Presented by
Anusha H N
Avinasha H N
Niha Noorain
Syed Musthak K S
Under the guidance of
Mrs. Shylaja L.N., B.E., M.Tech.
...

 Aim
 Scope
 Objectives
 Introduction
 Literature Survey
 Methodology
 Expected Result
 References
 Gantt Chart...

 To prevent the selective jamming attack by
combining three cryptographic primitives such as
strong hiding commitment s...

 Project show that selective jamming attacks can be
launched by performing real time packet
classification at the physi...

 Strong Hiding Commitment Scheme (SHCS),
Cryptographic Puzzle Hiding Scheme(CPHS) and
All-Or-Nothing Transformation (AO...

 To prevent the selective jamming attack.
 To avoid packet dropouts due to collisions between
neighboring nodes.
 To ...

 “Coping with a Smart Jammer in Wireless
Networks: A Stackelberg Game Approach”[2013]
-Dejun Yang
 Technique used: Pow...

 “Denial of Service Attacks in Wireless Network: The
Case of Jammer”.[2011]
-Konstantinos Pelechrinis
 Technique used:...

 “Detection of Jamming Attacks in Wireless Ad Hoc
Networks using Error Distribution”.[2009]
-Ali Hamieh
 Technique use...

 “Effects of Denial-of-Sleep attacks on Wireless Sensor
Network mac protocols”.[2009]
-David R. Raymond
 Technique use...

“JAMMING”
 How does it happen?
Realization of selective
jamming attack
11
Fig.1: Jamming Attack

 1. Strong Hiding Commitment Scheme (SHCS)
 2. Cryptographic Puzzle Hiding Scheme (CPHS)
 3.All-Or-Nothing-Transforma...

 Proposing a strong hiding commitment scheme
(SHCS), which is based on symmetric cryptography.
The main motivation is t...

 Presenting a packet hiding scheme based on
cryptographic puzzles. The main idea behind such
puzzles is to force the re...

 Here proposed project send a sequence of pseudo
messages corresponding to original messages. The
jammer cannot perform...

The Selective Jamming attack will be avoided and the
packets will be transmitted safely to the proper
destination
16
Exp...

1. M. Strasser, C. Po ¨pper, and S. Capkun, “Efficient
Uncoordinated fhss Anti-Jamming Communication,”
Proc. ACM Int’l S...

Gantt Chart - Schedule for carrying different
actvities during project work
18

19
Contd…

20
of 20

Preventing jamming attack by combining cryptography

preventing jamming attack by combining three cryptographic primitives SHCS, CPHS and AONT-HS.
Published on: Mar 4, 2016
Published in: Engineering      
Source: www.slideshare.net


Transcripts - Preventing jamming attack by combining cryptography

  • 1. Presented by Anusha H N Avinasha H N Niha Noorain Syed Musthak K S Under the guidance of Mrs. Shylaja L.N., B.E., M.Tech. Associate Professor Department of Information Science and Engineering
  • 2.   Aim  Scope  Objectives  Introduction  Literature Survey  Methodology  Expected Result  References  Gantt Chart Contents 2
  • 3.   To prevent the selective jamming attack by combining three cryptographic primitives such as strong hiding commitment scheme, cryptographic puzzle hiding scheme and all-or-nothing transformations scheme. 3 Aim
  • 4.   Project show that selective jamming attacks can be launched by performing real time packet classification at the physical layer.  To mitigate these attacks, proposed project develop three schemes that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes. 4 Scope
  • 5.   Strong Hiding Commitment Scheme (SHCS), Cryptographic Puzzle Hiding Scheme(CPHS) and All-Or-Nothing Transformation (AONT) scheme.  This project analyze the security of methods and evaluate their computational and communication overhead. 5 Contd…
  • 6.   To prevent the selective jamming attack.  To avoid packet dropouts due to collisions between neighboring nodes.  To show that a selective jammer can significantly impact performance with very low effort on network protocol such as TCP and routing.  To secure the packet transmission in wireless networks. Objectives 6
  • 7.   “Coping with a Smart Jammer in Wireless Networks: A Stackelberg Game Approach”[2013] -Dejun Yang  Technique used: Power Control Smart Jammer game.  Drawback: Jammer improves its utility in UNAWARE condition. 7 Literature Survey
  • 8.   “Denial of Service Attacks in Wireless Network: The Case of Jammer”.[2011] -Konstantinos Pelechrinis  Technique used: Intrusion Detection Scheme(IDS) used to detect the attack.  Intrusion Prevention System(IPS) used to prevent the attack. 8 Contd…
  • 9.   “Detection of Jamming Attacks in Wireless Ad Hoc Networks using Error Distribution”.[2009] -Ali Hamieh  Technique used: detection by correlation to detect the jammer.  Drawback: to detect the jamming attack dependency measure is needed from all nodes.  There is no technique to prevent selective jamming attack 9 Contd…
  • 10.   “Effects of Denial-of-Sleep attacks on Wireless Sensor Network mac protocols”.[2009] -David R. Raymond  Technique used: jamming identification & mitigation, anti-reply protection  Drawback: Transmitted message from a node can easily read by attacker because message is not encrypted.  Attacker can access any node using received message as a authorized and make busy state such attacks are selective jamming attack. 10 Contd…
  • 11.  “JAMMING”  How does it happen? Realization of selective jamming attack 11 Fig.1: Jamming Attack
  • 12.   1. Strong Hiding Commitment Scheme (SHCS)  2. Cryptographic Puzzle Hiding Scheme (CPHS)  3.All-Or-Nothing-Transformation Scheme(AONT) Methodology 12
  • 13.   Proposing a strong hiding commitment scheme (SHCS), which is based on symmetric cryptography. The main motivation is to satisfy the strong hiding property while keeping the computation and communication overhead to a minimum. 13 SHCS
  • 14.   Presenting a packet hiding scheme based on cryptographic puzzles. The main idea behind such puzzles is to force the recipient of a puzzle execute a pre-defined set of computations before he is able to extract a secret of interest. 14 CPHS
  • 15.   Here proposed project send a sequence of pseudo messages corresponding to original messages. The jammer cannot perform packet classification until all pseudo messages corresponding to the original packet have been received and the inverse transformation has been applied. 15 AONT
  • 16.  The Selective Jamming attack will be avoided and the packets will be transmitted safely to the proper destination 16 Expected Result
  • 17.  1. M. Strasser, C. Po ¨pper, and S. Capkun, “Efficient Uncoordinated fhss Anti-Jamming Communication,” Proc. ACM Int’l Symp. Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 207-218, 2009. 2. P. Tague, M. Li, and R. Poovendran, “Mitigation of Control Channel Jamming under Node Capture Attacks,” IEEE Trans. Mobile Computing, vol. 8, no. 9, pp. 1221-1234, Sept. 2009. 3. B. Thapa, G. Noubir, R. Rajaramanand, and B. Sheng, “On the Robustness of IEEE802.11 Rate Adaptation Algorithms against Smart Jamming,” Proc. ACM Conf. Wireless Network Security (WiSec), 2011. References 17
  • 18.  Gantt Chart - Schedule for carrying different actvities during project work 18
  • 19.  19 Contd…
  • 20.  20

Related Documents