Beruflich Dokumente
Kultur Dokumente
NOVEMBER 2012
DEPARTMENT OF
COMPUTER SCIENCE AND ENGINEERING
KARUR-639 113
M.KUMARASAMY COLLEGE OF ENGINEERING
i
G. SATHISH KUMAR
( 11MCS1027 )
Dissertation submitted in partial fulfilment for the award of the degree
of
MASTER OF ENGINEERING
in
COMPUTER SCIENCE AND ENGINEERING
NOVEMBER 2012
Supervisor
Mrs.V.Durgadevi M.Tech.
Assistant professor/CSE
Certified that the candidate was examined in the viva-voce examination held on 05.11.2012
(Internal Examiner)
(External Examiner)
ii
DECLARATION
G. SATHISH KUMAR
( 11MCS1027 )
Mrs.V.Durgadevi M.Tech.
Assistant Professor,
Department of CSE,
M.Kumarasamy College of Engineering,
Karur 639 113.
ACKNOWLEDGEMENT
iii
My first an foremost, praises and thanks to the GOD the Almighty, for the
blessings. He had bestowed upon me to complete my project phase-I successfully.
I would like to express my profuse gratitude to Thiru.M.KUMARASAMY,
CHAIRMAN and Dr.K.RAMAKRISHNAN B.E., SECRETARY of our college
for providing extra ordinary infrastructure, which helped me in the completion of
the project phase I in time.
I would like to express my sincere thanks to Dr.D.VALAVAN M.Tech.,
Ph.D., PRINCIPAL, for providing facilities to successfully carry the project phase
I.
I sincerely thank Dr.P.SUDHAKAR M.Tech., Ph.D., HEAD OF THE
DEPARTMENT for his valuable guidance and constant encouragement, valuable
suggestions and support rendered in making my project a success.
I thank my guide Mrs.V.DURGADEVI M.Tech., Assistant professor,
Department of CSE for her constant encouragement, kind co-operation, valuable
suggestion and support rendered in making my project phase-I a success.
I thank all the FACULTY MEMBERS of the department of Computer
Science and Engineering who gave me many suggestions from time-time that made
my project work better and well furnished.
I take this beautiful opportunity to thank my PARENTS and FRIENDS for
giving me so much confidence and strength to work on my project.
ABSTRACT
iv
Wireless networks are susceptible to numerous security threats due to the open nature of
the wireless medium. Anyone with a transceiver can eavesdrop on ongoing transmissions, inject
spurious messages, or block the transmission of legitimate ones. The open nature of the wireless
medium leaves it vulnerable to intentional interference attacks, typically referred to as jamming.
Jamming can interrupt wireless transmission and occur by mistake in form of interference, noise
or as collision at the receiver or in the circumstance of an attack. This intentional interference
with wireless transmissions can be used as a launch pad for mounting Denial-of-Service attacks
on wireless networks. Typically, jamming has been addressed under an external threat model.
However, adversaries with internal knowledge of protocol specifications and network secrets can
launch low-effort jamming attacks that are difficult to detect and counter. In selective jamming
attacks, an active jammer turns on and off the jamming signals periodically or randomly, so the
energy consumption will be less and the identification of such a node will be harder. In the
selective jamming attacks, the adversary is active only for a short period of time, selectively
targeting messages of high importance. Those selective jamming attacks can be launched by
performing real-time packet classification at the physical layer. In this paper, multiple-path
source routing protocols is proposed to allow a data source node to distribute the total traffic
among available paths. Jamming-aware source routing is proposed, in which the source node
performs traffic allocation based on empirical jamming statistics at individual nodes and flow
optimization problem using portfolio selection theory. Here, in multi-source networks, the
centralized optimization problem can be solved using a distributed algorithm based on
decomposition in Network Utility Maximization (NUM). To mitigate the selective jamming
attack, three methods were proposed to prevent real-time packet classification by combining
cryptographic primitive measures with physical layer attributes.
CONTENTS
CHAPTER
TITLE
NO
PAGE
NO
INTRODUCTION
LITERATURE SURVEY
EXISTING SYSTEM
PROBLEM DESCRIPTION
10
EXECUTION OF PHASE-II
12
REFERENCES
14
LIST OF FIGURES
FIGURE
TITLE
NO
vi
PAGE NO
LIST OF ABBREVATIONS
AODV
CSS
DoS
Denial-of-Service
DSSS
FER
FHSS
MAC
NUM
PN
Pseudo-Noise
RD-DSSS
RF
Radio Frequency
RREQ
Route Request
SS
Spread-Spectrum
viii