Upload
ksandeep1989
View
224
Download
0
Embed Size (px)
Citation preview
submitted by
B.RAMYA PRIYA 07121A0599 C.R.DEEPTHI 07121A0511 K.R.N.SANDEEP 07121A1239 K.K.SANDEEP 07121A0537 D.VANAJA 08125A0502
Guide :Mrs.I.SheebaAssistant professor.
Head of the Department :K.DELHI BABU
Professor and PAT officer
ABSTRACTJamming is the type of attack which interferes with the radio
frequencies used by sensor nodes and may be viewed as a special case of denial of service attacks
Wireless sensor networks are more vulnerable to jamming attack .
The objective of a jammer is to interfere with legitimate wireless communications.
Jamming attack can be done at several layers
worst-case attack is found out of the class of most significant attacks in terms of incurred performance losses.
Methods for defending the jamming attacks
Local detection methods
Fusion algorithms
The attack is detected only after the destruction of the entire network.
No solution found if the jamming is performed at network layer by corrupting the control packets.
Difficult to handle the situation if there is SYN message flooding at the transport layer.
It involves a methodology and an optimal detection test
For this we include the formulation energy limitations
The model is based on the following considerations
• Perfect knowledge of attacker and network• Lack of knowledge of attacker and network
These payoff functions would likely result in different optimal jamming and anti jamming strategies.
Propose a solution that would solve the optimization problems separately from the viewpoints of the attacker and the network.
The attack can be detected while destroying and can safeguard the network easily.
SOFTWARE :
Operating System: Any OS with JRE
Language : JAVA
Markup language : XML
IDE : Netbeans, Adobe Builder
HARDWARE:
Processor : Intel core2duo
Hard disk :1GB
Graphics card