The wireless networks are more sensitive to the Denial-of-Service (DoS) attacks. The existing system is based on Spread Spectrum (SS). This technique mainly focuses on an external threat model. In wireless network the communications between nodes take place through broadcast communication. That is why, if an attacker present within the network can easily eavesdrop the message sent by any node. The main attack present in the wireless network is the selective jamming attack. This type of attack mainly focuses a single node termed as target node. Attacker always tries to block the message sent by the target node. This leads to the Denial-of-Service attack. We are proposing a new method to prevent the selective jamming attack in an internal threat model.
A wormhole is used, which will generate an alarm to indicate the presence of jammer and sent IP address of jammer node to all other nodes in the network. Using a method called packet hiding, we can send message through the network even though a jammer is present. This method is based on the technique called Strong Hiding Commitment Scheme (SHCS). Here, the access point in a network region becomes the wormhole whenever it finds out any node that violates the rules in a particular network region. That node is then considered as a jammer node. The wormhole sends IP address of jammer to all other nodes. Wormhole then prevents the jamming activity of the jammer by encrypting the source ID of message along with the message packet.So that the jammer is unable to identify its target node and the source can forward its message safely through jammer node itself.
Survey of wormhole attack in wireless sensor networksCSITiaesprime
From the last decade, a wireless sensor network (WSN) has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN. In wormhole attack scenario is brutal from other attacks, which is smoothly resolved in networks but tough to observe. This survey paper is an experiment to observing threats and also focuses on some different method to identify the wormhole attacks.
A Secure message exchange and anti-jamming mechanism in manetIJSRD
Secure neighbor discovery is the fundamental process in the MANET deployed in aggressive environment. It refers to the process that nodes exchange messages to discover and authenticate each other. It is defenseless to the jamming attack in which the adversary intentionally transmits signals to prevent neighboring nodes from exchanging messages. Existing anti-jamming communications depends on JR-SND. The JR-SND, a jamming-resilient secure neighbor discovery scheme for MANETs based on Random spread-code pre-distribution and Direct Sequence Spread Spectrum (DSSS). In Existing, they prevent the jamming and introduce the anti-jamming mechanism using DSSS introduce the secure message exchange mechanism and prevent the collisions during packet transmission. But in this we lack of introducing to detect the selfish and malicious nodes in the network. For this, in the Future Work we will enhance the work by detecting the selfish nodes using Watchdog and Neighbor Coverage-based Probabilistic Rebroadcast Protocol (NCPR).
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKIJNSA Journal
Ubiquitous and pervasive applications, where the Wireless Sensor Networks are typically deployed, lead to the susceptibility to many kinds of security attacks. Sensors used for real time response capability also make it difficult to devise the resource intensive security protocols because of their limited battery, power, memory and processing capabilities. One of potent form of Denial of Service attacks is Wormhole attack that affects on the network layer. In this paper, the techniques dealing with wormhole attack are investigated and an approach for wormhole prevention is proposed. Our approach is based on the analysis of the two-hop neighbors forwarding Route Reply packet. To check the validity of the sender, a unique key between the individual sensor node and the base station is required to be generated by suitable scheme.
Packet hiding methods for preventing selective jamming attacksShaik Irfan
This project mainly describes how a data can be send securely via a network without getting being hacked by any intruder.here we use various different kind of cryptographic principal and secure mechanism where in which it complete protection to our data
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsIOSR Journals
Abstract: The open nature of the wireless medium leaves it too weak to intentional interference attacks,
typically defined as jamming. This intentional interference with wireless transmissions can be used as a launch
pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been introduced
under an external threat model. However, intruders with internal knowledge of protocol specifications and
network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In this work, we
address the problem of selective jamming attacks in wireless networks. In these attacks, the hacker is active only
for a short period of time, selectively targeting messages of high importance. We demonstrate the advantages of
selective jamming in terms of network performance degradation and hacker effort by presenting two case
studies; a selective attack on TCP and one on routing. We show that selective jamming attacks can be
forwarded by performing real-time packet classification at the physical layer. To reduce these attacks, we
develop three schemes that prevent real-time packet classification by combining cryptographic primitives with
physical-layer attributes. We analyze the security of the proposed methods and evaluate their computational and
communication overhead.
This document discusses preventing and isolating black hole attacks in mobile ad hoc networks (MANETs) using alarm packets. It begins with background on MANETs and security attacks they face such as black hole attacks. Then, it reviews existing literature on detecting and preventing black hole attacks. Next, it describes how black hole attacks work in MANETs by having malicious nodes advertise short paths to destinations and drop packets. The proposed solution will use alarm packets to isolate and prevent black hole attacks in MANETs.
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are
various security issues and problems. Two most important issues are interoperability and interaction
among various security technologies which are very important to consider for configuration and
management point of view. The packet drop ratio in the wireless network is very high as well as packets
may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false
positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless
networks. Hence, there is the need of effective intrusion detection system which can detect maximum
number of intruders and the corresponding packets be forwarded through some alternate paths in the
network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust
value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the
performance of WLAN.
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are various security issues and problems. Two most important issues are interoperability and interaction among various security technologies which are very important to consider for configuration and management point of view. The packet drop ratio in the wireless network is very high as well as packets may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless networks. Hence, there is the need of effective intrusion detection system which can detect maximum number of intruders and the corresponding packets be forwarded through some alternate paths in the network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the performance of WLAN
Survey of wormhole attack in wireless sensor networksCSITiaesprime
From the last decade, a wireless sensor network (WSN) has a very important role over the networks. The primary features of WSN include satellite communication, broadcast channel, hostile environment, medical system and data gathering. There are a lot of attacks available in WSN. In wormhole attack scenario is brutal from other attacks, which is smoothly resolved in networks but tough to observe. This survey paper is an experiment to observing threats and also focuses on some different method to identify the wormhole attacks.
A Secure message exchange and anti-jamming mechanism in manetIJSRD
Secure neighbor discovery is the fundamental process in the MANET deployed in aggressive environment. It refers to the process that nodes exchange messages to discover and authenticate each other. It is defenseless to the jamming attack in which the adversary intentionally transmits signals to prevent neighboring nodes from exchanging messages. Existing anti-jamming communications depends on JR-SND. The JR-SND, a jamming-resilient secure neighbor discovery scheme for MANETs based on Random spread-code pre-distribution and Direct Sequence Spread Spectrum (DSSS). In Existing, they prevent the jamming and introduce the anti-jamming mechanism using DSSS introduce the secure message exchange mechanism and prevent the collisions during packet transmission. But in this we lack of introducing to detect the selfish and malicious nodes in the network. For this, in the Future Work we will enhance the work by detecting the selfish nodes using Watchdog and Neighbor Coverage-based Probabilistic Rebroadcast Protocol (NCPR).
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKIJNSA Journal
Ubiquitous and pervasive applications, where the Wireless Sensor Networks are typically deployed, lead to the susceptibility to many kinds of security attacks. Sensors used for real time response capability also make it difficult to devise the resource intensive security protocols because of their limited battery, power, memory and processing capabilities. One of potent form of Denial of Service attacks is Wormhole attack that affects on the network layer. In this paper, the techniques dealing with wormhole attack are investigated and an approach for wormhole prevention is proposed. Our approach is based on the analysis of the two-hop neighbors forwarding Route Reply packet. To check the validity of the sender, a unique key between the individual sensor node and the base station is required to be generated by suitable scheme.
Packet hiding methods for preventing selective jamming attacksShaik Irfan
This project mainly describes how a data can be send securely via a network without getting being hacked by any intruder.here we use various different kind of cryptographic principal and secure mechanism where in which it complete protection to our data
Prevention of Selective Jamming Attacks by Using Packet Hiding MethodsIOSR Journals
Abstract: The open nature of the wireless medium leaves it too weak to intentional interference attacks,
typically defined as jamming. This intentional interference with wireless transmissions can be used as a launch
pad for mounting Denial-of-Service attacks on wireless networks. Typically, jamming has been introduced
under an external threat model. However, intruders with internal knowledge of protocol specifications and
network secrets can launch low-effort jamming attacks that are difficult to detect and counter. In this work, we
address the problem of selective jamming attacks in wireless networks. In these attacks, the hacker is active only
for a short period of time, selectively targeting messages of high importance. We demonstrate the advantages of
selective jamming in terms of network performance degradation and hacker effort by presenting two case
studies; a selective attack on TCP and one on routing. We show that selective jamming attacks can be
forwarded by performing real-time packet classification at the physical layer. To reduce these attacks, we
develop three schemes that prevent real-time packet classification by combining cryptographic primitives with
physical-layer attributes. We analyze the security of the proposed methods and evaluate their computational and
communication overhead.
This document discusses preventing and isolating black hole attacks in mobile ad hoc networks (MANETs) using alarm packets. It begins with background on MANETs and security attacks they face such as black hole attacks. Then, it reviews existing literature on detecting and preventing black hole attacks. Next, it describes how black hole attacks work in MANETs by having malicious nodes advertise short paths to destinations and drop packets. The proposed solution will use alarm packets to isolate and prevent black hole attacks in MANETs.
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are
various security issues and problems. Two most important issues are interoperability and interaction
among various security technologies which are very important to consider for configuration and
management point of view. The packet drop ratio in the wireless network is very high as well as packets
may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false
positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless
networks. Hence, there is the need of effective intrusion detection system which can detect maximum
number of intruders and the corresponding packets be forwarded through some alternate paths in the
network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust
value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the
performance of WLAN.
TRUST VALUE ALGORITHM: A SECURE APPROACH AGAINST PACKET DROP ATTACK IN WIRELE...IJNSA Journal
Wireless ad-hoc networks are widely used because these are very easy to deploy. However, there are various security issues and problems. Two most important issues are interoperability and interaction among various security technologies which are very important to consider for configuration and management point of view. The packet drop ratio in the wireless network is very high as well as packets may be easily delayed by the attacker. Ii is very difficult to detect intruders, so it results into high false positive rate. Packets may be dropped or delayed by intruders as well as external nodes in wireless networks. Hence, there is the need of effective intrusion detection system which can detect maximum number of intruders and the corresponding packets be forwarded through some alternate paths in the network. In this paper we propose an alternate solution to detect the intruders/adversary with help of trust value. It would remove the need of inbuilt IDS in the wireless networks and result into improving the performance of WLAN
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
This document proposes an improved watchdog technique for intrusion detection in wireless sensor networks. The technique uses a hierarchical model with cluster head nodes acting as watchdogs to monitor network activity within each cell. This is intended to overcome issues with the original watchdog mechanism and reduce power consumption, extending the lifetime of sensor nodes. The algorithm for malicious node detection involves the cluster head eavesdropping on transmissions, comparing messages to a buffer, and raising warnings if messages do not match. Simulation results showed this approach increased network lifetime by around 2611 seconds compared to a non-hierarchical model.
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
Wireless sensor networks are networks having non
wired infrastructure and dynamic topology. In OSI model each
layer is prone to various attacks, which halts the performance
of a network .In this paper several attacks on four layers of
OSI model are discussed and security mechanism is described
to prevent attack in network layer i.e wormhole attack. In
Wormhole attack two or more malicious nodes makes a covert
channel which attracts the traffic towards itself by depicting a
low latency link and then start dropping and replaying packets
in the multi-path route. This paper proposes promiscuous mode
method to detect and isolate the malicious node during
wormhole attack by using Ad-hoc on demand distance vector
routing protocol (AODV) with omnidirectional antenna. The
methodology implemented notifies that the nodes which are
not participating in multi-path routing generates an alarm
message during delay and then detects and isolate the
malicious node from network. We also notice that not only
the same kind of attacks but also the same kind of
countermeasures can appear in multiple layer. For example,
misbehavior detection techniques can be applied to almost all
the layers we discussed.
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack of centralized management of these networks makes them vulnerable to a number of security attacks. One of the attacks is packet drop attack, where a compromised node drops packets maliciously. Several techniques have been proposed to detect the packet drop attack in wireless ad hoc networks. Therefore, in this paper we review some of the packet drop attack detection techniques and comparatively analyze them basing on; their ability to detect the attack under different attack strategies (partial and or cooperate attacks), environments and the computational and communication overheads caused in the process of detection.
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORKIJNSA Journal
The wireless sensor networks (WSN) are particularly vulnerable to various attacks at different layers of the protocol stack. Many intrusion detection system (IDS) have been proposed to secure WSNs. But all these systems operate in a single layer of the OSI model, or do not consider the interaction and collaboration between these layers. Consequently these systems are mostly inefficient and would drain out the WSN. In this paper we propose a new intrusion detection system based on cross layer interaction between the network, Mac and physical layers. Indeed we have addressed the problem of intrusion detection in a different way in which the concept of cross layer is widely used leading to the birth of a new type of IDS. We have experimentally evaluated our system using the NS simulator to demonstrate its effectiveness in detecting different types of attacks at multiple layers of the OSI model.
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...IJNSA Journal
Security in any of the networks became an important issue in this paper we have implemented a security mechanism on Medium Access Control layer by Assured Neighbor based Security Protocol to provide authentication and confidentiality of packets along with High speed transmission for Ad hoc networks. Here we have divided the protocol into two different parts. The first part deals with Routing layer information; in this part we have tried to implement a possible strategy for detecting and isolating the malicious nodes. A trust counter for each node is determined which can be actively increased and decreased depending upon the trust value for the purpose of forwarding the packets from source node to destination node with the help of intermediate nodes. A threshold level is also predetermined to detect the malicious nodes. If the value of the node in trust counter is less than the threshold value then the node is denoted ‘malicious’. The second part of our protocol deals with the security in the link layer. For this security reason we have used CTR (Counter) approach for authentication and encryption. We have simulated all our strategies and schemes in NS-2, the result of which gives a conclusion that our proposed protocol i.e. Assured Neighbor based Security Protocol can perform high packet delivery against various intruders and also packet delivery ratio against mobility with low delays and low overheads.
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This
has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack
of centralized management of these networks makes them vulnerable to a number of security attacks. One
of the attacks is packet drop attack, where a compromised node drops packets maliciously. Several
techniques have been proposed to detect the packet drop attack in wireless ad hoc networks. Therefore, in
this paper we review some of the packet drop attack detection techniques and comparatively analyze them
basing on; their ability to detect the attack under different attack strategies (partial and or cooperate
attacks), environments and the computational and communication overheads caused in the process of
detection.
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...IOSR Journals
This document discusses selective jamming attacks on wireless networks. It defines the problem of real-time packet classification by jamming nodes and developing mechanisms to prevent this. It presents the network and adversary models considered. Optimization problems are formulated to represent the best strategies for the attacker and network when they have imperfect knowledge of each other. Detection of jamming attacks is also addressed through monitoring packet delivery ratios across nodes.
This document summarizes research on defeating denial-of-service (DoS) attacks in wireless networks in the presence of jammers. It describes common types of jamming attacks like constant, deceptive, random, and reactive jammers. Detection techniques for jammers and methods to reduce the impact of DoS attacks are discussed. The objective is to detect jammers, lessen the effect of DoS attacks, and improve wireless communication security. Key jamming criteria like energy efficiency, detection probability, denial-of-service level, and strength against physical layer techniques are also outlined.
One of the most popular areas of research is wireless communication. Mobile Ad Hoc network (MANET) is a network with wireless mobile nodes, infrastructure less and self organizing. With its wireless and distributed nature it is exposed to several security threats. One of the threats in MANET is the wormhole attack. In this attack a pair of attacker forms a virtual link thereby recording and replaying the wireless transmission. This paper presents types of wormhole attack and also includes different technique for detecting wormhole attack in MANET..
A key management approach for wireless sensor networksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
This document discusses security issues and proposed solutions for wireless sensor networks. It begins by defining wireless sensor networks and describing common applications. It then outlines several security threats like denial of service attacks, wormhole attacks, sybil attacks, and traffic analysis attacks. It also discusses proposed cryptography and authentication schemes to provide data confidentiality, integrity, and freshness. Finally, it advocates for a holistic security approach that considers all network layers rather than focusing on single layers.
The document summarizes a research paper on avoiding jamming attacks over wireless networks through packet hiding. It discusses how selective jamming works, impacting network performance. It proposes three schemes combining cryptographic mechanisms like puzzle schemes, commitment schemes, and all-or-nothing transformations with physical layer parameters to mitigate selective jamming. The main goal is to transform a selective jammer into a random one and enable safe transmission even with a jammer present.
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...IJNSA Journal
The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the physical layer more prone to security attacks. The MANET physical layer is challenging to DoS attack and also some passive attacks. The physical layer protocol in MANETs is responsible for bit-level transmission between network nodes. The proposed model combines spread spectrum technology Direct Sequence Spread Spectrum (DSSS) with key management technique ISAKMP to defend against signal jamming denial-of-service attacks in physical layer of MANET.DSSS with ISAKMP is found to be a good security solution even with its known security problems. The simulation is done using network simulator qualnet 5.0 for different number of mobile nodes. The proposed model has shown improved results in terms of Average throughput, Average end to end delay, Average packet delivery ratio, and Average jitter.
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
One of the most effective way to prevent unauthorized and corrupted message from being forward in wireless sensor
network. So to restrict these problems many authentication schemes have been developed based on symmetric key cryptosystem. But
there is high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks.
So to address these isuues polynomial based scheme[1] was introduced. But in these methods it having the threshold problem that
means to send the limited message only because to send larger number of message means the attacker can fully recover. So in my
existing system a scalable message authentication scheme based on elliptic curve cryptography. This scheme allows any node to
transmit an unlimited number of messages without suffering the threshold problem. But these method only detect the black hole and
grey hole attacks are dected but does not detect the worm hole attack. In my proposed system to detect the worm hole attack. Worm
hole attack is one of the harmful attack to which degrade the network performance. So, in the proposed system, one innovative
technique is introduced which is called an efficient wormhole detection mechanism in the wireless sensor networks. In this method,
considers the RTT between two successive nodes and those nodes‟ neighbor number which is needed to compare those values of other
successive nodes. The identification of wormhole attacks is based on the two faces. The first consideration is that the transmission time
between two wormhole attack affected nodes is considerable higher than that between two normal neighbor nodes. The second
detection mechanism is based on the fact that by introducing new links into the network, the adversary increases the number of
neighbors of the nodes within its radius. An experimental result shows that the proposed method achieves high network performance..
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
Abstract This paper deals with Real Time Operating System (RTOS) based secure wormhole detection and prevention in ad hoc networks. The wormhole attack can form a serious threat to wireless networks, especially against many ad hoc network routing protocols and location based wireless security systems. A wormhole is created in the ad hoc network by introducing two malicious nodes. These two nodes form a worm hole link and message is transmitted through this link. The next part of the work is to detect the wormhole link by defining worm hole detection and prevention algorithm. After detecting suspicious links, one node performs a verification procedure for each suspicious link. The detection procedure and verifying procedure of suspicious worm link are used for further prevention of wormhole attack in the ad hoc network.
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
The recent advancements in the wireless arena and their wide-spread utilization have introduced new security vulnerabilities. The wireless media being shared is exposed to outside world, so it is susceptible to various attacks at different layers of OSI network stack. For example, jamming and device tampering at the physical layer; disruption of the medium access control (MAC) layer; routing attacks like Blackhole, rushing, wormhole; targeted attacks on the transport protocol like session hijacking, SYN flooding or even attacks intended to disrupt specific applications through viruses, worms and Trojan Horses. Wormhole attack is one of the serious routing attacks amongst all the network layer attacks launched on MANET. Wormhole attack is launched by creation of tunnels and it leads to total disruption of the routing paths on MANET. In this paper, Wormhole detection algorithm (WDA) is proposed based on modifying the forwarding packet process that detects and isolates wormhole nodes in ad hoc on demand distance vector (AODV) routing protocol.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
In this paper, we introduce and discuss an approach that will be used to secure the DSDV routing
protocol in an ad-hoc network. Due to mobility and absence of infrastructure, nodes are more vulnerable
to several malicious attacks. The secure routing is essential to transmit packets from source to the
destination. Our approach consists to model and manage fidelity concept in an ad-hoc clustering
architecture. Clustering makes it possible to group the mobile nodes and to send data simultaneously to
the each group. Our security model thus aims to integrate mechanisms against black hole attacks, forcing cooperation between nodes and detecting failing behaviors. The nodes present in the clusters will work
more efficiently and the message passing within the nodes will also get more authenticated from the
cluster heads. The simulation of our proposed algorithm is carried out using NS2 network simulator by evaluating some network performances such as average delay, throughput of communication and packets
loss
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Más contenido relacionado
Similar a SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
AN IMPROVED WATCHDOG TECHNIQUE BASED ON POWER-AWARE HIERARCHICAL DESIGN FOR I...IJNSA Journal
This document proposes an improved watchdog technique for intrusion detection in wireless sensor networks. The technique uses a hierarchical model with cluster head nodes acting as watchdogs to monitor network activity within each cell. This is intended to overcome issues with the original watchdog mechanism and reduce power consumption, extending the lifetime of sensor nodes. The algorithm for malicious node detection involves the cluster head eavesdropping on transmissions, comparing messages to a buffer, and raising warnings if messages do not match. Simulation results showed this approach increased network lifetime by around 2611 seconds compared to a non-hierarchical model.
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
Wireless sensor networks are networks having non
wired infrastructure and dynamic topology. In OSI model each
layer is prone to various attacks, which halts the performance
of a network .In this paper several attacks on four layers of
OSI model are discussed and security mechanism is described
to prevent attack in network layer i.e wormhole attack. In
Wormhole attack two or more malicious nodes makes a covert
channel which attracts the traffic towards itself by depicting a
low latency link and then start dropping and replaying packets
in the multi-path route. This paper proposes promiscuous mode
method to detect and isolate the malicious node during
wormhole attack by using Ad-hoc on demand distance vector
routing protocol (AODV) with omnidirectional antenna. The
methodology implemented notifies that the nodes which are
not participating in multi-path routing generates an alarm
message during delay and then detects and isolate the
malicious node from network. We also notice that not only
the same kind of attacks but also the same kind of
countermeasures can appear in multiple layer. For example,
misbehavior detection techniques can be applied to almost all
the layers we discussed.
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack of centralized management of these networks makes them vulnerable to a number of security attacks. One of the attacks is packet drop attack, where a compromised node drops packets maliciously. Several techniques have been proposed to detect the packet drop attack in wireless ad hoc networks. Therefore, in this paper we review some of the packet drop attack detection techniques and comparatively analyze them basing on; their ability to detect the attack under different attack strategies (partial and or cooperate attacks), environments and the computational and communication overheads caused in the process of detection.
CROSS LAYER INTRUSION DETECTION SYSTEM FOR WIRELESS SENSOR NETWORKIJNSA Journal
The wireless sensor networks (WSN) are particularly vulnerable to various attacks at different layers of the protocol stack. Many intrusion detection system (IDS) have been proposed to secure WSNs. But all these systems operate in a single layer of the OSI model, or do not consider the interaction and collaboration between these layers. Consequently these systems are mostly inefficient and would drain out the WSN. In this paper we propose a new intrusion detection system based on cross layer interaction between the network, Mac and physical layers. Indeed we have addressed the problem of intrusion detection in a different way in which the concept of cross layer is widely used leading to the birth of a new type of IDS. We have experimentally evaluated our system using the NS simulator to demonstrate its effectiveness in detecting different types of attacks at multiple layers of the OSI model.
AN APPROACH TO PROVIDE SECURITY IN MOBILE AD-HOC NETWORKS USING COUNTER MODE ...IJNSA Journal
Security in any of the networks became an important issue in this paper we have implemented a security mechanism on Medium Access Control layer by Assured Neighbor based Security Protocol to provide authentication and confidentiality of packets along with High speed transmission for Ad hoc networks. Here we have divided the protocol into two different parts. The first part deals with Routing layer information; in this part we have tried to implement a possible strategy for detecting and isolating the malicious nodes. A trust counter for each node is determined which can be actively increased and decreased depending upon the trust value for the purpose of forwarding the packets from source node to destination node with the help of intermediate nodes. A threshold level is also predetermined to detect the malicious nodes. If the value of the node in trust counter is less than the threshold value then the node is denoted ‘malicious’. The second part of our protocol deals with the security in the link layer. For this security reason we have used CTR (Counter) approach for authentication and encryption. We have simulated all our strategies and schemes in NS-2, the result of which gives a conclusion that our proposed protocol i.e. Assured Neighbor based Security Protocol can perform high packet delivery against various intruders and also packet delivery ratio against mobility with low delays and low overheads.
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
Wireless ad hoc networks have gained lots of attention due to their ease and low cost of deployment. This
has made ad hoc networks of great importance in numerous military and civilian applications. But, the lack
of centralized management of these networks makes them vulnerable to a number of security attacks. One
of the attacks is packet drop attack, where a compromised node drops packets maliciously. Several
techniques have been proposed to detect the packet drop attack in wireless ad hoc networks. Therefore, in
this paper we review some of the packet drop attack detection techniques and comparatively analyze them
basing on; their ability to detect the attack under different attack strategies (partial and or cooperate
attacks), environments and the computational and communication overheads caused in the process of
detection.
Jamming Anticipation and Convolution through Immaculate Hiding Process of Pac...IOSR Journals
This document discusses selective jamming attacks on wireless networks. It defines the problem of real-time packet classification by jamming nodes and developing mechanisms to prevent this. It presents the network and adversary models considered. Optimization problems are formulated to represent the best strategies for the attacker and network when they have imperfect knowledge of each other. Detection of jamming attacks is also addressed through monitoring packet delivery ratios across nodes.
This document summarizes research on defeating denial-of-service (DoS) attacks in wireless networks in the presence of jammers. It describes common types of jamming attacks like constant, deceptive, random, and reactive jammers. Detection techniques for jammers and methods to reduce the impact of DoS attacks are discussed. The objective is to detect jammers, lessen the effect of DoS attacks, and improve wireless communication security. Key jamming criteria like energy efficiency, detection probability, denial-of-service level, and strength against physical layer techniques are also outlined.
One of the most popular areas of research is wireless communication. Mobile Ad Hoc network (MANET) is a network with wireless mobile nodes, infrastructure less and self organizing. With its wireless and distributed nature it is exposed to several security threats. One of the threats in MANET is the wormhole attack. In this attack a pair of attacker forms a virtual link thereby recording and replaying the wireless transmission. This paper presents types of wormhole attack and also includes different technique for detecting wormhole attack in MANET..
A key management approach for wireless sensor networksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
This document discusses security issues and proposed solutions for wireless sensor networks. It begins by defining wireless sensor networks and describing common applications. It then outlines several security threats like denial of service attacks, wormhole attacks, sybil attacks, and traffic analysis attacks. It also discusses proposed cryptography and authentication schemes to provide data confidentiality, integrity, and freshness. Finally, it advocates for a holistic security approach that considers all network layers rather than focusing on single layers.
The document summarizes a research paper on avoiding jamming attacks over wireless networks through packet hiding. It discusses how selective jamming works, impacting network performance. It proposes three schemes combining cryptographic mechanisms like puzzle schemes, commitment schemes, and all-or-nothing transformations with physical layer parameters to mitigate selective jamming. The main goal is to transform a selective jammer into a random one and enable safe transmission even with a jammer present.
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...IJNSA Journal
The wireless and dynamic nature of mobile ad hoc networks (MANETs) leaves them more vulnerable to security attacks than their wired counterparts. The nodes act both as routers and as communication end points. This makes the physical layer more prone to security attacks. The MANET physical layer is challenging to DoS attack and also some passive attacks. The physical layer protocol in MANETs is responsible for bit-level transmission between network nodes. The proposed model combines spread spectrum technology Direct Sequence Spread Spectrum (DSSS) with key management technique ISAKMP to defend against signal jamming denial-of-service attacks in physical layer of MANET.DSSS with ISAKMP is found to be a good security solution even with its known security problems. The simulation is done using network simulator qualnet 5.0 for different number of mobile nodes. The proposed model has shown improved results in terms of Average throughput, Average end to end delay, Average packet delivery ratio, and Average jitter.
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
One of the most effective way to prevent unauthorized and corrupted message from being forward in wireless sensor
network. So to restrict these problems many authentication schemes have been developed based on symmetric key cryptosystem. But
there is high computational and communication overhead in addition to lack of scalability and resilience to node compromise attacks.
So to address these isuues polynomial based scheme[1] was introduced. But in these methods it having the threshold problem that
means to send the limited message only because to send larger number of message means the attacker can fully recover. So in my
existing system a scalable message authentication scheme based on elliptic curve cryptography. This scheme allows any node to
transmit an unlimited number of messages without suffering the threshold problem. But these method only detect the black hole and
grey hole attacks are dected but does not detect the worm hole attack. In my proposed system to detect the worm hole attack. Worm
hole attack is one of the harmful attack to which degrade the network performance. So, in the proposed system, one innovative
technique is introduced which is called an efficient wormhole detection mechanism in the wireless sensor networks. In this method,
considers the RTT between two successive nodes and those nodes‟ neighbor number which is needed to compare those values of other
successive nodes. The identification of wormhole attacks is based on the two faces. The first consideration is that the transmission time
between two wormhole attack affected nodes is considerable higher than that between two normal neighbor nodes. The second
detection mechanism is based on the fact that by introducing new links into the network, the adversary increases the number of
neighbors of the nodes within its radius. An experimental result shows that the proposed method achieves high network performance..
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Malicious attack detection and prevention in ad hoc network based on real tim...eSAT Journals
Abstract This paper deals with Real Time Operating System (RTOS) based secure wormhole detection and prevention in ad hoc networks. The wormhole attack can form a serious threat to wireless networks, especially against many ad hoc network routing protocols and location based wireless security systems. A wormhole is created in the ad hoc network by introducing two malicious nodes. These two nodes form a worm hole link and message is transmitted through this link. The next part of the work is to detect the wormhole link by defining worm hole detection and prevention algorithm. After detecting suspicious links, one node performs a verification procedure for each suspicious link. The detection procedure and verifying procedure of suspicious worm link are used for further prevention of wormhole attack in the ad hoc network.
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
The recent advancements in the wireless arena and their wide-spread utilization have introduced new security vulnerabilities. The wireless media being shared is exposed to outside world, so it is susceptible to various attacks at different layers of OSI network stack. For example, jamming and device tampering at the physical layer; disruption of the medium access control (MAC) layer; routing attacks like Blackhole, rushing, wormhole; targeted attacks on the transport protocol like session hijacking, SYN flooding or even attacks intended to disrupt specific applications through viruses, worms and Trojan Horses. Wormhole attack is one of the serious routing attacks amongst all the network layer attacks launched on MANET. Wormhole attack is launched by creation of tunnels and it leads to total disruption of the routing paths on MANET. In this paper, Wormhole detection algorithm (WDA) is proposed based on modifying the forwarding packet process that detects and isolates wormhole nodes in ad hoc on demand distance vector (AODV) routing protocol.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
A Key Management Approach For Wireless Sensor NetworksZac Darcy
In this paper we presenta key management approach for wireless sensor networks. This approach
facilitating an efficient scalable post-distribution key establishment that provides different security services.
We have developed and tested this approach under TinyOs. Result shows that this approach provides
acceptable resistance against node capture attacks and replay attacks. The provision of security services is
completely transparent to the user of the WSNs. Furthermore, being highly scalable and lightweight, this
approach is appropriate to be used in a wireless sensor network of hundreds of nodes.
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
In this paper, we introduce and discuss an approach that will be used to secure the DSDV routing
protocol in an ad-hoc network. Due to mobility and absence of infrastructure, nodes are more vulnerable
to several malicious attacks. The secure routing is essential to transmit packets from source to the
destination. Our approach consists to model and manage fidelity concept in an ad-hoc clustering
architecture. Clustering makes it possible to group the mobile nodes and to send data simultaneously to
the each group. Our security model thus aims to integrate mechanisms against black hole attacks, forcing cooperation between nodes and detecting failing behaviors. The nodes present in the clusters will work
more efficiently and the message passing within the nodes will also get more authenticated from the
cluster heads. The simulation of our proposed algorithm is carried out using NS2 network simulator by evaluating some network performances such as average delay, throughput of communication and packets
loss
Similar a SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES (20)
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
SELECTIVE JAMMING ATTACK PREVENTION BASED ON PACKET HIDING METHODS AND WORMHOLES
1. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.3, May 2014
DOI : 10.5121/ijnsa.2014.6308 99
SELECTIVE JAMMING ATTACK
PREVENTION BASED ON PACKET HIDING
METHODS AND WORMHOLES
Divya Ann Luke, Dr. Jayasudha. J .S
Department of Computer Science and Engineering
SCT College of Engineering, Trivandrum.
ABSTRACT- The wireless networks are more sensitive to the Denial-of-Service (DoS) attacks. The
existing system is based on Spread Spectrum (SS). This technique mainly focuses on an external threat
model. In wireless network the communications between nodes take place through broadcast
communication. That is why, if an attacker present within the network can easily eavesdrop the message
sent by any node. The main attack present in the wireless network is the selective jamming attack. This type
of attack mainly focuses a single node termed as target node. Attacker always tries to block the message
sent by the target node. This leads to the Denial-of-Service attack. We are proposing a new method to
prevent the selective jamming attack in an internal threat model.
A wormhole is used, which will generate an alarm to indicate the presence of jammer and sent IP address
of jammer node to all other nodes in the network. Using a method called packet hiding, we can send
message through the network even though a jammer is present. This method is based on the technique
called Strong Hiding Commitment Scheme (SHCS). Here, the access point in a network region becomes the
wormhole whenever it finds out any node that violates the rules in a particular network region. That node is
then considered as a jammer node. The wormhole sends IP address of jammer to all other nodes.
Wormhole then prevents the jamming activity of the jammer by encrypting the source ID of message along
with the message packet.So that the jammer is unable to identify its target node and the source can forward
its message safely through jammer node itself.
KEYWORDS-Selective jamming, Spread spectrum,Denial-of-Service attack,Wormholes, AES
1. INTRODUCTION
The wireless networks are more sensitive to the Denial-of-Service (DoS) attacks [1]. In
almost every case, jamming causes a denial of service type attack to either sender or receiver.
The easiest form of jamming a wireless network communication is to continually transmit
useless data to the node where the server becomes overloaded. Most people have no idea if a
jamming signal is in use.
It appears as if there is no service.This attack makes the network resource unavailable to its
legitimate users. The existing system is based on Spread Spectrum (SS). This technique
mainly focused on an external threat model. In broadcast communication, if an attacker
present within the network can easily eavesdrop the message sent by any node. In selective
jamming attack, the attacker always tries to block the message sent by its target node and it
leads to the Denial-of-Service attack [1] [2].
2. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.3, May 2014
100
In this paper, main focus is to prevent selective jamming attack in an internal threat model. A
wormhole[3] is used to generate an alarm to indicate the presence of jammer to all access
point in the network. Presence of any jammer is detected a method called packet hiding [4] is
used to transmit message through the network.
This method is based on the technique called Strong Hiding Commitment Scheme(SHCS)
[4]. Alejandro Proano and LoukasLazos [4] proposed a paper based on this technique.
Wormhole based anti-jammingconcept along is included in the newly proposed method for
eliminating DoS attack.
Figure 1. Spread spectrum transmitter
Figure 2.Spread Spectrum receiver
The rest of the paper is organized as follows: Section 2 presents the problem statements,
which describes the details about existing system and its disadvantages. Section 3 presents
the details about proposed system. Section 4 and 5 describe about the implementation details
and performance analysis. Conclusion and directions for future work are given in section 6.
2. PROBLEM STATEMENT
In this section, we are going to describe about existing system and its disadvantages. The
existing system mainly focuses on an external threat model. That is why the attacker within
the wireless network can easily establish the selective jammingattack. There are two reasons
for this problem, first one is the broadcast communication between nodes within the wireless
network and second one is that the existing system uses the Spread Spectrum concept.
3. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.3, May 2014
101
Conventional anti jamming technique use Spread Spectrum (SS) communication. The Spread
Spectrum system take a user bit stream and perform an XOR with a pseudo noise
sequence.Figure 1 is the spreading of the user data with the pseudo noise. The spread signal is
then modulated with a radio carrier. Suppose for an example a user signal with a bandwidth
of 1 MHz spreading with the PN code (10110111000 - known as 11-chip Barker code) would
result in a signal with 11 MHz bandwidth. The radio carrier then shifts this signal to the
carrier frequency (2.4 GHz in the ISM band). This signal is then transmitted.Figure 2 shows
the simplified block diagrams of SS receiver. The SS receiver is more complicated than
transmitter. The first step in the receiver involves demodulating the received signal. The
receiver has to know the original PN code. This is the one main drawbacks of the existing
system.
Spread Spectrum technique provides bit-level protection by spreading bits according to a
secret pseudo noise (PN) code. That is known only to the communicating parties. This
method can only protect the wireless networks under an external threat model. We know that
the communication within the wireless network is done through the broadcast
communication. So, this is vulnerable under an internal threat model. All intended receivers
must know about the secrets used to protect transmissions. Another one drawback is
compromise of a single receiver. So, the sender needs to reveal relevant cryptographic
information to its receiver. A packet hiding technique is introduced for sending messages
among nodes within the wireless network [4].
The following sections describes about packet hiding and wormhole concept.
3. PROPOSED SYSTEM
A solution to the selective jamming attack in the wireless network would be the encryption of
packet that is going to send. Here encryption is applied to the attributes except destination. It
means that we hide the packet from attacker. The encryption is applied only to the attributes
except destination. That is why, during broadcasting there is no need for intermediate
decryption. Each node checks the IP address of incoming packet. If it is sent for that
particular node it will decrypt otherwise just forwarded to the next node.Alejandro Proano
and LoukasLazos [4] proposed technique known as the Strong Hiding Commitment Scheme
(SHCS) for packet hiding. This technique is based on symmetric cryptography [6][7]. First,
the sender‘s’ has a packet ‘P’ for a particular receiver ‘r’. First step in SHCS is applying a
permutation on packet P. That is, π1(P). Then encrypt the corresponding permuted packet
with a random key ‘k’. Here we can apply the Advanced Encryption Standard (AES)
technique. Now the encrypted value became c=Ek (π1 (P)). This packet is broadcast to all
nodes. Already told that, here encryption is applied only to the attributes except destination.
Therefore an attacker within the wireless network can’t identify the source of incoming
packet, because the packet is encrypted. Packet hiding methods make it difficult for attacker
to identify its targeted node’s messages[8][9].
One question arises here is that, how the node can identify that a particular node is a jammer.
The answer for this question is that a node which receives repeated acknowledgements for the
same message or another situation is that the packet is held by a node in the network for a
long time (not because of high network traffic) or if any node that violates the rules in a
particular network region. Then the access point can identify that the particular node is a
jammer.In this situation, the wormhole concept is newly incorporated. The access point then
turns into a wormhole. This wormhole then prevents the jamming activity of particular
4. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.3, May 2014
102
jammer. By this method, all other nodes within that network can understand information
about the jammer. Next time when they send a message, they can select another path for
transmitting message or transmit through the same path, but must apply the packet hiding
technique.
The packet can also be send through a shortest path between source and destination. Any
algorithm for finding the shortest path between a source and destination can be used. In
wireless network, it is possible to find the path by analyzing the range of nodes. Figure 3
shows a process flow, which describes the overall working of this concept when we
implement it as practical.
Simulation of this proposed technique can be done by performing operations shown in the
process flow. NODE CREATION module creates the nodes in wireless network. When we
create a node we must specify the range of that particular node, because it is essential for the
calculation of shortest path. Nodes can move from one position to another position. Suppose
if one node is selected as a jammer, then the source send packet after applying SHCS
technique and transmit through shortest path between source and destination.
The application of this concept arises when we require a secure communication such as
emergency response operations, military, or police networks or safety-secret business
operations. Just take an example, in emergency response operations like after a natural
disaster, adhoc networks could be used for real-time safety feedback. In this situation, the
usual network may be damaged. Emergency rescue groups might rely upon the adhoc
networks for communication within that affected place.
Figure 3. Process flow
4. IMPLEMENTATION
The proposed method is simulated by creating a virtual network using Java Thread API. Each
node is created using as separate thread, it is possible to assign each node its position, auto IP
assignment, routing table updating. Java.awt.graphics, javax. Swingcolour packages are used
for creating the environments. A jammer node is created using thread and graphics packages
for applying selective jamming. A node can berepositioned to any location. A wormhole is
generated automatically to migrate from one place to another using graphics API. An alarm is
generated by the wormhole as packet to every node in the region.
5. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.3, May 2014
103
4.1 Network model
The network consists of a collection of nodes connected through wireless links. Nodes can be
communicating either directly (if they are within communication range), or indirectly through
multiple hops. Here both unicast and broadcast mode communications are possible. If there is
no jammer, unencrypted communication can be performing. Otherwise encrypted
communications might perform. For encrypted broadcast communications, packet will send
after applying packet hiding method.
4.2 Communication model
The source sent message to its destination either directly or indirectly. When the source gets
the information about jammer, it hides the packet and sends again through the same path.
Implementation of packet hiding method is described in section 4.3. A wormhole also
generates and it alerts all access points in the network about the presence of jammer. In
section 4.4, we describe implementation details of wormhole.
4.3 SHCS implementation
The sender‘s’ has packet ‘P’ for a receiver ‘r’. The implementation of Strong Hiding
Commitment Scheme technique has following steps:
• First apply a permutation on packet ‘P’. i.e., π1 (P).
• Encrypt the permuted packet π1 (P) with static key ‘k’ except destination part. We
obtain the commitment value, c= Ek (π1 (P)).
• The sender broadcast this commitment value along with static key ‘k’.
• At the receiver side, the reverse of above steps will take place.
Wormhole implementation
Wormholes can be used as a reactive defense mechanism. After receiving repeated
acknowledgements, the source becomes the wormhole and sends the information regarding
the jammer to all other nodes. This wormhole, then prevent the jamming activity of particular
jammer. By this method, all other nodes within that network can understand the information
about the jammer.
4.5 Shortest path implementation
Using the communication ranges between nodes, the shortest distance is calculated. A routing
table is maintained to store the distance between nodes in a network. Updations are possible
to the table whenever necessary.
5 PERFORMANE ANALYSIS
In [4], Alejandro Proano and LoukasLazos evaluate the impact of our packet-hiding
technique on the network performance through simulations. The SCHS requires the
6. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.3, May 2014
104
application of permutation and one symmetric encryption at the sender side. The receiver
side, the inverse operations have to be performed. They can implement AES at speed of tens
of Gbps/sec. These processing speeds are higher than the transmission speeds of most current
wireless technologies.
Cagalj [3] evaluate the wormhole-based anti-jamming techniqueusing simulations written in
Mat lab. From that evaluation, we can understand the frequency of number of success
increases. The wormhole can effectively alert the presence of the jammer to other nodes.
From this, we can understand theselective jamming attack can be effectively prevented by
using packet hiding method and wormhole based anti-jamming technique. After including
wormhole-based anti-jamming and transmission through shortest path, the performance of the
packet hiding technique improved. It improves the performance and reliability of the wireless
networks.
6 CONCLUSION
In this paper, a technique is proposed for sending message in wireless network even if an
attacker is present. It also described the technique wormholes, which will alert all other nodes
about the presence of a jammer. Here the packet sends through the shortest path between
sender and receiver. After including wormholes and shortest path concept the performance of
packet hiding method improved. This technique is very effective in emergency response
operations, military, police networks etc. It improves the performance and reliability of
wireless networks. Static key used for encryption can be extended in future by adding random
key concept. The packet hiding technique can also be performed using another techniques
like Cryptographic Puzzle Hiding Scheme(CPHS) and Hiding Based on All-or-nothing
transformation(AONTs).
REFERENCES
[1] A.D.Wood and J.A. Stankovic, “Denial of service in sensor networks,” Computer, vol. 35, no.
10, pp. 54-62, oct. 2002.
[2] J. McCune, E.Shi, A.Perrig, and M.K.Reiter, “Detection of Denial-of-message attacks on sensor
networks broadcasts”, Proc. IEEE symp. Security and Privacy, May 2005.
[3] Mario Cagalj, SrdjanCapkun, Jean-PierroHubau “Wormhole-Based Anti jamming Techniques in
sensor networks”, IEEE Transactions on mobile computing, vol. 6, no. 1, Jan 2007.
[4] AlejandroProano and LoukasLazos, “Packet-Hiding methods for preventing Selective Jamming
attack”, IEEE Transactions on dependable and secure computing, vol. 9, no. 1,Feb-2012.
[5] I.Akyildiz,W.Su,Y.Sankarasubramaniam, and E.Cayirci, “A Survey on Sensor Networks,” IEEE
Comm. Magazine, vol. 40, no, 8, 2002.
[6] K. Gaj and P. Chodowiec, “ FPGA and ASIC Implementations of AES”,Cryptographic
Engineering, pp. 235-294 , Springer, 2009.
[7] O. Goldreich, “Foundations of Cryptography: Basic Applications”, Cambridge Univ.
Press,2004.
[8] W.Xu,W.Trappe,Y.Zhang, and T.Wood, “The Feasibility of Launching and Detecting Jamming
Attacks in Wireless Networks”, proc. MobiHoc ’05, pp.46-57, 2005.
[9] B. Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C”, 2007.
7. International Journal of Network Security & Its Applications (IJNSA), Vol.6, No.3, May 2014
105
[10] W. Xu, T. Wood, W. Trappe, and Y. Zhang, “Channel Surfing and Spatial Retreats: Defenses
against Wireless Denial of Service,”Proc. Third ACM Workshop Wireless Security, pp. 80-89,
2004.
Authors
DR. JAYASUDHA. J .Sis working as Professor and Head in the Department of
Computer Science & Engineering, SreeChitraThirunal College of Engineering,
Thiruvananthapuram. She has 18 years of teaching experience. She has organized
many community development programmes, short term courses and conferences.
She did her B. E. degree from Madurai Kamaraj University and M. E. degree from
National Institute of Technology, Trichy and doctorate degree from University of
Kerala. Her Ph.D. thesis title is “Web caching and Pre-fetching techniques for Web
traffic/Latency reduction”. She is recognized as approved research guide in thePh.D. programme
in Computer Science and guiding Ph.D. students in ManonmaniamSundaranar University and
Noorul Islam University. Now she is also doing research in Computer Networks. She has
published her research works in many national and international conferences and journals
DIVYA ANN LUKE currently doing her M.TECH degree in Computer Science &
Engineering at SreeChitraThirunal College of Engineering, Thiruvananthapuram. She
received her B.TECH degree in computer Science & Engineering from University of
Kerala in 2012.Her research i nterests include the design and analysis of security and
network protocols for wired and wireless networks.