19
OPTIMAL JAMMING ATTACK STRATEGIES IN WIRELESS SENSOR NETWORKS PRESENTED BY, ARCHANA.B,NITHIYA.K III CSE KINGS COLLEGE OF ENGINEERING

Wireless sensor networks

Embed Size (px)

Citation preview

OPTIMAL JAMMING ATTACK STRATEGIES IN WIRELESS

SENSOR NETWORKS PRESENTED BY,

ARCHANA.B,NITHIYA.KIII CSE

KINGS COLLEGE OF ENGINEERING

OBJECTIVES

The objective of this paper is to detect the jammer and avoid the collisions in wireless sensor networks.

CONTENT: Jamming attack in wireless sensor

networkOptimal jamming attacksDefense policyModeling AssumptionsAttack detection model

INTRODUCTION

In this paper the fundamental characteristic of wireless networks that Renders them more vulnerable to attacks than their wire line Counterparts Is the open, shared nature of their medium this exposes .

If the attacker abuses a protocol with the primary goal to obtain performance benefits itself, the attack is referred to as misbehavior.

EXSISTING SYSTEM:

The sensor node, looses its energy continuously so it is failed because of attacker attacks.

It take more time to transfer the information because of the retransmission process again and again.

PROPOSED SYSTEM

Using the monitoring node the attacker is detected.

The attacker is release power signals at that time the sensor node is act as sleeping node so does not loses the consumed energy.

WSN & WSN ATTACKS:

WSN(Wireless Sensor Networks)WSN(Wireless Sensor Networks)Types of attack in WSNTypes of attack in WSN Passive Attack Active AttackPASSIVE ATTACK : Passively absorping ongoing

communication

ACTIVE ATTACK : Attacker is involved in transmission

DOS ATTACKS

Depending on whether one looks at the cause of the consequence of it miss behavior in Wireless Networks stems.

The utility is expressed in terms of consumed energy or achievable throughput on per link or end_to_end basis.

JAMMER

Jammer is neither authenticated nor associated with the network.

The attacker attempt to strike a balance short and long term benefits.

sensor node

monitoring node

jammer/attacker

OPTIMAL ATTACK

We derive the optimal attack and optimal defense strategies as solution to optimization problems that are faced by the attacker.

For attack detection we provide a methodology.

We include in the formulation the attack detection.

ATTACK DETECTION MODEL

The monitoring mechanism consists of ,Determination of a subset of

nodes(M).

1.Employment of a detection

algorithm.

2.A detection algorithm is part of the

detection module.

TYPES OF LINK LAYER JAMMER

Deceptive, Random, Reactive jammer.

REACTIVE JAMMER

The reactive jammer is the most sophisticated one as it launches its attack after sensing ongoing transmission.

Channel surfing involves on-demand frequency hopping as a countermeasure.

DETECTION ALGORITHM

A detection algorithm is part of the detection module at a monitor node; it takes as input observation samples obtained by the monitor node (i.e., collision/not collision)

decides whether there is an attack or not. On one hand.

OBSERVATION WINDOW

The observation window should be small enough, such that the attack is detected in a timely manner and appropriate countermeasures are initiated.

On the other hand, this window should be sufficiently large, such that the chance of a false alarm notification is reduced.

CONCLUSION

We studied controllable jamming attacks in wireless sensor networks, which are easy to launch and difficult to detect and confront.

Our work is a first step towards understanding the structure of these problems.

Interesting issues arise in multi-channel networks.

THANK YOU

QURIES?QURIES?