Sie sind auf Seite 1von 5

OPTIMAL JAMMING ATTACKS AND NETWORK DEFENSE POLICIES IN WIRELESS SENSOR NETWORKS

ABSTRACT: We consider a scenario where a sophisticated jammer jams an area in a single-channel wireless sensor network. The jammer controls the probability of jamming and transmission range to cause maximal damage to the network in terms of corrupted communication links. The jammer action ceases when it is detected by a monitoring node in the network, and a notification message is transferred out of the jamming region. The jammer is detected at a monitor node by employing an optimal detection test based on the percentage of incurred collisions. On the other hand, the network computes channel access probability in an effort to minimize the jamming detection plus notification time. In order for the jammer to optimize its benefit, it needs to know the network channel access probability and number of neighbors of the monitor node. Accordingly, the network needs to know the jamming probability of the jammer. We study the idealized case of perfect knowledge by both the jammer and the network about the strategy of one another, and the case where the jammer or the networks lack this knowledge. The latter is captured by formulating and solving optimization problems, the solutions of which constitute best responses of the attacker or the network to the worst-case strategy of each other. We also take into account potential energy constraints of the jammer and the network. We extend the problem to the case of multiple observers and adaptable jamming transmission range and propose a intuitive heuristic jamming strategy for that case.

EXISTING SYSTEM: The use of distinct, dedicated communication channels to transmit data and control traffic introduces a single point of failure for a denial of service attack, in that an adversary may be able to jam control channel traffic and prevent relevant data traffic. Hence, it is of interest to design control channel access schemes which are resilient to jamming. We map the problem of providing resilient control channel access under jamming to that of secure communication channel establishment. We propose the use of random key distribution to hide the location of control channels in time and/or frequency. We evaluate performance metrics of resilience to control channel jamming, identification of compromised users, and delay due to jamming as a function of the number of compromised users.

PROPOSED SYSTEM: We proposed one attacker in the area, which is not authenticated and associated with the network. The objective of the jammer is to corrupt transmissions of legitimate nodes by causing packet collisions at receivers. Intentional collision leads to retransmission and thus additional energy consumption for a certain amount of throughput, or equivalently reduced throughput for a given amount of consumed energy.

We now fix attention to detection at one monitor node. First, we define the quantity to be observed at each monitor node. In our case, the readily available metric is probability of collision that a monitor node experiences, namely the percentage of packets that are erroneously received. Assume now the network operates in the open after the training period and fix attention to a time window much smaller than the training period. An increased percentage of collisions over this time window compared to the learned long-term average may be an indication of an ongoing jamming attack or only a temporary increase of percentage of collisions compared to the average during normal network operation.

We studied controllable jamming attacks in wireless sensor networks, which are easy to launch and difficult to detect and confront. The derived solutions to the optimization problems dictate optimal attack and network defense strategies. Of particular interest is the comparison

between the case of perfect knowledge and that of lack of knowledge of the attacker and the network about the strategy of each other. In the latter, the attacker and the network respond optimally to the worst-case strategy of the other.

HARDWARE & SOFTWARE REQUIREMENTS:

HARDWARE REQUIREMENTS:

System Hard Disk Floppy Drive Monitor Mouse Ram

: : : : : :

Pentium IV 2.4 GHz. 40 GB. 1.44 Mb. 15 VGA Colour. Logitech. 256 Mb.

SOFTWARE REQUIREMENTS:

Operating system Coding Language Tool Used

: : :

Windows XP Professional. Java. Eclipse.

Das könnte Ihnen auch gefallen