SlideShare a Scribd company logo
Packet-Hiding Methods for
   Preventing Selective
    Jamming Attacks
        PRESENTED BY




CONTACT: (0) 9952649690
PRESENTED BY


        JP INFOTECH,

           BLOG:
WWW.JPINFOTECH.BLOGSPT.COM

          EMAIL:
JPIFNOTECHPROJECTS@GMAIL
           .COM

    CONTACT: (0) 9952649690
ABSTRACT

• In this work, we address the problem of selective jamming attacks in
  wireless networks. In these attacks, the adversary is active only for a short
  period of time, selectively targeting messages of high importance. We
  illustrate the advantages of selective jamming in terms of network
  performance degradation and adversary effort by presenting two case
  studies; a selective attack on TCP and one on routing.

• We show that selective jamming attacks can be launched by performing
  real-time packet classification at the physical layer. To mitigate these
  attacks, we develop three schemes that prevent real-time packet
  classification by combining cryptographic primitives with physical-layer
  attributes. We analyze the security of our methods and evaluate their
  computational and communication overhead.
AIM

• To show that selective jamming attacks can be
  launched by performing real time packet
  classification at the physical layer. To mitigate
  these attacks develop a schemes that prevent
  real-time packet classification by combining
  cryptographic primitives with physical layer
  attributes.
SYNOPSIS

• To address the problem of jamming under an internal threat
  model and consider a sophisticated adversary who is aware of
  network secrets and the implementation details of network
  protocols at any layer in the network stack. The adversary
  exploits his internal knowledge for launching selective
  jamming attacks in which specific messages of high
  importance are targeted. For example, a jammer can target
  route-request/route-reply messages at the routing layer to
  prevent route discovery, or target TCP acknowledgments in a
  TCP session to severely degrade the throughput of an end-to-
  end flow.
ARCHITECTURE
   Node                   Node               Cach
   A                      B                  e
                                             Node
              Node Path                           Encryption
                                    Node C        using 1 of
   Jam
   mer                                            3
   Node                                           schemes.


Blocks
Route
request and                                  Decryption
reply                                        of message.
                Intermediate
                Server
                (Checks the Inter
                Node’s)
                                             DB

                     Server
                 (webService
                 Request)


                           Webservice
                           req/rec
Application
EXISTING SYTEM

• Conventional anti-jamming techniques rely
  extensively     on    spread-spectrum      (SS)
  communications or some form of jamming
  evasion (e.g., slow frequency hopping, or
  spatial retreats). SS techniques provide bit-
  level protection by spreading bits according to
  a secret pseudo-noise (PN) code, known only
  to the communicating parties. These methods
  can only protect wireless transmissions under
  the external threat model.
DISADVANTAGES OF EXISTING
           SYSTEM
• Broadcast communications are particularly
  vulnerable under an internal threat model
  because all intended receivers must be aware
  of the secrets used to protect transmissions.
• Hence, the compromise of a single receiver is
  sufficient to reveal relevant cryptographic
  information.
PROPOSED SYSTEM

• An intuitive solution to selective jamming
  would be the encryption of transmitted
  packets (including headers) with a static key.
  However, for broadcast communications, this
  static decryption key must be known to all
  intended receivers and hence, is susceptible to
  compromise. Moreover, even if the encryption
  key of a hiding scheme were to remain secret,
  the static portions of a transmitted packet
  could potentially lead to packet classification.
ADVANTAGES OF PROPOSED
            SYSTEM
• Relatively easy to actualize by exploiting knowledge
  of network protocols and cryptographic primitives
  extracted from compromised nodes

• Our findings indicate that selective jamming attacks
  lead to a DoS with very low effort on behalf of the
  jammer.

• Achieve strong security properties
MODULES

•   Real Time Packet Classification
•   A Strong Hiding Commitment Scheme
•   Cryptographic Puzzle Hiding Scheme
•   Hiding based on All-Or-Nothing
    Transformations
Real Time Packet Classification:

• At the Physical layer, a packet m is encoded,
  interleaved, and modulated before it is transmitted
  over the wireless channel. At the receiver, the signal
  is demodulated, deinterleaved and decoded to
  recover the original packet m. Nodes A and B
  communicate via a wireless link. Within the
  communication range of both A and B there is a
  jamming node J. When A transmits a packet m to B,
  node J classifies m by receiving only the first few
  bytes of m. J then corrupts m beyond recovery by
  interfering with its reception at B.
A Strong Hiding Commitment
             Scheme
• A strong hiding commitment scheme (SHCS),
  which is based on symmetric cryptography.
  Assume that the sender has a packet for
  Receiver. First, S constructs commit( message )
  the commitment function is an off-the-shelf
  symmetric encryption algorithm is a publicly
  known permutation, and k is a randomly
  selected key of some desired key length s (the
  length of k is a security parameter). Upon
  reception of d, any receiver R computes.
Cryptographic Puzzle Hiding
               Scheme
• A sender S have a packet m for transmission. The sender
  selects a random key k , of a desired length. S generates a
  puzzle (key, time), where puzzle() denotes the puzzle
  generator function, and tp denotes the time required for the
  solution of the puzzle. Parameter is measured in units of time,
  and it is directly dependent on the assumed computational
  capability of the adversary, denoted by N and measured in
  computational operations per second. After generating the
  puzzle P, the sender broadcasts (C, P). At the receiver side, any
  receiver R solves the received puzzle to recover key and then
  computes.
Hiding based on All-Or-Nothing
         Transformations
• The packets are pre-processed by an AONT
  before transmission but remain unencrypted.
  The jammer cannot perform packet
  classification until all pseudo-messages
  corresponding to the original packet have
  been received and the inverse transformation
  has been applied.
CONCLUSION:

• We evaluated the impact of selective jamming
  attacks on network protocols such as TCP and
  routing. Our findings show that a selective
  jammer can significantly impact performance
  with very low effort. We developed three
  schemes that transform a selective jammer to
  a random one by preventing real-time packet
  classification.
REFERENCE:

• Alejandro Proan˜o and Loukas Lazos, “Packet-
  Hiding Methods for Preventing Selective
  Jamming Attacks” IEEE TRANSACTIONS ON
  DEPENDABLE AND SECURE COMPUTING,
  VOL. 9, NO. 1, JANUARY/FEBRUARY 2012.
WWW.JPINFOTECH.BLOGSPOT.COM



         PRESENTED BY




  CONTACT: (0) 9952649690

More Related Content

DOCX
Abstract
DOCX
Combining cryptographic primitives to prevent jamming attacks in wireless net...
PDF
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
PDF
3 packet-hiding methods for preventing selective
PPTX
Preventing jamming attack by combining cryptography
PPTX
Packet hiding methods for preventing selective jamming attacks
PPTX
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
Abstract
Combining cryptographic primitives to prevent jamming attacks in wireless net...
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
3 packet-hiding methods for preventing selective
Preventing jamming attack by combining cryptography
Packet hiding methods for preventing selective jamming attacks
Packet-Hiding Methods: To Prevent Selective Jamming Attacks

What's hot (20)

PPT
Wireless sensor networks
PDF
Packet hiding methods for preventing selective
PDF
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
DOC
muti path encrypted data security architecture for mobile adhoc networks
PDF
Hiding message from hacker using novel network techniques
PDF
Packet hiding methods for preventing selective jamming attacks
PDF
Prevention of Packet Hiding Methods In Selective Jamming Attack
PDF
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
DOCX
Minimum cost blocking problem in multi path wireless routing protocols
PDF
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
DOC
A precise termination condition of the probabilistic packet marking algorithm...
PDF
Ijnsa050211
PPTX
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
PDF
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
PDF
20080502 software verification_sharygina_lecture03
PDF
An enhanced ip traceback mechanism for tracking the attack source using packe...
PPTX
Grayhole
PDF
A43030104
PDF
AODV protocol and Black Hole attack
Wireless sensor networks
Packet hiding methods for preventing selective
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
muti path encrypted data security architecture for mobile adhoc networks
Hiding message from hacker using novel network techniques
Packet hiding methods for preventing selective jamming attacks
Prevention of Packet Hiding Methods In Selective Jamming Attack
A Neighbor Coverage-Based Probabilistic Rebroadcast for Reducing Routing Ove...
Minimum cost blocking problem in multi path wireless routing protocols
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
A precise termination condition of the probabilistic packet marking algorithm...
Ijnsa050211
AN INTRODUCTION TO NETWORK ADDRESS SHUFFLING
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
20080502 software verification_sharygina_lecture03
An enhanced ip traceback mechanism for tracking the attack source using packe...
Grayhole
A43030104
AODV protocol and Black Hole attack
Ad

Viewers also liked (16)

DOCX
Twitsper tweeting privately
PPTX
Protecting location privacy in sensor networks against a global eavesdropper
PDF
2012 13 ieee dotnet titles- jp infotech
DOCX
Generating summary risk scores for mobile applications
DOCX
A secure erasure code based cloud storage system with secure data forwarding
PPT
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
DOCX
Cloud mov cloud based mobile social tv
DOCX
A distributed control law for load balancing in content delivery networks
DOCX
Social tube p2p assisted video sharing inonline social networks
DOCX
A novel data embedding method using adaptive pixel pair matching
DOCX
Whole test suite generation
DOCX
Back pressure-based packet-by-packet adaptive routing in communication networks
DOCX
A framework for routing performance analysis in delay tolerant networks with ...
DOC
2012-2013 IEEE JAVA PROJECT TITLES
PDF
2015 2016 ieee java project titles
DOCX
A low complexity congestion control and scheduling algorithm for multihop wir...
Twitsper tweeting privately
Protecting location privacy in sensor networks against a global eavesdropper
2012 13 ieee dotnet titles- jp infotech
Generating summary risk scores for mobile applications
A secure erasure code based cloud storage system with secure data forwarding
Distributed, Concurrent, and Independent Access to Encrypted Cloud Databases
Cloud mov cloud based mobile social tv
A distributed control law for load balancing in content delivery networks
Social tube p2p assisted video sharing inonline social networks
A novel data embedding method using adaptive pixel pair matching
Whole test suite generation
Back pressure-based packet-by-packet adaptive routing in communication networks
A framework for routing performance analysis in delay tolerant networks with ...
2012-2013 IEEE JAVA PROJECT TITLES
2015 2016 ieee java project titles
A low complexity congestion control and scheduling algorithm for multihop wir...
Ad

Similar to Packet hiding methods for preventing selective jamming attacks (20)

PDF
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
PDF
D43021519
PDF
I030102056063
PDF
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
PDF
Selective jamming attack prevention based on packet hiding methods and wormholes
PDF
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
PDF
Dn36682688
PDF
Ij a survey on preventing jamming attacks in wireless communication
PDF
International Journal of Computational Engineering Research(IJCER)
PPTX
Wiretapping, wireless jamming.pptx
PDF
Wifi Jgfdggfgafggfgfgfgfgfgfgmmer PPT.pdf
PDF
Antijam ipsn09
PPT
Wireless security
PDF
International Journal of Engineering Research and Development (IJERD)
PDF
Securing information in wireless sensor networks
PDF
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...
PDF
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
PPTX
dfrdtfg fdttg dtfgfdgrdgfrgfWifi Jamm;.';uul;/er PPT.pptx
PPTX
Jammers&anti jammers
PDF
Advanced WiFi Attacks Using Commodity Hardware
A Novel Method for Preventing Selective Jamming Attacks in Wireless Networks
D43021519
I030102056063
Container-Beating Approaches for Avoiding Discriminative Cramming Assaults
Selective jamming attack prevention based on packet hiding methods and wormholes
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
Dn36682688
Ij a survey on preventing jamming attacks in wireless communication
International Journal of Computational Engineering Research(IJCER)
Wiretapping, wireless jamming.pptx
Wifi Jgfdggfgafggfgfgfgfgfgfgmmer PPT.pdf
Antijam ipsn09
Wireless security
International Journal of Engineering Research and Development (IJERD)
Securing information in wireless sensor networks
SECURING MOBILE AD-HOC NETWORKS AGAINST JAMMING ATTACKS THROUGH UNIFIED SECUR...
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks
dfrdtfg fdttg dtfgfdgrdgfrgfWifi Jamm;.';uul;/er PPT.pptx
Jammers&anti jammers
Advanced WiFi Attacks Using Commodity Hardware

Recently uploaded (20)

PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
Cell Structure & Organelles in detailed.
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
01-Introduction-to-Information-Management.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Classroom Observation Tools for Teachers
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Sports Quiz easy sports quiz sports quiz
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Insiders guide to clinical Medicine.pdf
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Cell Structure & Organelles in detailed.
2.FourierTransform-ShortQuestionswithAnswers.pdf
human mycosis Human fungal infections are called human mycosis..pptx
01-Introduction-to-Information-Management.pdf
Computing-Curriculum for Schools in Ghana
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Classroom Observation Tools for Teachers
VCE English Exam - Section C Student Revision Booklet
Sports Quiz easy sports quiz sports quiz
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Insiders guide to clinical Medicine.pdf
102 student loan defaulters named and shamed – Is someone you know on the list?
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PPH.pptx obstetrics and gynecology in nursing
O7-L3 Supply Chain Operations - ICLT Program
Supply Chain Operations Speaking Notes -ICLT Program
Abdominal Access Techniques with Prof. Dr. R K Mishra

Packet hiding methods for preventing selective jamming attacks

  • 1. Packet-Hiding Methods for Preventing Selective Jamming Attacks PRESENTED BY CONTACT: (0) 9952649690
  • 2. PRESENTED BY JP INFOTECH, BLOG: WWW.JPINFOTECH.BLOGSPT.COM EMAIL: JPIFNOTECHPROJECTS@GMAIL .COM CONTACT: (0) 9952649690
  • 3. ABSTRACT • In this work, we address the problem of selective jamming attacks in wireless networks. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. We illustrate the advantages of selective jamming in terms of network performance degradation and adversary effort by presenting two case studies; a selective attack on TCP and one on routing. • We show that selective jamming attacks can be launched by performing real-time packet classification at the physical layer. To mitigate these attacks, we develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication overhead.
  • 4. AIM • To show that selective jamming attacks can be launched by performing real time packet classification at the physical layer. To mitigate these attacks develop a schemes that prevent real-time packet classification by combining cryptographic primitives with physical layer attributes.
  • 5. SYNOPSIS • To address the problem of jamming under an internal threat model and consider a sophisticated adversary who is aware of network secrets and the implementation details of network protocols at any layer in the network stack. The adversary exploits his internal knowledge for launching selective jamming attacks in which specific messages of high importance are targeted. For example, a jammer can target route-request/route-reply messages at the routing layer to prevent route discovery, or target TCP acknowledgments in a TCP session to severely degrade the throughput of an end-to- end flow.
  • 6. ARCHITECTURE Node Node Cach A B e Node Node Path Encryption Node C using 1 of Jam mer 3 Node schemes. Blocks Route request and Decryption reply of message. Intermediate Server (Checks the Inter Node’s) DB Server (webService Request) Webservice req/rec Application
  • 7. EXISTING SYTEM • Conventional anti-jamming techniques rely extensively on spread-spectrum (SS) communications or some form of jamming evasion (e.g., slow frequency hopping, or spatial retreats). SS techniques provide bit- level protection by spreading bits according to a secret pseudo-noise (PN) code, known only to the communicating parties. These methods can only protect wireless transmissions under the external threat model.
  • 8. DISADVANTAGES OF EXISTING SYSTEM • Broadcast communications are particularly vulnerable under an internal threat model because all intended receivers must be aware of the secrets used to protect transmissions. • Hence, the compromise of a single receiver is sufficient to reveal relevant cryptographic information.
  • 9. PROPOSED SYSTEM • An intuitive solution to selective jamming would be the encryption of transmitted packets (including headers) with a static key. However, for broadcast communications, this static decryption key must be known to all intended receivers and hence, is susceptible to compromise. Moreover, even if the encryption key of a hiding scheme were to remain secret, the static portions of a transmitted packet could potentially lead to packet classification.
  • 10. ADVANTAGES OF PROPOSED SYSTEM • Relatively easy to actualize by exploiting knowledge of network protocols and cryptographic primitives extracted from compromised nodes • Our findings indicate that selective jamming attacks lead to a DoS with very low effort on behalf of the jammer. • Achieve strong security properties
  • 11. MODULES • Real Time Packet Classification • A Strong Hiding Commitment Scheme • Cryptographic Puzzle Hiding Scheme • Hiding based on All-Or-Nothing Transformations
  • 12. Real Time Packet Classification: • At the Physical layer, a packet m is encoded, interleaved, and modulated before it is transmitted over the wireless channel. At the receiver, the signal is demodulated, deinterleaved and decoded to recover the original packet m. Nodes A and B communicate via a wireless link. Within the communication range of both A and B there is a jamming node J. When A transmits a packet m to B, node J classifies m by receiving only the first few bytes of m. J then corrupts m beyond recovery by interfering with its reception at B.
  • 13. A Strong Hiding Commitment Scheme • A strong hiding commitment scheme (SHCS), which is based on symmetric cryptography. Assume that the sender has a packet for Receiver. First, S constructs commit( message ) the commitment function is an off-the-shelf symmetric encryption algorithm is a publicly known permutation, and k is a randomly selected key of some desired key length s (the length of k is a security parameter). Upon reception of d, any receiver R computes.
  • 14. Cryptographic Puzzle Hiding Scheme • A sender S have a packet m for transmission. The sender selects a random key k , of a desired length. S generates a puzzle (key, time), where puzzle() denotes the puzzle generator function, and tp denotes the time required for the solution of the puzzle. Parameter is measured in units of time, and it is directly dependent on the assumed computational capability of the adversary, denoted by N and measured in computational operations per second. After generating the puzzle P, the sender broadcasts (C, P). At the receiver side, any receiver R solves the received puzzle to recover key and then computes.
  • 15. Hiding based on All-Or-Nothing Transformations • The packets are pre-processed by an AONT before transmission but remain unencrypted. The jammer cannot perform packet classification until all pseudo-messages corresponding to the original packet have been received and the inverse transformation has been applied.
  • 16. CONCLUSION: • We evaluated the impact of selective jamming attacks on network protocols such as TCP and routing. Our findings show that a selective jammer can significantly impact performance with very low effort. We developed three schemes that transform a selective jammer to a random one by preventing real-time packet classification.
  • 17. REFERENCE: • Alejandro Proan˜o and Loukas Lazos, “Packet- Hiding Methods for Preventing Selective Jamming Attacks” IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 1, JANUARY/FEBRUARY 2012.
  • 18. WWW.JPINFOTECH.BLOGSPOT.COM PRESENTED BY CONTACT: (0) 9952649690