Preventing jamming attack by combining cryptography
preventing jamming attack by combining three cryptographic primitives SHCS, CPHS and AONT-HS.
Published on: Mar 4, 2016
Transcripts - Preventing jamming attack by combining cryptography
Anusha H N
Avinasha H N
Syed Musthak K S
Under the guidance of
Mrs. Shylaja L.N., B.E., M.Tech.
Department of Information Science and Engineering
To prevent the selective jamming attack by
combining three cryptographic primitives such as
strong hiding commitment scheme, cryptographic
puzzle hiding scheme and all-or-nothing
Project show that selective jamming attacks can be
launched by performing real time packet
classification at the physical layer.
To mitigate these attacks, proposed project develop
three schemes that prevent real-time packet
classification by combining cryptographic primitives
with physical-layer attributes.
Strong Hiding Commitment Scheme (SHCS),
Cryptographic Puzzle Hiding Scheme(CPHS) and
All-Or-Nothing Transformation (AONT) scheme.
This project analyze the security of methods and
evaluate their computational and communication
To prevent the selective jamming attack.
To avoid packet dropouts due to collisions between
To show that a selective jammer can significantly
impact performance with very low effort on network
protocol such as TCP and routing.
To secure the packet transmission in wireless
“Coping with a Smart Jammer in Wireless
Networks: A Stackelberg Game Approach”
Technique used: Power Control Smart Jammer game.
Drawback: Jammer improves its utility in
“Denial of Service Attacks in Wireless Network: The
Case of Jammer”.
Technique used: Intrusion Detection Scheme(IDS)
used to detect the attack.
Intrusion Prevention System(IPS) used to prevent
“Detection of Jamming Attacks in Wireless Ad Hoc
Networks using Error Distribution”.
Technique used: detection by correlation to detect
Drawback: to detect the jamming attack dependency
measure is needed from all nodes.
There is no technique to prevent selective jamming
“Effects of Denial-of-Sleep attacks on Wireless Sensor
Network mac protocols”.
-David R. Raymond
Technique used: jamming identification & mitigation,
Drawback: Transmitted message from a node can easily
read by attacker because message is not encrypted.
Attacker can access any node using received message as a
authorized and make busy state such attacks are selective
How does it happen?
Realization of selective
Fig.1: Jamming Attack
1. Strong Hiding Commitment Scheme (SHCS)
2. Cryptographic Puzzle Hiding Scheme (CPHS)
Proposing a strong hiding commitment scheme
(SHCS), which is based on symmetric cryptography.
The main motivation is to satisfy the strong hiding
property while keeping the computation and
communication overhead to a minimum.
Presenting a packet hiding scheme based on
cryptographic puzzles. The main idea behind such
puzzles is to force the recipient of a puzzle execute a
pre-defined set of computations before he is able to
extract a secret of interest.
Here proposed project send a sequence of pseudo
messages corresponding to original messages. The
jammer cannot perform packet classification until all
pseudo messages corresponding to the original
packet have been received and the inverse
transformation has been applied.
The Selective Jamming attack will be avoided and the
packets will be transmitted safely to the proper
1. M. Strasser, C. Po ¨pper, and S. Capkun, “Efficient
Uncoordinated fhss Anti-Jamming Communication,”
Proc. ACM Int’l Symp. Mobile Ad Hoc Networking and
Computing (MobiHoc), pp. 207-218, 2009.
2. P. Tague, M. Li, and R. Poovendran, “Mitigation of
Control Channel Jamming under Node Capture
Attacks,” IEEE Trans. Mobile Computing, vol. 8, no. 9,
pp. 1221-1234, Sept. 2009.
3. B. Thapa, G. Noubir, R. Rajaramanand, and B. Sheng,
“On the Robustness of IEEE802.11 Rate Adaptation
Algorithms against Smart Jamming,” Proc. ACM Conf.
Wireless Network Security (WiSec), 2011.
Gantt Chart - Schedule for carrying different
actvities during project work