31
Packet-Hiding Methods forPreventing Selective Jamming Attacks

Packet hiding methods for preventing selective jamming attacks

Embed Size (px)

DESCRIPTION

This project mainly describes how a data can be send securely via a network without getting being hacked by any intruder.here we use various different kind of cryptographic principal and secure mechanism where in which it complete protection to our data

Citation preview

Page 1: Packet hiding methods for preventing selective jamming attacks

Packet-Hiding Methods forPreventing Selective

Jamming Attacks

Page 2: Packet hiding methods for preventing selective jamming attacks

CONTENTS INTRODUCTION AIM EXISTING SYSTEM PROPOSED SYSTEM ADVANTAGES OF PROPOSED SYSTEM MODULES SOFTWARE SPECIFICATIONS CONCLUSIONS REFERENCES

Page 3: Packet hiding methods for preventing selective jamming attacks

INTRODUCTION The open nature of the wireless medium leaves it vulnerable to

interference attacks, typically referred to as jamming.

This interference attacks can be used for performing

Eavesdropping & Denial-of-Service attacks on wireless network

While eavesdropping can be prevented using cryptographic

methods, jamming attacks are much harder to counter. They

have been shown to actualize Denial-of-Service (DOS) attacks

against wireless networks.

If an attacker truly wanted to compromise your LAN and

wireless security

the most efficient approach would be to send random

unauthenticated packets to every wireless station in a network

Page 4: Packet hiding methods for preventing selective jamming attacks

We illustrate the advantages of selective jamming in terms of

network performance degradation and adversary effort by

presenting two case studies.

Typically, jamming has been addressed under an external threat

model. in which the jammer is not part of the network. Under this

model, the adversary interferes with the reception of messages by

transmitting a continuous jamming signal.

In this Work, we address the problem of jamming under an

internal threat model. We consider a sophisticated adversary who is

aware of network secrets and the implementation details of network

& exploits his knowledge for launching selective jamming attacks in

which specific messages of “high importance” are targeted

Page 5: Packet hiding methods for preventing selective jamming attacks

AIMTo Show that Selective Jamming Attacks can be

Launched By

Performing Real-Time Packet Classification at Physical

layer.

To Prevent these attacks develop schemes that prevent

Real-Time packet classification by combining

Cryptographic Primitives with Physical layers

attributes.

Page 6: Packet hiding methods for preventing selective jamming attacks

EXISTING SYSTEM Jamming attacks are much harder to counter and has more security problems.

In the simplest form of jamming, the adversary interferes with the reception of messages by transmitting a continuous jamming signal , or several short jamming pulses.

Conventional anti-jamming techniques rely extensively on spread-spectrum (SS) communications or some form of jamming evasion (e.g., slow frequency hopping, or spatial retreats). SS techniques provide bit-level protection by spreading bits according to a secret pseudo-noise (PN) code, known only to the communicating parties. These methods can only protect wireless transmissions under the external threat model.

Page 7: Packet hiding methods for preventing selective jamming attacks

DISADVATAGES –EXISTING SYSTEM Broadcast communications are particularly vulnerable under an

internal threat model because all intended receivers must be aware

of the secrets used to protect transmissions.

The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming.

Anyone with a transceiver can eavesdrop on wireless transmissions, inject spurious messages, or jam legitimate ones.

Hence, the compromise of a single receiver is sufficient to reveal relevant cryptographic information

Page 8: Packet hiding methods for preventing selective jamming attacks

PROPOSED SYSTEMIn the proposed system, we address the problem of

jamming under an internal threat model

We consider a sophisticated adversary who is aware of

network secrets and the implementation details of network

protocols.

The adversary exploits his internal knowledge for launching

selective jamming attacks in which specific messages of “high

importance” are targeted

 For example, a jammer can target route-request/route- reply

messages at the routing layer to prevent route discovery, or

target TCP acknowledgments in a TCP session to severely

degrade the throughput

Page 9: Packet hiding methods for preventing selective jamming attacks

ADVANTAGES OF PROPOSED SYSTEM

 Relatively Easy to Actualize by Exploiting Knowledge of the

Network Protocol and Cryptographic Primitives ,

extracted from Compromised nodes

Achieving strong security and prevention of Network

performance Degradation

Jamming Attacks can be more easily Encountered and treated. 

Page 10: Packet hiding methods for preventing selective jamming attacks

Modules: 1. Network module

2. Real Time Packet Classification

3. Selective Jamming Module

4. Strong Hiding Commitment Scheme (SHCS)

5. Cryptographic Puzzle Hiding Scheme (CPHS)

Page 11: Packet hiding methods for preventing selective jamming attacks
Page 12: Packet hiding methods for preventing selective jamming attacks

MODULES DESCRIPTION:Network moduleWe address the problem of preventing the jamming node from classifying m in real time, thus mitigating J’s ability to perform selective jamming.The network consists of a collection of nodes connected via wireless links. Nodes may communicate directly if they are within communication range, or indirectly via multiple hops. Nodes communicate both in unicast mode and broadcast mode. Communications can be either unencrypted or encrypted. For encrypted broadcast communications, symmetric keys are shared among all intended receivers. These keys are established using preshared pair wise keys or asymmetric cryptography.

REAL TIME PACKET CLASSIFICATIONAt the PHY layer, a packet m is encoded, interleaved, and modulated before it is transmitted over the wireless channel. At the receiver, the signal is demodulated, de interleaved, and decoded, to recover the original packet m. Moreover, even if the encryption key of a hiding scheme were to remain secret, the static portions of a transmitted packet could potentially lead to packet classification. This is because for computationally-efficient encryption methods such as block encryption, the encryption of a prefix plaintext with the same key yields a static cipher text prefix. Hence, an adversary who is aware of the underlying protocol specifics (structure of the frame) can use the static cipher text portions of a transmitted packet to classify it.

Page 13: Packet hiding methods for preventing selective jamming attacks

A STRONG HIDING COMMITMENT SCHEMEWe propose a strong hiding commitment scheme (SHCS), which is based on symmetric cryptography. Our main motivation is to satisfy the strong hiding property while keeping the computation and communication overhead to a minimum.

in the vicinity of a sender must receive the entire packet and decrypt it, before the packet type and destination can be determined. However, in wireless protocols such as 802.11, the complete packet is received at the MAC layer before it is decided if the packet must be discarded or be further processed . If some parts of the MAC header are deemed not to be useful information to the jammer, they can remain unencrypted in the header of the packet, thus avoiding the decryption operation at the receiver.

Page 14: Packet hiding methods for preventing selective jamming attacks

5. Cryptographic Puzzle Hiding Scheme (CPHS)we present a packet hiding scheme based on cryptographic puzzles. The main idea behind such puzzles is to force the recipient of a puzzle execute a pre-defined set of computations before he is able to extract a secret of interest. The time required for obtaining the solution of a puzzle depends on its hardness and the computational ability of the solver. The advantage of the puzzle based scheme is that its security does not rely on the PHY layer parameters. However, it has higher computation and communication overhead

HIDING BASED ON ALL-OR-NOTHING TRANSFORMATIONS

The packets are pre-processed by an AONT before transmission but remain unencrypted. The jammer cannot perform packet classification until all pseudo-messages corresponding to the original packet have been received and the inverse transformation has been applied. Packet m is partitioned to a set of x input blocks m = {m1, m2, m3….}, which serve as an input to an The set of pseudo-messages m = {m1, m2, m3,…..} is transmitted over the wireless medium.

Page 15: Packet hiding methods for preventing selective jamming attacks

UML DIAGRAMS

WSN jamming attacks

De-interleavingchannel Encoding

Connect

interleaving Channel Decoding

jamming attack analysis

End

Start

source DeatinationConnection Established

Packet send

Show Result

Packet Hiding

Data Flow Diagram

Page 16: Packet hiding methods for preventing selective jamming attacks

Activity Diagram

WSN jamming networks

connect

`

Source Destination

Channel Encoding De-interleaving

Channel Decodinginterleaving

Show results

Packet Hiding/queue

Page 17: Packet hiding methods for preventing selective jamming attacks

USE CASE DIAGRAM

Source

destination

Channel encode/decode

Packet hiding/queue

show results

jamming attack analysis

channel interleaving/de interleaving

select file

Page 18: Packet hiding methods for preventing selective jamming attacks

SEQUENCE DIAGRAM

wsn packet hiding

J amming attack analysis

packet hiding/ queue

channel decoding

source destination

connect Destination

connect Souce

Channel Encoding

interleaving

packet send

de interleaving

Page 19: Packet hiding methods for preventing selective jamming attacks

ARCHITECTURE DIAGRAM

Page 20: Packet hiding methods for preventing selective jamming attacks

Screen shots

Page 21: Packet hiding methods for preventing selective jamming attacks

Destination

Page 22: Packet hiding methods for preventing selective jamming attacks

Packet hiding queue

Page 23: Packet hiding methods for preventing selective jamming attacks

Packet hiding queue Packet hiding Queue is responsible for sending the packets in a

queue format i.e., first come first served the packets which

come first will be sent first in a sequential order.

The packet hiding acts as a server which is used for identifying

the

destination. It also checks the size of the data when we are

transmitting .

Each packet will be storing its corresponding information in the

binary format.

The packet hiding queue is responsible for sending the data to

the destination

Page 24: Packet hiding methods for preventing selective jamming attacks

jamming attack detection

Page 25: Packet hiding methods for preventing selective jamming attacks

jamming detected

Page 26: Packet hiding methods for preventing selective jamming attacks

HARDWARE SPECIFICATION

•System :Pentium IV 2.4

GHz.

•Hard Disk : 40 GB.

•Floppy Drive :1.44 Mb.

•Ram :256 Mb

Page 27: Packet hiding methods for preventing selective jamming attacks

SOFTWARE SPECIFICATION

Operating system : Windows XP Professional

Front End : JAVA Swing(JFC),RMI

Tool : Eclipse3.3

Page 28: Packet hiding methods for preventing selective jamming attacks

CONCLUSIONWe addressed the problem of selective jamming attacks in wireless networks. We considered an internal adversary model in which the jammer is part of the network under attack, thus being aware of the protocol specifications and shared network secrets. We showed that the jammer can classify transmitted packets in real time by decoding the first few symbols of an ongoing transmission. We evaluated the impact of selective jamming attacks on network protocols such as TCP and routing. Our findings show that a selective jammer can significantly impact performance with very low effort. We developed three schemes that transform a selective jammer to a random one by preventing real-time packet classification. Our schemes combine cryptographic primitives such as commitment schemes, cryptographic puzzles, and all-or-nothing transformations (AONTs) with physical layer characteristics. We analyzed the security of our schemes and quantified their computational and communication overhead.

Page 29: Packet hiding methods for preventing selective jamming attacks

REFERENCES

[1] T. X. Brown, J. E. James, and A. Sethi. Jamming and sensing ofencrypted wireless ad hoc networks. In Proceedings of MobiHoc, pages120–130, 2006.[2] M. Cagalj, S. Capkun, and J.-P. Hubaux. Wormhole-based antijammingtechniques in sensor networks. IEEE Transactions on MobileComputing, 6(1):100–114, 2007.[3] A. Chan, X. Liu, G. Noubir, and B. Thapa. Control channel jamming:Resilience and identification of traitors. In Proceedings of ISIT, 2007.[4] T. Dempsey, G. Sahin, Y. Morton, and C. Hopper. Intelligent sensingand classification in ad hoc networks: a case study. Aerospace andElectronic Systems Magazine, IEEE, 24(8):23–30, August 2009.[5] Y. Desmedt. Broadcast anti-jamming systems. Computer Networks,35(2-3):223–236, February 2001.[6] K. Gaj and P. Chodowiec. FPGA and ASIC implementations of AES.Cryptographic Engineering, pages 235–294, 2009.

Page 30: Packet hiding methods for preventing selective jamming attacks

[7] O. Goldreich. Foundations of cryptography: Basic applications. CambridgeUniversity Press, 2004.[8] B. Greenstein, D. Mccoy, J. Pang, T. Kohno, S. Seshan, and D. Wetherall.Improving wireless privacy with an identifier-free link layerprotocol. In Proceedings of MobiSys, 2008.IEEE. IEEE 802.11 standard. http://standards.ieee.org/getieee802/download/802.11-2007.pdf, 2007. [10] A. Juels and J. Brainard. Client puzzles: A cryptographic countermeasureagainst connection depletion attacks. In Proceedings of NDSS,pages 151–165, 1999.[11] Y. W. Law, M. Palaniswami, L. V. Hoesel, J. Doumen, P. Hartel, andP. Havinga. Energy-efficient link-layer jamming attacks against WSNMAC protocols. ACMTransactions on Sensors Networks, 5(1):1–38, 2009.[12] L. Lazos, S. Liu, and M. Krunz. Mitigating control-channel jammingattacks in multi-channel ad hoc networks. In Proceedings of the 2ndACM conference on wireless network security, pages 169–180, 2009.

Page 31: Packet hiding methods for preventing selective jamming attacks

THANK YOU