268 research outputs found

    A SECURE PACKET HIDING TECHNIQUE FOR PREVENTING JAMMING ATTACKS

    Get PDF
    Wireless Sensor Networks are exposed to serious security threat called jamming. This type of attacks with wireless transmission can be used as a catalyst for rising Denial-of-service attacks. This paper considers the problem of jamming under an internal threat model, where the attacker who is aware of all the network secrets and the details of implementation which results in the difficulty of detection. Jamming is broken down in to layers and this paper focuses on jamming at the Transport/Network layer. To overcome these attacks, we develop three schemes that prevent the attacker from attacking the packets. Then we evaluate the security of our schemes

    Defeating Jamming Attack in Wireless Ad-Hoc Networks using Puzzle Based Hashing Technique

    Get PDF
    The growth of wireless technologies, jamming in wireless sensor network is a major problem in network communication. Jamming attacks is a denial of service (DoS) attack in network to block legitimate communication. Wireless networks drop multiple security threats. Transceiver can intrude on wireless transmissions under cryptographic methods. In jamming, the message is transmitted as continuous transmission of high signals. These strategies have many disadvantages. We have to increase the energy of jam frequency and easy to detect attacks. Normal anti-jamming techniques depend on spread-spectrum communications. This technique is used to secure only wireless transmission. To deeply understand this above problem, we need to analyze in detailed manner. Finally we discuss open issues in this network, such as energy efficient saving scheme, packet classification and packet dropping

    A New Approach for Jamming Attacks using -Packet-Hiding Methods

    Get PDF
    The open nature of the wireless medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming. This intentional interference with wireless transmissions can be used as a launch pad for mounting Denial - of - Service attacks on wireless networks. Typically, jamming has been addressed under an external threat model. In this work, we address the problem of selective jamming attacks in wireless networks. In these attacks, the adversary is active only for a short period of time, selectively targeting messages of high importance. We illustrate the advantages of selective jamming in terms of network performance degradation and adversary effort by presenting two case studies; a selective attack o n TCP and one on routing. We show tha t selective jamming attacks can be launched by performing real - time packet classification at the physical layer. To mitigate these attacks, we develop three schemes that prevent real - time packet classification by combining cryptographic primitives with physical - layer attributes. O ur methods and evaluate their computational and communication overhea

    Selective Jamming of LoRaWAN using Commodity Hardware

    Full text link
    Long range, low power networks are rapidly gaining acceptance in the Internet of Things (IoT) due to their ability to economically support long-range sensing and control applications while providing multi-year battery life. LoRa is a key example of this new class of network and is being deployed at large scale in several countries worldwide. As these networks move out of the lab and into the real world, they expose a large cyber-physical attack surface. Securing these networks is therefore both critical and urgent. This paper highlights security issues in LoRa and LoRaWAN that arise due to the choice of a robust but slow modulation type in the protocol. We exploit these issues to develop a suite of practical attacks based around selective jamming. These attacks are conducted and evaluated using commodity hardware. The paper concludes by suggesting a range of countermeasures that can be used to mitigate the attacks.Comment: Mobiquitous 2017, November 7-10, 2017, Melbourne, VIC, Australi

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio

    Jamming Demonstration by Denial-Of- Mobile Service (DOS) using Extrinsic Noise for Audience Improvement in University’s Environment

    Get PDF
    This paper reports the result of a research carried out in Osun State University, Osogbo, Nigeria to improve audience in lecture rooms and other environments using a locally constructed mobile phone jammer. The jammer suspended communication activities by denial-of- mobile service (DOMS) using extrinsic noise for audience improvement in university’s environment. It (the jammer)was constructed employing extrinsic (man-made) noise. This jammer transmits an interference signal on the downlink of the popular GSM 900 MHz and DCS 1800 MHz frequency bands. It comprises of an intermediate frequency (IF) circuit, a radio frequency transmitter (RFT), an antenna and a power source. The IF circuit generates a ramp signal using a 555timer, this ramp signal is mixed with two noise sources, the extrinsic noise sensed by a high sensitivity microphone and a zener diode noise source; the resulting IF signal is fed to the RFT. At the RFT, the ramp signal tunes the voltage controlled crystal oscillator to desired frequency range. This produces an interference radio frequency (RF) signal on the same frequency as the downlink of the GSM and DCS cellular system. The resulting interference RF signal is amplified to cover a radius of 10 meters which implies an area of 628m2. Finally, a test was carried out to investigate the effect of the mobile phone jammer in eliminating phone activity at various locations on campus. This took place over a period of one semester (4 months). Expectedly, out of 343 cases whereby mobile phone activity was prevalent in form of circuit and packet switching (phone calls, text messages, and data connection) without the use of a jammer, this figure diminished greatly to 8 cases upon the activation of the jammer; at same locations and periods. It is therefore obvious that the commandeering of the mobile communication system in educational institutions can be efficiently achieved by the use of a mobile phone jammer. DOI: 10.17762/ijritcc2321-8169.15051

    A Study on Intrusion Detection System in Wireless Sensor Networks

    Get PDF
    The technology of Wireless Sensor Networks (WSNs) has become most significant in present day. WSNs are extensively used in applications like military, industry, health, smart homes and smart cities. All the applications of WSN require secure communication between the sensor nodes and the base station. Adversary compromises at the sensor nodes to introduce different attacks into WSN. Hence, suitable Intrusion Detection System (IDS) is essential in WSN to defend against the security attack. IDS approaches for WSN are classified based on the mechanism used to detect the attacks. In this paper, we present the taxonomy of security attacks, different IDS mechanisms for detecting attacks and performance metrics used to assess the IDS algorithm for WSNs. Future research directions on IDS in WSN are also discussed

    A Comprehensive Survey on Routing and Security in Mobile Wireless Sensor Networks

    Get PDF
    With the continuous advances in mobile wirelesssensor networks (MWSNs), the research community hasresponded to the challenges and constraints in the design of thesenetworks by proposing efficient routing protocols that focus onparticular performance metrics such as residual energy utilization,mobility, topology, scalability, localization, data collection routing,Quality of Service (QoS), etc. In addition, the introduction ofmobility in WSN has brought new challenges for the routing,stability, security, and reliability of WSNs. Therefore, in thisarticle, we present a comprehensive and meticulous investigationin the routing protocols and security challenges in the theory ofMWSNs which was developed in recent years
    corecore