Networks, in MobiHoc06, Florence, Italy. [9] M. Li, I. Koutsopoulos, R. Pooverdan, Optimal Jamming sattacks and Network Defenses Policies in Wireless Sensor Networks, in Proceedings of IEEE INFOCOM, 2007. [10] A. Sampath, H. Dai, H. Zheng, B. Y. Zhao, Multichannel Jamming Attacks using Cognitive Radios, in IEEE ICCCN, 2007 [11] K. Pelechrinis, I.Broustis, S.V. Krishnamurthy, C. Gkantsidis, ARES: an Anti-jamming Reinforcement System for 802.11 Networks, in ACM CoNEXT, 2009. [12] W. Xu, W. Trappe, Y. Zhang, Anti-jamming Timing Channels for Wireless Networks, in ACM WiSec, 2008. [13] I. Martinovic, P. Pichota, J. B. Schmitt, Jamming for Good: A Fresh Approach to Authentic Communication in WSNs, in ACM WiSec, 2009. [14] A.; Mpitziopoulos, D. Gavalas, C. Konstantopoulos, G. Pantziou, A Survey on Jamming Attacks and Countermeasures in WSNs, in IEEE Communications Surveys and Tutorials, Vol. 11, no. 4, 2009. [15] Michelle X. Gong, Scott F. Midkiff, Shiwen Mao A Cross-layer Approach to Channel Assignment in Wireless Ad Hoc Networks, in Journal of Mobile Networks and Applications, Vol. 12, No. 1, pg 43-56, Feb. 2007. 2205