SlideShare a Scribd company logo
Presented by
Anusha H N
Avinasha H N
Niha Noorain
Syed Musthak K S
Under the guidance of
Mrs. Shylaja L.N., B.E., M.Tech.
Associate Professor
Department of Information Science and Engineering

 Aim
 Scope
 Objectives
 Introduction
 Literature Survey
 Methodology
 Expected Result
 References
 Gantt Chart
Contents
2

 To prevent the selective jamming attack by
combining three cryptographic primitives such as
strong hiding commitment scheme, cryptographic
puzzle hiding scheme and all-or-nothing
transformations scheme.
3
Aim

 Project show that selective jamming attacks can be
launched by performing real time packet
classification at the physical layer.
 To mitigate these attacks, proposed project develop
three schemes that prevent real-time packet
classification by combining cryptographic primitives
with physical-layer attributes.
4
Scope

 Strong Hiding Commitment Scheme (SHCS),
Cryptographic Puzzle Hiding Scheme(CPHS) and
All-Or-Nothing Transformation (AONT) scheme.
 This project analyze the security of methods and
evaluate their computational and communication
overhead.
5
Contd…

 To prevent the selective jamming attack.
 To avoid packet dropouts due to collisions between
neighboring nodes.
 To show that a selective jammer can significantly
impact performance with very low effort on network
protocol such as TCP and routing.
 To secure the packet transmission in wireless
networks.
Objectives
6

 “Coping with a Smart Jammer in Wireless
Networks: A Stackelberg Game Approach”[2013]
-Dejun Yang
 Technique used: Power Control Smart Jammer game.
 Drawback: Jammer improves its utility in
UNAWARE condition.
7
Literature Survey

 “Denial of Service Attacks in Wireless Network: The
Case of Jammer”.[2011]
-Konstantinos Pelechrinis
 Technique used: Intrusion Detection Scheme(IDS)
used to detect the attack.
 Intrusion Prevention System(IPS) used to prevent
the attack.
8
Contd…

 “Detection of Jamming Attacks in Wireless Ad Hoc
Networks using Error Distribution”.[2009]
-Ali Hamieh
 Technique used: detection by correlation to detect
the jammer.
 Drawback: to detect the jamming attack dependency
measure is needed from all nodes.
 There is no technique to prevent selective jamming
attack
9
Contd…

 “Effects of Denial-of-Sleep attacks on Wireless Sensor
Network mac protocols”.[2009]
-David R. Raymond
 Technique used: jamming identification & mitigation,
anti-reply protection
 Drawback: Transmitted message from a node can easily
read by attacker because message is not encrypted.
 Attacker can access any node using received message as a
authorized and make busy state such attacks are selective
jamming attack.
10
Contd…

“JAMMING”
 How does it happen?
Realization of selective
jamming attack
11
Fig.1: Jamming Attack

 1. Strong Hiding Commitment Scheme (SHCS)
 2. Cryptographic Puzzle Hiding Scheme (CPHS)
 3.All-Or-Nothing-Transformation Scheme(AONT)
Methodology
12

 Proposing a strong hiding commitment scheme
(SHCS), which is based on symmetric cryptography.
The main motivation is to satisfy the strong hiding
property while keeping the computation and
communication overhead to a minimum.
13
SHCS

 Presenting a packet hiding scheme based on
cryptographic puzzles. The main idea behind such
puzzles is to force the recipient of a puzzle execute a
pre-defined set of computations before he is able to
extract a secret of interest.
14
CPHS

 Here proposed project send a sequence of pseudo
messages corresponding to original messages. The
jammer cannot perform packet classification until all
pseudo messages corresponding to the original
packet have been received and the inverse
transformation has been applied.
15
AONT

The Selective Jamming attack will be avoided and the
packets will be transmitted safely to the proper
destination
16
Expected Result

1. M. Strasser, C. Po ¨pper, and S. Capkun, “Efficient
Uncoordinated fhss Anti-Jamming Communication,”
Proc. ACM Int’l Symp. Mobile Ad Hoc Networking and
Computing (MobiHoc), pp. 207-218, 2009.
2. P. Tague, M. Li, and R. Poovendran, “Mitigation of
Control Channel Jamming under Node Capture
Attacks,” IEEE Trans. Mobile Computing, vol. 8, no. 9,
pp. 1221-1234, Sept. 2009.
3. B. Thapa, G. Noubir, R. Rajaramanand, and B. Sheng,
“On the Robustness of IEEE802.11 Rate Adaptation
Algorithms against Smart Jamming,” Proc. ACM Conf.
Wireless Network Security (WiSec), 2011.
References
17

Gantt Chart - Schedule for carrying different
actvities during project work
18

19
Contd…

20

More Related Content

PPTX
Packet hiding methods for preventing selective jamming attacks
PPTX
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
PDF
3 packet-hiding methods for preventing selective
PDF
Jamming attacks in wireless networks
PPT
Wireless sensor networks
PPTX
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
3 packet-hiding methods for preventing selective
Jamming attacks in wireless networks
Wireless sensor networks
Packet hiding methods for preventing selective jamming attacks

What's hot (20)

PDF
Packet hiding methods for preventing selective jamming attacks
PDF
Prevention of Packet Hiding Methods In Selective Jamming Attack
PDF
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
PDF
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
PDF
Dn36682688
PPTX
Wormhole attack
PDF
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...
PPT
Security in mobile ad hoc networks
PPT
Flooding attack manet
PDF
Detection and prevention of wormhole attack in mobile adhoc networks
PDF
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
PPTX
A survey on complex wormhole attack in wireless
DOCX
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
PDF
Hiding message from hacker using novel network techniques
PDF
International Journal of Engineering and Science Invention (IJESI)
PDF
Wormhole Attack
PDF
A43030104
DOC
Paper copy
PDF
A Secure message exchange and anti-jamming mechanism in manet
PDF
Wormhole attack detection algorithms in wireless network coding systems
Packet hiding methods for preventing selective jamming attacks
Prevention of Packet Hiding Methods In Selective Jamming Attack
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
Dn36682688
Wormhole attack
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...
Security in mobile ad hoc networks
Flooding attack manet
Detection and prevention of wormhole attack in mobile adhoc networks
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
A survey on complex wormhole attack in wireless
JPD1423 A Probabilistic Misbehavior Detection Scheme toward Efficient Trust ...
Hiding message from hacker using novel network techniques
International Journal of Engineering and Science Invention (IJESI)
Wormhole Attack
A43030104
Paper copy
A Secure message exchange and anti-jamming mechanism in manet
Wormhole attack detection algorithms in wireless network coding systems
Ad

Viewers also liked (20)

PPTX
Presentation on Jamming
PPTX
Wireless signal jamming
PDF
GNSS Jamming Detection, Localization and Mitigation
PPTX
Mobile jammer
PPT
Caffe Latte Attack
PPTX
Cell phone jammer ppt
PDF
Jamming Mitigation - Brochure 2015
PPT
AJAL JAMMING
PDF
Jamming in Wireless Sensor Networks
PPT
Router and Routing Protocol Attacks
PPTX
Mobile ad hoc networking: imperatives and challenges
PPTX
Jamming aware traffic allocation for multiple-path routing using portfolio se...
PDF
Electronic Warfare for the Republic of Singapore Air Force
PPTX
honey pots introduction and its types
PPT
Honeypot
PPT
spread spectrum technique
ODP
Sensor For UTM
PPT
Wearable biosensors-1222865689459971-8 (1)
PPTX
Wireless Power Transmission Using Solar Power System
PPTX
Honeypot
Presentation on Jamming
Wireless signal jamming
GNSS Jamming Detection, Localization and Mitigation
Mobile jammer
Caffe Latte Attack
Cell phone jammer ppt
Jamming Mitigation - Brochure 2015
AJAL JAMMING
Jamming in Wireless Sensor Networks
Router and Routing Protocol Attacks
Mobile ad hoc networking: imperatives and challenges
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Electronic Warfare for the Republic of Singapore Air Force
honey pots introduction and its types
Honeypot
spread spectrum technique
Sensor For UTM
Wearable biosensors-1222865689459971-8 (1)
Wireless Power Transmission Using Solar Power System
Honeypot
Ad

Similar to Preventing jamming attack by combining cryptography (20)

PDF
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
PDF
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
PDF
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
PDF
Investigation of detection & prevention sinkhole attack in manet
DOCX
Combining cryptographic primitives to prevent jamming attacks in wireless net...
PDF
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
PDF
K1803036872
PDF
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
PDF
Detection of Various Attacks using Zero Knowledge Protocol in Wireless Security
PDF
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
PDF
Am03402220229
PDF
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
PDF
Selective jamming attack prevention based on packet hiding methods and wormholes
PDF
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
PDF
Source location privacy in wireless sensor networks using data mules.
PDF
Maximizing network interruption in wireless
PDF
N0704075079
PDF
Robust encryption algorithm based sht in wireless sensor networks
PDF
Analyze and Detect Packet Loss for Data Transmission in WSN
PDF
International Journal of Engineering Research and Development (IJERD)
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Investigation of detection & prevention sinkhole attack in manet
Combining cryptographic primitives to prevent jamming attacks in wireless net...
A Novel Approach to Detect & Prevent Wormhole Attack over MANET & Sensor n/w ...
K1803036872
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Detection of Various Attacks using Zero Knowledge Protocol in Wireless Security
Detection of Various Attacks Using Zero Knowledge Protocol in Wireless Security
Am03402220229
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
Selective jamming attack prevention based on packet hiding methods and wormholes
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
Source location privacy in wireless sensor networks using data mules.
Maximizing network interruption in wireless
N0704075079
Robust encryption algorithm based sht in wireless sensor networks
Analyze and Detect Packet Loss for Data Transmission in WSN
International Journal of Engineering Research and Development (IJERD)

Recently uploaded (20)

PPTX
web development for engineering and engineering
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPT
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
PPTX
additive manufacturing of ss316l using mig welding
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
Digital Logic Computer Design lecture notes
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPT
Project quality management in manufacturing
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Welding lecture in detail for understanding
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
web development for engineering and engineering
Automation-in-Manufacturing-Chapter-Introduction.pdf
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
CRASH COURSE IN ALTERNATIVE PLUMBING CLASS
additive manufacturing of ss316l using mig welding
Model Code of Practice - Construction Work - 21102022 .pdf
Digital Logic Computer Design lecture notes
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
bas. eng. economics group 4 presentation 1.pptx
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Project quality management in manufacturing
R24 SURVEYING LAB MANUAL for civil enggi
Welding lecture in detail for understanding
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Lecture Notes Electrical Wiring System Components
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Foundation to blockchain - A guide to Blockchain Tech
Operating System & Kernel Study Guide-1 - converted.pdf

Preventing jamming attack by combining cryptography

  • 1. Presented by Anusha H N Avinasha H N Niha Noorain Syed Musthak K S Under the guidance of Mrs. Shylaja L.N., B.E., M.Tech. Associate Professor Department of Information Science and Engineering
  • 2.   Aim  Scope  Objectives  Introduction  Literature Survey  Methodology  Expected Result  References  Gantt Chart Contents 2
  • 3.   To prevent the selective jamming attack by combining three cryptographic primitives such as strong hiding commitment scheme, cryptographic puzzle hiding scheme and all-or-nothing transformations scheme. 3 Aim
  • 4.   Project show that selective jamming attacks can be launched by performing real time packet classification at the physical layer.  To mitigate these attacks, proposed project develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. 4 Scope
  • 5.   Strong Hiding Commitment Scheme (SHCS), Cryptographic Puzzle Hiding Scheme(CPHS) and All-Or-Nothing Transformation (AONT) scheme.  This project analyze the security of methods and evaluate their computational and communication overhead. 5 Contd…
  • 6.   To prevent the selective jamming attack.  To avoid packet dropouts due to collisions between neighboring nodes.  To show that a selective jammer can significantly impact performance with very low effort on network protocol such as TCP and routing.  To secure the packet transmission in wireless networks. Objectives 6
  • 7.   “Coping with a Smart Jammer in Wireless Networks: A Stackelberg Game Approach”[2013] -Dejun Yang  Technique used: Power Control Smart Jammer game.  Drawback: Jammer improves its utility in UNAWARE condition. 7 Literature Survey
  • 8.   “Denial of Service Attacks in Wireless Network: The Case of Jammer”.[2011] -Konstantinos Pelechrinis  Technique used: Intrusion Detection Scheme(IDS) used to detect the attack.  Intrusion Prevention System(IPS) used to prevent the attack. 8 Contd…
  • 9.   “Detection of Jamming Attacks in Wireless Ad Hoc Networks using Error Distribution”.[2009] -Ali Hamieh  Technique used: detection by correlation to detect the jammer.  Drawback: to detect the jamming attack dependency measure is needed from all nodes.  There is no technique to prevent selective jamming attack 9 Contd…
  • 10.   “Effects of Denial-of-Sleep attacks on Wireless Sensor Network mac protocols”.[2009] -David R. Raymond  Technique used: jamming identification & mitigation, anti-reply protection  Drawback: Transmitted message from a node can easily read by attacker because message is not encrypted.  Attacker can access any node using received message as a authorized and make busy state such attacks are selective jamming attack. 10 Contd…
  • 11.  “JAMMING”  How does it happen? Realization of selective jamming attack 11 Fig.1: Jamming Attack
  • 12.   1. Strong Hiding Commitment Scheme (SHCS)  2. Cryptographic Puzzle Hiding Scheme (CPHS)  3.All-Or-Nothing-Transformation Scheme(AONT) Methodology 12
  • 13.   Proposing a strong hiding commitment scheme (SHCS), which is based on symmetric cryptography. The main motivation is to satisfy the strong hiding property while keeping the computation and communication overhead to a minimum. 13 SHCS
  • 14.   Presenting a packet hiding scheme based on cryptographic puzzles. The main idea behind such puzzles is to force the recipient of a puzzle execute a pre-defined set of computations before he is able to extract a secret of interest. 14 CPHS
  • 15.   Here proposed project send a sequence of pseudo messages corresponding to original messages. The jammer cannot perform packet classification until all pseudo messages corresponding to the original packet have been received and the inverse transformation has been applied. 15 AONT
  • 16.  The Selective Jamming attack will be avoided and the packets will be transmitted safely to the proper destination 16 Expected Result
  • 17.  1. M. Strasser, C. Po ¨pper, and S. Capkun, “Efficient Uncoordinated fhss Anti-Jamming Communication,” Proc. ACM Int’l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 207-218, 2009. 2. P. Tague, M. Li, and R. Poovendran, “Mitigation of Control Channel Jamming under Node Capture Attacks,” IEEE Trans. Mobile Computing, vol. 8, no. 9, pp. 1221-1234, Sept. 2009. 3. B. Thapa, G. Noubir, R. Rajaramanand, and B. Sheng, “On the Robustness of IEEE802.11 Rate Adaptation Algorithms against Smart Jamming,” Proc. ACM Conf. Wireless Network Security (WiSec), 2011. References 17
  • 18.  Gantt Chart - Schedule for carrying different actvities during project work 18