SlideShare a Scribd company logo
OPTIMAL JAMMING ATTACK 
STRATEGIES IN WIRELESS 
SENSOR NETWORKS 
PRESENTED BY, 
ARCHANA.B,NITHIYA.K 
III CSE 
KINGS COLLEGE OF ENGINEERING
OBJECTIVES 
The objective of this paper is to detect the 
jammer and avoid the collisions in 
wireless sensor networks.
CONTENT: 
 Jamming attack in wireless sensor 
network 
Optimal jamming attacks 
Defense policy 
Modeling Assumptions 
Attack detection model
INTRODUCTION 
In this paper the fundamental characteristic 
of wireless networks that Renders them more 
vulnerable to attacks than their wire line 
Counterparts Is the open, shared nature of their 
medium this exposes . 
If the attacker abuses a protocol with the 
primary goal to obtain performance benefits 
itself, the attack is referred to as misbehavior.
EXSISTING SYSTEM: 
The sensor node, looses its energy 
continuously so it is failed because of 
attacker attacks. 
 It take more time to transfer the 
information because of the retransmission 
process again and again.
PROPOSED SYSTEM 
Using the monitoring node the attacker is 
detected. 
The attacker is release power signals at 
that time the sensor node is act as 
sleeping node so does not loses the 
consumed energy.
WSN & WSN ATTACKS: 
WSN(WWiirreelleessss SSeennssoorr NNeettwwoorrkkss)) 
TTyyppeess ooff aattttaacckk iinn WWSSNN 
 Passive Attack 
 Active Attack 
PASSIVE ATTACK : Passively absorping ongoing 
communication 
ACTIVE ATTACK : Attacker is involved in transmission
DOS ATTACKS 
Depending on whether one looks at the 
cause of the consequence of it miss 
behavior in Wireless Networks stems. 
The utility is expressed in terms of 
consumed energy or achievable 
throughput on per link or end_to_end 
basis.
JAMMER 
Jammer is neither authenticated nor 
associated with the network. 
The attacker attempt to strike a balance 
short and long term benefits.
sensor node 
monitoring node 
jammer/attacker
OPTIMAL ATTACK 
We derive the optimal attack and optimal defense 
strategies as solution to optimization problems 
that are faced by the attacker. 
For attack detection we provide a methodology. 
We include in the formulation the attack 
detection.
ATTACK DETECTION MODEL 
The monitoring mechanism consists of , 
Determination of a subset of 
nodes(M). 
1.Employment of a detection 
algorithm. 
2.A detection algorithm is part of the 
detection module.
TYPES OF LINK LAYER JAMMER 
Deceptive, 
Random, 
 Reactive jammer.
REACTIVE JAMMER 
The reactive jammer is the most sophisticated 
one as it launches its attack after sensing 
ongoing transmission. 
Channel surfing involves on-demand 
frequency hopping as a countermeasure.
DETECTION ALGORITHM 
 A detection algorithm is part of the 
detection module at a monitor node; it takes as 
input observation samples obtained by the 
monitor node (i.e., collision/not collision) 
 decides whether there is an attack or not. On 
one hand.
OBSERVATION WINDOW 
The observation window should be small 
enough, such that the attack is detected in a 
timely manner and appropriate 
countermeasures are initiated. 
 On the other hand, this window should be 
sufficiently large, such that the chance of a 
false alarm notification is reduced.
CONCLUSION 
We studied controllable jamming attacks in 
wireless sensor networks, which are easy to 
launch and difficult to detect and confront. 
Our work is a first step towards understanding 
the structure of these problems. 
Interesting issues arise in multi-channel 
networks.
THANK YOU
QQUURRIIEESS??

More Related Content

PPTX
Packet hiding methods for preventing selective jamming attacks
PPTX
Preventing jamming attack by combining cryptography
PPTX
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
PDF
3 packet-hiding methods for preventing selective
PDF
Jamming attacks in wireless networks
PPT
Wireless sensor networks
PDF
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods
Packet hiding methods for preventing selective jamming attacks
Preventing jamming attack by combining cryptography
Packet-Hiding Methods: To Prevent Selective Jamming Attacks
3 packet-hiding methods for preventing selective
Jamming attacks in wireless networks
Wireless sensor networks
Jamming Attacks Prevention in Wireless Networks Using Packet Hiding Methods

What's hot (20)

PDF
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
PPTX
Packet hiding methods for preventing selective jamming attacks
PDF
Packet hiding methods for preventing selective jamming attacks
PDF
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
PDF
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...
PDF
I030102056063
PDF
Prevention of Packet Hiding Methods In Selective Jamming Attack
PDF
Dn36682688
PPTX
Ad hoc secuirty-vemula
PPTX
Wormhole attack
PPT
Security in mobile ad hoc networks
PDF
International Journal of Engineering Research and Development (IJERD)
DOCX
Minimum cost blocking problem in multi path wireless routing protocols
PDF
Detection and prevention of wormhole attack in mobile adhoc networks
PDF
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
PPT
Flooding attack manet
PDF
Wormhole Attack
PPTX
Study of security attacks in manet
PPTX
A survey on complex wormhole attack in wireless
PPTX
Security Issues in MANET
ADVANCED TECHNIQUES FOR PREVENTING SELECTIVE JAMMING ATTACKS USING PACKET-HID...
Packet hiding methods for preventing selective jamming attacks
Packet hiding methods for preventing selective jamming attacks
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...
A Security Mechanism Against Reactive Jammer Attack In Wireless Sensor Netwo...
I030102056063
Prevention of Packet Hiding Methods In Selective Jamming Attack
Dn36682688
Ad hoc secuirty-vemula
Wormhole attack
Security in mobile ad hoc networks
International Journal of Engineering Research and Development (IJERD)
Minimum cost blocking problem in multi path wireless routing protocols
Detection and prevention of wormhole attack in mobile adhoc networks
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
Flooding attack manet
Wormhole Attack
Study of security attacks in manet
A survey on complex wormhole attack in wireless
Security Issues in MANET
Ad

Viewers also liked (20)

PPT
Router and Routing Protocol Attacks
PPTX
Mobile jammer
PPT
AJAL JAMMING
PPT
Caffe Latte Attack
PPTX
Wireless signal jamming
PDF
Jamming in Wireless Sensor Networks
PPTX
Presentation on Jamming
PDF
GNSS Jamming Detection, Localization and Mitigation
PPTX
Jamming aware traffic allocation for multiple-path routing using portfolio se...
PPTX
honey pots introduction and its types
PPT
Honeypot
ODP
Sensor For UTM
PPT
Wearable biosensors-1222865689459971-8 (1)
PPTX
Wireless Power Transmission Using Solar Power System
PPTX
Honeypot
PPT
531 biosensors
PPT
All about Honeypots & Honeynets
PDF
Body Adapted Wearable Bio Sensor
PPTX
Cell phone jammer ppt
PPTX
Wireless sensor network security issues
Router and Routing Protocol Attacks
Mobile jammer
AJAL JAMMING
Caffe Latte Attack
Wireless signal jamming
Jamming in Wireless Sensor Networks
Presentation on Jamming
GNSS Jamming Detection, Localization and Mitigation
Jamming aware traffic allocation for multiple-path routing using portfolio se...
honey pots introduction and its types
Honeypot
Sensor For UTM
Wearable biosensors-1222865689459971-8 (1)
Wireless Power Transmission Using Solar Power System
Honeypot
531 biosensors
All about Honeypots & Honeynets
Body Adapted Wearable Bio Sensor
Cell phone jammer ppt
Wireless sensor network security issues
Ad

Similar to Wireless sensor networks (20)

PDF
International Journal of Engineering Research and Development (IJERD)
PDF
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
PDF
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
PDF
Ij a survey on preventing jamming attacks in wireless communication
PDF
A survey on jamming attacks, detection and defending strategies in wireless s...
PDF
Self protection mechanism for wireless sensor networks
PDF
SELF-PROTECTION MECHANISM FOR WIRELESS SENSOR NETWORKS
PDF
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
PDF
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
PDF
Maximizing network interruption in wireless
PPTX
Intrusion detection in MANETS
PDF
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
PDF
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
PDF
Packet hiding methods for preventing selective jamming attacks
PDF
A Wireless Sensor Network ( Wsn )
PDF
Online Intrusion Alert Aggregation with Generative Data Stream Modeling
PPTX
Security threats in cognitive radio
DOCX
A trigger identification service for defending reactive jammers in wireless s...
PPTX
Vampire attack in wsn
PDF
A secure routing process to simultaneously defend against false report and wo...
International Journal of Engineering Research and Development (IJERD)
An Assessment of Security Mechanisms Against Reactive Jammer Attack In Wirele...
NOVEL HYBRID INTRUSION DETECTION SYSTEM FOR CLUSTERED WIRELESS SENSOR NETWORK
Ij a survey on preventing jamming attacks in wireless communication
A survey on jamming attacks, detection and defending strategies in wireless s...
Self protection mechanism for wireless sensor networks
SELF-PROTECTION MECHANISM FOR WIRELESS SENSOR NETWORKS
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
Prevention of Selective Jamming Attacks by Using Packet Hiding Methods
Maximizing network interruption in wireless
Intrusion detection in MANETS
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
A MULTI-PATH ROUTING DETERMINATION METHOD FOR IMPROVING THE ENERGY EFFICIENCY...
Packet hiding methods for preventing selective jamming attacks
A Wireless Sensor Network ( Wsn )
Online Intrusion Alert Aggregation with Generative Data Stream Modeling
Security threats in cognitive radio
A trigger identification service for defending reactive jammers in wireless s...
Vampire attack in wsn
A secure routing process to simultaneously defend against false report and wo...

More from ANJALAI AMMAL MAHALINGAM ENGINEERING COLLEGE (9)

PPTX
UNIT-V.pptx-big data notes-ccs334anna university syllabus
PDF
BIGDATA ANALYTICS LAB MANUAL final.pdf
PDF
GE3171-PROBLEM SOLVING AND PYTHON PROGRAMMING LABORATORY
PDF
GE8151-PROBLEM SOLVING AND PYTHON PROGRAMMING-UNIT I
DOC
IT6701-Information management question bank
PPT
C PROGRAMMING BASICS- COMPUTER PROGRAMMING UNIT II
PPTX
STUDY EDUCATIONAL OPERATING SYSTEM MINIX OPERATING SYSTEM AND DEVELOP REASO...
PPT
Using fuzzy ant colony optimization for Diagnosis of Diabetes Disease
UNIT-V.pptx-big data notes-ccs334anna university syllabus
BIGDATA ANALYTICS LAB MANUAL final.pdf
GE3171-PROBLEM SOLVING AND PYTHON PROGRAMMING LABORATORY
GE8151-PROBLEM SOLVING AND PYTHON PROGRAMMING-UNIT I
IT6701-Information management question bank
C PROGRAMMING BASICS- COMPUTER PROGRAMMING UNIT II
STUDY EDUCATIONAL OPERATING SYSTEM MINIX OPERATING SYSTEM AND DEVELOP REASO...
Using fuzzy ant colony optimization for Diagnosis of Diabetes Disease

Recently uploaded (20)

PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
Welding lecture in detail for understanding
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
Internet of Things (IOT) - A guide to understanding
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PDF
PPT on Performance Review to get promotions
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Geodesy 1.pptx...............................................
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Sustainable Sites - Green Building Construction
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
CYBER-CRIMES AND SECURITY A guide to understanding
Welding lecture in detail for understanding
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Foundation to blockchain - A guide to Blockchain Tech
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Model Code of Practice - Construction Work - 21102022 .pdf
Internet of Things (IOT) - A guide to understanding
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPT on Performance Review to get promotions
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Geodesy 1.pptx...............................................
R24 SURVEYING LAB MANUAL for civil enggi
Sustainable Sites - Green Building Construction

Wireless sensor networks

  • 1. OPTIMAL JAMMING ATTACK STRATEGIES IN WIRELESS SENSOR NETWORKS PRESENTED BY, ARCHANA.B,NITHIYA.K III CSE KINGS COLLEGE OF ENGINEERING
  • 2. OBJECTIVES The objective of this paper is to detect the jammer and avoid the collisions in wireless sensor networks.
  • 3. CONTENT:  Jamming attack in wireless sensor network Optimal jamming attacks Defense policy Modeling Assumptions Attack detection model
  • 4. INTRODUCTION In this paper the fundamental characteristic of wireless networks that Renders them more vulnerable to attacks than their wire line Counterparts Is the open, shared nature of their medium this exposes . If the attacker abuses a protocol with the primary goal to obtain performance benefits itself, the attack is referred to as misbehavior.
  • 5. EXSISTING SYSTEM: The sensor node, looses its energy continuously so it is failed because of attacker attacks.  It take more time to transfer the information because of the retransmission process again and again.
  • 6. PROPOSED SYSTEM Using the monitoring node the attacker is detected. The attacker is release power signals at that time the sensor node is act as sleeping node so does not loses the consumed energy.
  • 7. WSN & WSN ATTACKS: WSN(WWiirreelleessss SSeennssoorr NNeettwwoorrkkss)) TTyyppeess ooff aattttaacckk iinn WWSSNN  Passive Attack  Active Attack PASSIVE ATTACK : Passively absorping ongoing communication ACTIVE ATTACK : Attacker is involved in transmission
  • 8. DOS ATTACKS Depending on whether one looks at the cause of the consequence of it miss behavior in Wireless Networks stems. The utility is expressed in terms of consumed energy or achievable throughput on per link or end_to_end basis.
  • 9. JAMMER Jammer is neither authenticated nor associated with the network. The attacker attempt to strike a balance short and long term benefits.
  • 10. sensor node monitoring node jammer/attacker
  • 11. OPTIMAL ATTACK We derive the optimal attack and optimal defense strategies as solution to optimization problems that are faced by the attacker. For attack detection we provide a methodology. We include in the formulation the attack detection.
  • 12. ATTACK DETECTION MODEL The monitoring mechanism consists of , Determination of a subset of nodes(M). 1.Employment of a detection algorithm. 2.A detection algorithm is part of the detection module.
  • 13. TYPES OF LINK LAYER JAMMER Deceptive, Random,  Reactive jammer.
  • 14. REACTIVE JAMMER The reactive jammer is the most sophisticated one as it launches its attack after sensing ongoing transmission. Channel surfing involves on-demand frequency hopping as a countermeasure.
  • 15. DETECTION ALGORITHM  A detection algorithm is part of the detection module at a monitor node; it takes as input observation samples obtained by the monitor node (i.e., collision/not collision)  decides whether there is an attack or not. On one hand.
  • 16. OBSERVATION WINDOW The observation window should be small enough, such that the attack is detected in a timely manner and appropriate countermeasures are initiated.  On the other hand, this window should be sufficiently large, such that the chance of a false alarm notification is reduced.
  • 17. CONCLUSION We studied controllable jamming attacks in wireless sensor networks, which are easy to launch and difficult to detect and confront. Our work is a first step towards understanding the structure of these problems. Interesting issues arise in multi-channel networks.