10
submitted by B.RAMYA PRIYA 07121A0599 C.R.DEEPTHI 07121A0511 K.R.N.SANDEEP 07121A1239 K.K.SANDEEP 07121A0537 D.VANAJA 08125A0502 Guide : Mrs.I.Sheeba Assistant professor. Head of the Department : K.DELHI BABU Professor and PAT officer

optimal jamming final ppt

Embed Size (px)

Citation preview

Page 1: optimal jamming final ppt

submitted by

B.RAMYA PRIYA 07121A0599 C.R.DEEPTHI 07121A0511 K.R.N.SANDEEP 07121A1239 K.K.SANDEEP 07121A0537 D.VANAJA 08125A0502

Guide :Mrs.I.SheebaAssistant professor.

Head of the Department :K.DELHI BABU

Professor and PAT officer

Page 2: optimal jamming final ppt

ABSTRACTJamming is the type of attack which interferes with the radio

frequencies used by sensor nodes and may be viewed as a special case of denial of service attacks

Wireless sensor networks are more vulnerable to jamming attack .

The objective of a jammer is to interfere with legitimate wireless communications.

Page 3: optimal jamming final ppt

Jamming attack can be done at several layers

worst-case attack is found out of the class of most significant attacks in terms of incurred performance losses.

Methods for defending the jamming attacks

Local detection methods

Fusion algorithms

Page 4: optimal jamming final ppt
Page 5: optimal jamming final ppt

The attack is detected only after the destruction of the entire network.

No solution found if the jamming is performed at network layer by corrupting the control packets.

Difficult to handle the situation if there is SYN message flooding at the transport layer.

Page 6: optimal jamming final ppt

It involves a methodology and an optimal detection test

For this we include the formulation energy limitations

The model is based on the following considerations

• Perfect knowledge of attacker and network• Lack of knowledge of attacker and network

Page 7: optimal jamming final ppt

These payoff functions would likely result in different optimal jamming and anti jamming strategies.

Propose a solution that would solve the optimization problems separately from the viewpoints of the attacker and the network.

The attack can be detected while destroying and can safeguard the network easily.

Page 8: optimal jamming final ppt

SOFTWARE :

Operating System: Any OS with JRE

Language : JAVA

Markup language : XML

IDE : Netbeans, Adobe Builder

Page 9: optimal jamming final ppt

HARDWARE:

Processor : Intel core2duo

Hard disk :1GB

Graphics card

Page 10: optimal jamming final ppt