SlideShare a Scribd company logo
International Journal of Computer Applications (0975 – 8887)
                                                                                                Volume 57– No.23, November 2012


              A Survey on Preventing Jamming Attacks in
                       Wireless Communication
        R.Saranyadevi                                        M.Shobana                                    D.Prabakar
    SNS College of Technology                         SNS College of Technology                    SNS College of Technology
       Department of CSE                                 Department of CSE                            Department of CSE
      Coimbatore-641035                                 Coimbatore-641035                            Coimbatore-641035




ABSTRACT                                                              MAC layer etiquette. Being constant to the transfer it does not
                                                                      wait for the channel to become idle.
Communication in wireless network is possible with an air
medium. Due to the high security threats in this system, the          Deceptive Jammer
network may face various difficulties. One of the major threat
is jamming attack which comes under Denial Of Service                 This jammer constantly injects series packets into the channel.
(DOS) attack. Jamming attack is common among many                     Packets will deceive Normal nodes. Jammer will pass the
exploits that compromises the wireless environment. The               preambles out to the network and just check the preamble and
work of authorized users is by denying service to as legitimate       remain silent
traffic is jammed by the overwhelming frequencies of                  Random Jammer
illegitimate traffic.In order to mitigate the impact of jamming,
three techniques are being used: (a) how to thwart jamming in         This method alternates sleeping and jamming with intervals of
control channel (b) An Anti-jamming broadcast                         time. After jamming for tj units of time, it switch-off its radio
communication using Uncoordinated Spread Spectrum (USS)               and enters sleeping mode. The jammer after sleeping for ts
technique (c) Mitigating jamming impact in timing channel.            units of time wakes up and resumes jamming. Both time tj and
We analyse these methods for reducing jamming inside a                ts is either random or fixed.
network.
                                                                      Reactive Jammer
KEYWORDS:
                                                                      This method will stay the jammer quiet when the channel is
Jamming attacks, Spread spectrum, Control channel, Timing             idle. Transmitting the signal as soon as it senses activity on
channel                                                               the channel is regularly one. In order to sense the channel
                                                                      jammer is ON all time and it do not consume energy.
1.INTRODUCTION
                                                                      Anti jamming process involves the jammer to utilise
Wireless communication is meant for transferring information          continuous or random transmission of high-power interference
of any kind between two or more points that are not physically        signal with two steps. Initially the jammer expands the energy
connected. It is a method of communication using a radio              into jam frequency bands of interest. Next, the continuous
signal frequency that relies among computers and other                flow of high interference levels detects the type of attack.
devices. Few examples are Mobile, WI-Fi-, Bluetooth. As the           Antijamming rely on spread spectrum(SS) communication
data communication is done through wireless medium we may             like spatial retreats. It provides bit-level protection as
face several security threats. One of these vulnerable threats is     according to the secret pseudonoise (PN) code. However, this
Denial of Service. It is an attempt of making the users not           method suits only for external threat model. In internal threat
possible to use the network resources. Therefore, reducing            model the intended receivers knows the secrets to protect
those threats in wireless networks without any data loss or           transmission and so the broadcasting communication is
modification is necessary.                                            vulnerable.
As well, all the communication in a wireless medium is
interrupted or disturbed through a major and familiar attack
called as Jamming attack. A jammer is prevailing under this
communication that interfere the physical transmission and
reception. It continuously emits Radio Frequency (RF) signals
that block the legitimate traffic (see FIG 1). Jamming is done
by two forms. One is the External threat model in which the
jammer is not a part in the network security threat .The other
one is Internal threat model which sustains the jammer as a                               Fig 1.Jamming Attack
part of the network.
                                                                      2.CONTROL                CHANNEL               JAMMING
There are several Jamming Attack Models. They are Constant            ATTACKS
Jammer, Deceptive Jammer, Random Jammer, and Reactive
Jammer.                                                               Inside a wireless network the Collection of nodes organised
                                                                      together requires a critical network function such as a
Constant Jammer:                                                      neighbor discovery, channel access and assignment, routing
                                                                      and time synchronization. Control channels are the functions
This model continuously emits a radio signal and it transmits         used in a broadcast channel that are coordinated by
random bits of data to the channel. It does not follow any            exchanging messages.




                                                                                                                                     1
International Journal of Computer Applications (0975 – 8887)
                                                                                             Volume 57– No.23, November 2012

The jammer blocks all control information within the range         function. It is followed by a unique hopping sequence which
Rmax by jamming a single frequency band. (Fig 2 )                  is not known to the other nodes. Adversary uses a compromise
                                                                   node for sharing the information of the control channel
                                                                   without the knowledge of the sender and the receiver during
                                                                   hopping process. If the jammer tries to capture the hopping
                                                                   sequence of a declared compromise node, then the node will
                                                                   be identified by the implemented method. Therefore, the CH
                                                                   available inside the cluster updates the hopping sequences of
                                                                   all the nodes except the compromised node. Disadvantages of
                                                                   this technique is increased path length need more gateways. It
                                                                   also require higher battery consumption with more path
                                                                   breaks.

                                                                   3. JAMMING IN BROADCAST
                                                                   COMMUNICATION
                                                                   Safety and critical wireless transmissions such as emergency
        Fig 2: CONTROL CHANNEL JAMMING                             alerts and navigation signals represents a common way to
                                                                   achieve anti-jamming communication. Under this crisis a
A new cluster based architecture is being implemented to           Spread Spectrum (SS) for Anti-jamming is used for reducing
mitigate the impact of jamming attack by partitioning the          the threat of attackers. This method can be used both in
network into set of clusters.(Fig 3) The control channels of the   commercial and military applications.
network are controlled by the corresponding clusters. In this
method, the node of their corresponding clusters receives the      SS uses data-independent, random sequences for spreading
control messages from their members, and the node at the           out a narrow band signal in a wide bandwidth. Some of the
boundaries of multiple clusters receives messages from the         main stages of SS are Frequency Hopping (FH) and Direct-
associated control channels.                                       Sequence Spread Spectrum (DSSS). This stage may share a
                                                                   secret prior to their prescribed communication. It enables the
Each cluster is having a clusterhead (CHs) and they are            receiver to generate a random sequence for detecting and
responsible for the establishment and maintenance of the           decoding the spread signal. Whenever a base station
control channel inside that particular cluster. It is the major    broadcasts a signal to multiple receivers, it shares a secret
activity to mitigate jamming and hence it is temporarily           prior to the communication and the secret must be hidden
assigned that rotates periodically. There are several methods      from the attacker.(Fig 4) This method of jamming a network
available for establishment of a control channel that mitigates    in hopping is called as Anti-jamming broadcast problem. In
jamming which organises a wireless network into clusters and       order to overcome this, a method is being implemented called
electing their own CHs.                                            as     Uncoordinated       Spread   Spectrum(USS)technique.
Our method consists of five phases,(a) hopping




                                                                    Fig 4.Principle of Uncoordinated Spread Spectrum(USS)
                                                                                           techniques

           Fig 3.Cluster region with clusterhead
                                                                   A. Uncoordinated Frequency Hopping (Ufh)
Sequence generation, (b) hopping sequence assignment, (c)          This method opposes the system of coordinated frequency
control channel access, (d) compromised node identification.       hopping which shares the secrets prior to any communication.
In order to adjust the hopping sequence, an intermediate step      So, UFH do not share any secret before to communication.
is essential for all the dynamic spectrum networks. This
allocation is done as according to the current channel
availability.

A. HOPPING SEQUENCE IN CONTROL
CHANNEL
As said in the previous section, consider a cluster and a
clusterhead of that specified range where each node is
available. Inside a cluster let us assume a current control
channel is jammed by an adversary. The major objective of
this method is that, the hopping between channels are done by
having each node in the cluster to be in a pseudo-random                         Fig 5.Stages of UFH techniques.




                                                                                                                               2
International Journal of Computer Applications (0975 – 8887)
                                                                                            Volume 57– No.23, November 2012

The sender A and receiver Bi choose the set C of available        Initially, the 4-Ounce Overlay creates the overlay that are
frequency. In this, data 5 and 1 are transmitted successfully.    detected by failed packet reception events. The further
Messages are fragmented to fit on a frequency hop. During         conveyance of information is done through two steps: (1)
transmission, messages and packets are encoded. After             Even in presence of interference signal a node must detect a
reception, it is decoded and reassembled.(Fig 5)                  failed packet reception; (2) mapping the failed packets into the
                                                                  information to be delivered.
                                                                  By detecting and analysing the timing of failed packet
                                                                  reception at the receiver it is possible to transfer data by
                                                                  monitoring the signal strength. It is proposed then using an
                                                                  inter arrival codes for building a single-sender, single receiver
                                                                  timing channel.

                                                                  5. CONCLUSION
                                                                  In this paper, the three crucial techniques for mitigating the
                                                                  jamming attack were discussed: (1) Cluster based architecture;
                                                                  (2) Spread Spectrum-Uncoordinated Frequency Hopping; (3)
                                                                  Timing channel. Under this survey, it is concluded that all the
    Fig 6. UFH packet reception and reassembly at Bi
                                                                  methods uses several terminologies for frequency hopping in
It represents the UFH message reassembly in which the black       the presence of an adversary and the successful conveyance of
packets are the original data sent successfully and gray          any data. In this paper, the technique used is crucially adapted
packets were inserted by the attacker using a fragment            for safety applications like emergency alert broadcasts or
number(and message id).(Fig 6)                                    dissemination of navigation signals in adversarial settings.
                                                                  Here, mission-critical messages are broadcast to a huge and
4. TIMING CHANNEL                                                 unknown number of receivers that rely on the availability,
COMMUNICATION                                                     integrity and authenticity of the message content.

In our previous methods, jammer attacks the network and the       6. REFERENCES
remaining nodes only can transfer data. In this, the data must
                                                                  [1] X. Zhang and L. Jacob, “Multicast Zone Routing
be transferred even the interrupts of a jammer or an adversary
                                                                      Protocol in Mobile Ad Hoc Wireless Networks,” Proc.
is present. The other alternate way is that , the data
                                                                      Local Computer Networks (LCN ’03), Oct.2003.
transmission should be over headed in some other channel not
relevant to the jammer. In spite of the presence of jammer, the   [2] X. Xiang and X. Wang, “An Efficient Geographic
timing channels are built so as to suppress the activity of           Multicast Protocol for Mobile Ad Hoc Networks,”Proc.
jammer and establish the timing channel for data                      IEEE Int’l Symp. World of Wireless,Mobile and
communication. By detecting the failure packet events and             Multimedia Networks (WoWMoM),June 2006.
detecting the failures, the physical and data link layers
provides link for a reliable communication. Even disrupts the     [3] X. Xiang, Z. Zhou, and X. Wang, “Self-Adaptive On
two layers, it is possible to create a low-rate overlay between       Demand Geographic Routing Protocols for Mobile Ad
the data link and network layer. The components required for          Hoc Networks,” Proc. IEEE INFOCOM, May 2007.
this overlay is called as 4-Ounce Overlay.(Fig 7) This            [4] X. Xiang, X. Wang, and Y. Yang. Supporting efficient
certainly replaces the functionality of the physical and link         and scalable multicasting over mobile adhoc networks,
layer.                                                                IEEE TRANSACTIONS ON MOBILE COMPUTING,
                                                                      VOL. 10, NO. 4, April 2011.
                                                                  [5] Kaan Bur, Cem Erosy, “Ad Hoc quality of service
                                                                      multicast routings”, Computer communications, Vol. 29,
                                                                      2005, pp. 136-148.
                                                                  [6] Hui Cheng a, Jiannong Cao, Xingwei Wang, ”A fast and
                                                                      efficient multicast algorithm for QoS group
                                                                      communications in heterogeneous network”, Computer
                                                                      communications, Elsevier, Vol. 30, 2007 pp. 2225-2235.
                Fig 7. The 4-Ounce Overlay                        [7] Khalid A. Farhan, ”Network sender multicast routing
                                                                      protocol”, Proceedings of seventh IEEE International
                                                                      conference on networking, 2008,   pp.60-65.




                                                                                                                                 3

More Related Content

PDF
International Journal of Engineering Research and Development (IJERD)
PDF
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
PDF
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
PDF
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
PDF
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...
PDF
Successful interference cancellation with Blind Equalization method for MC-CD...
PPT
RADAR Jamming and Anti-Jamming
PDF
International Journal of Computational Engineering Research(IJCER)
International Journal of Engineering Research and Development (IJERD)
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...
Successful interference cancellation with Blind Equalization method for MC-CD...
RADAR Jamming and Anti-Jamming
International Journal of Computational Engineering Research(IJCER)

What's hot (19)

PPTX
Jammers&anti jammers
PDF
Congestion detection for video traffic
PPT
Multiple acces techniques
PDF
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
PPTX
Multiplexing in mobile computing
PPT
Call Admission Control In Mobile Wireless Networks
PDF
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
PDF
VFDM for single user
PPT
Test
PPTX
Demand assigned and packet reservation multiple access
PDF
Lec7 cellular network
PDF
Wireless Control Systems - from theory to a tool chain, Mikael Björkbom, Aalt...
PPT
Prioritizing handoffs
PPTX
4.fdm,tdm,tfm
PPTX
TDMA Time Division Multiple Access
PDF
Jammers in wsn
DOCX
Cdma and 3 g
PDF
Iaetsd performance analysis of multicarrier ds-cdma
Jammers&anti jammers
Congestion detection for video traffic
Multiple acces techniques
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
Multiplexing in mobile computing
Call Admission Control In Mobile Wireless Networks
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
VFDM for single user
Test
Demand assigned and packet reservation multiple access
Lec7 cellular network
Wireless Control Systems - from theory to a tool chain, Mikael Björkbom, Aalt...
Prioritizing handoffs
4.fdm,tdm,tfm
TDMA Time Division Multiple Access
Jammers in wsn
Cdma and 3 g
Iaetsd performance analysis of multicarrier ds-cdma
Ad

Similar to Ij a survey on preventing jamming attacks in wireless communication (20)

PDF
3 packet-hiding methods for preventing selective
PDF
Antijam ipsn09
PDF
Dn36682688
PDF
I030102056063
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
Packet hiding methods for preventing selective
PPTX
Packet hiding methods for preventing selective jamming attacks
PDF
Packet hiding methods for preventing selective jamming attacks
DOCX
Combining cryptographic primitives to prevent jamming attacks in wireless net...
PDF
G0261041046
PDF
G0261041046
PDF
International Journal of Engineering and Science Invention (IJESI)
PDF
D43021519
PDF
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
PDF
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
PDF
Packet hiding methods for preventing selective jamming attacks
PPT
attack-and-defence-in-radio-and-communication-warfare-by-akib-sayyad.ppt
DOC
Mitigation and control of Defeating Jammers using P-1 Factorization
DOCX
Abstract
PDF
International Journal of Computational Engineering Research(IJCER)
3 packet-hiding methods for preventing selective
Antijam ipsn09
Dn36682688
I030102056063
International Journal of Engineering Research and Development (IJERD)
Packet hiding methods for preventing selective
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
Combining cryptographic primitives to prevent jamming attacks in wireless net...
G0261041046
G0261041046
International Journal of Engineering and Science Invention (IJESI)
D43021519
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
Packet hiding methods for preventing selective jamming attacks
attack-and-defence-in-radio-and-communication-warfare-by-akib-sayyad.ppt
Mitigation and control of Defeating Jammers using P-1 Factorization
Abstract
International Journal of Computational Engineering Research(IJCER)
Ad

Ij a survey on preventing jamming attacks in wireless communication

  • 1. International Journal of Computer Applications (0975 – 8887) Volume 57– No.23, November 2012 A Survey on Preventing Jamming Attacks in Wireless Communication R.Saranyadevi M.Shobana D.Prabakar SNS College of Technology SNS College of Technology SNS College of Technology Department of CSE Department of CSE Department of CSE Coimbatore-641035 Coimbatore-641035 Coimbatore-641035 ABSTRACT MAC layer etiquette. Being constant to the transfer it does not wait for the channel to become idle. Communication in wireless network is possible with an air medium. Due to the high security threats in this system, the Deceptive Jammer network may face various difficulties. One of the major threat is jamming attack which comes under Denial Of Service This jammer constantly injects series packets into the channel. (DOS) attack. Jamming attack is common among many Packets will deceive Normal nodes. Jammer will pass the exploits that compromises the wireless environment. The preambles out to the network and just check the preamble and work of authorized users is by denying service to as legitimate remain silent traffic is jammed by the overwhelming frequencies of Random Jammer illegitimate traffic.In order to mitigate the impact of jamming, three techniques are being used: (a) how to thwart jamming in This method alternates sleeping and jamming with intervals of control channel (b) An Anti-jamming broadcast time. After jamming for tj units of time, it switch-off its radio communication using Uncoordinated Spread Spectrum (USS) and enters sleeping mode. The jammer after sleeping for ts technique (c) Mitigating jamming impact in timing channel. units of time wakes up and resumes jamming. Both time tj and We analyse these methods for reducing jamming inside a ts is either random or fixed. network. Reactive Jammer KEYWORDS: This method will stay the jammer quiet when the channel is Jamming attacks, Spread spectrum, Control channel, Timing idle. Transmitting the signal as soon as it senses activity on channel the channel is regularly one. In order to sense the channel jammer is ON all time and it do not consume energy. 1.INTRODUCTION Anti jamming process involves the jammer to utilise Wireless communication is meant for transferring information continuous or random transmission of high-power interference of any kind between two or more points that are not physically signal with two steps. Initially the jammer expands the energy connected. It is a method of communication using a radio into jam frequency bands of interest. Next, the continuous signal frequency that relies among computers and other flow of high interference levels detects the type of attack. devices. Few examples are Mobile, WI-Fi-, Bluetooth. As the Antijamming rely on spread spectrum(SS) communication data communication is done through wireless medium we may like spatial retreats. It provides bit-level protection as face several security threats. One of these vulnerable threats is according to the secret pseudonoise (PN) code. However, this Denial of Service. It is an attempt of making the users not method suits only for external threat model. In internal threat possible to use the network resources. Therefore, reducing model the intended receivers knows the secrets to protect those threats in wireless networks without any data loss or transmission and so the broadcasting communication is modification is necessary. vulnerable. As well, all the communication in a wireless medium is interrupted or disturbed through a major and familiar attack called as Jamming attack. A jammer is prevailing under this communication that interfere the physical transmission and reception. It continuously emits Radio Frequency (RF) signals that block the legitimate traffic (see FIG 1). Jamming is done by two forms. One is the External threat model in which the jammer is not a part in the network security threat .The other one is Internal threat model which sustains the jammer as a Fig 1.Jamming Attack part of the network. 2.CONTROL CHANNEL JAMMING There are several Jamming Attack Models. They are Constant ATTACKS Jammer, Deceptive Jammer, Random Jammer, and Reactive Jammer. Inside a wireless network the Collection of nodes organised together requires a critical network function such as a Constant Jammer: neighbor discovery, channel access and assignment, routing and time synchronization. Control channels are the functions This model continuously emits a radio signal and it transmits used in a broadcast channel that are coordinated by random bits of data to the channel. It does not follow any exchanging messages. 1
  • 2. International Journal of Computer Applications (0975 – 8887) Volume 57– No.23, November 2012 The jammer blocks all control information within the range function. It is followed by a unique hopping sequence which Rmax by jamming a single frequency band. (Fig 2 ) is not known to the other nodes. Adversary uses a compromise node for sharing the information of the control channel without the knowledge of the sender and the receiver during hopping process. If the jammer tries to capture the hopping sequence of a declared compromise node, then the node will be identified by the implemented method. Therefore, the CH available inside the cluster updates the hopping sequences of all the nodes except the compromised node. Disadvantages of this technique is increased path length need more gateways. It also require higher battery consumption with more path breaks. 3. JAMMING IN BROADCAST COMMUNICATION Safety and critical wireless transmissions such as emergency Fig 2: CONTROL CHANNEL JAMMING alerts and navigation signals represents a common way to achieve anti-jamming communication. Under this crisis a A new cluster based architecture is being implemented to Spread Spectrum (SS) for Anti-jamming is used for reducing mitigate the impact of jamming attack by partitioning the the threat of attackers. This method can be used both in network into set of clusters.(Fig 3) The control channels of the commercial and military applications. network are controlled by the corresponding clusters. In this method, the node of their corresponding clusters receives the SS uses data-independent, random sequences for spreading control messages from their members, and the node at the out a narrow band signal in a wide bandwidth. Some of the boundaries of multiple clusters receives messages from the main stages of SS are Frequency Hopping (FH) and Direct- associated control channels. Sequence Spread Spectrum (DSSS). This stage may share a secret prior to their prescribed communication. It enables the Each cluster is having a clusterhead (CHs) and they are receiver to generate a random sequence for detecting and responsible for the establishment and maintenance of the decoding the spread signal. Whenever a base station control channel inside that particular cluster. It is the major broadcasts a signal to multiple receivers, it shares a secret activity to mitigate jamming and hence it is temporarily prior to the communication and the secret must be hidden assigned that rotates periodically. There are several methods from the attacker.(Fig 4) This method of jamming a network available for establishment of a control channel that mitigates in hopping is called as Anti-jamming broadcast problem. In jamming which organises a wireless network into clusters and order to overcome this, a method is being implemented called electing their own CHs. as Uncoordinated Spread Spectrum(USS)technique. Our method consists of five phases,(a) hopping Fig 4.Principle of Uncoordinated Spread Spectrum(USS) techniques Fig 3.Cluster region with clusterhead A. Uncoordinated Frequency Hopping (Ufh) Sequence generation, (b) hopping sequence assignment, (c) This method opposes the system of coordinated frequency control channel access, (d) compromised node identification. hopping which shares the secrets prior to any communication. In order to adjust the hopping sequence, an intermediate step So, UFH do not share any secret before to communication. is essential for all the dynamic spectrum networks. This allocation is done as according to the current channel availability. A. HOPPING SEQUENCE IN CONTROL CHANNEL As said in the previous section, consider a cluster and a clusterhead of that specified range where each node is available. Inside a cluster let us assume a current control channel is jammed by an adversary. The major objective of this method is that, the hopping between channels are done by having each node in the cluster to be in a pseudo-random Fig 5.Stages of UFH techniques. 2
  • 3. International Journal of Computer Applications (0975 – 8887) Volume 57– No.23, November 2012 The sender A and receiver Bi choose the set C of available Initially, the 4-Ounce Overlay creates the overlay that are frequency. In this, data 5 and 1 are transmitted successfully. detected by failed packet reception events. The further Messages are fragmented to fit on a frequency hop. During conveyance of information is done through two steps: (1) transmission, messages and packets are encoded. After Even in presence of interference signal a node must detect a reception, it is decoded and reassembled.(Fig 5) failed packet reception; (2) mapping the failed packets into the information to be delivered. By detecting and analysing the timing of failed packet reception at the receiver it is possible to transfer data by monitoring the signal strength. It is proposed then using an inter arrival codes for building a single-sender, single receiver timing channel. 5. CONCLUSION In this paper, the three crucial techniques for mitigating the jamming attack were discussed: (1) Cluster based architecture; (2) Spread Spectrum-Uncoordinated Frequency Hopping; (3) Timing channel. Under this survey, it is concluded that all the Fig 6. UFH packet reception and reassembly at Bi methods uses several terminologies for frequency hopping in It represents the UFH message reassembly in which the black the presence of an adversary and the successful conveyance of packets are the original data sent successfully and gray any data. In this paper, the technique used is crucially adapted packets were inserted by the attacker using a fragment for safety applications like emergency alert broadcasts or number(and message id).(Fig 6) dissemination of navigation signals in adversarial settings. Here, mission-critical messages are broadcast to a huge and 4. TIMING CHANNEL unknown number of receivers that rely on the availability, COMMUNICATION integrity and authenticity of the message content. In our previous methods, jammer attacks the network and the 6. REFERENCES remaining nodes only can transfer data. In this, the data must [1] X. Zhang and L. Jacob, “Multicast Zone Routing be transferred even the interrupts of a jammer or an adversary Protocol in Mobile Ad Hoc Wireless Networks,” Proc. is present. The other alternate way is that , the data Local Computer Networks (LCN ’03), Oct.2003. transmission should be over headed in some other channel not relevant to the jammer. In spite of the presence of jammer, the [2] X. Xiang and X. Wang, “An Efficient Geographic timing channels are built so as to suppress the activity of Multicast Protocol for Mobile Ad Hoc Networks,”Proc. jammer and establish the timing channel for data IEEE Int’l Symp. World of Wireless,Mobile and communication. By detecting the failure packet events and Multimedia Networks (WoWMoM),June 2006. detecting the failures, the physical and data link layers provides link for a reliable communication. Even disrupts the [3] X. Xiang, Z. Zhou, and X. Wang, “Self-Adaptive On two layers, it is possible to create a low-rate overlay between Demand Geographic Routing Protocols for Mobile Ad the data link and network layer. The components required for Hoc Networks,” Proc. IEEE INFOCOM, May 2007. this overlay is called as 4-Ounce Overlay.(Fig 7) This [4] X. Xiang, X. Wang, and Y. Yang. Supporting efficient certainly replaces the functionality of the physical and link and scalable multicasting over mobile adhoc networks, layer. IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 4, April 2011. [5] Kaan Bur, Cem Erosy, “Ad Hoc quality of service multicast routings”, Computer communications, Vol. 29, 2005, pp. 136-148. [6] Hui Cheng a, Jiannong Cao, Xingwei Wang, ”A fast and efficient multicast algorithm for QoS group communications in heterogeneous network”, Computer communications, Elsevier, Vol. 30, 2007 pp. 2225-2235. Fig 7. The 4-Ounce Overlay [7] Khalid A. Farhan, ”Network sender multicast routing protocol”, Proceedings of seventh IEEE International conference on networking, 2008, pp.60-65. 3