Preventing data from jammed attack (inside jammer)
ABSTARCT :
Wireless Networks are susceptible for a variety of malicious attacks because they use shared transmission medium. The transmission of information may be jammed by an attacker by introducing malicious packets into the network. These jammers create a lot of noise in the total network and create problems at both the ends of transmission and affect the performance of the wireless networks. Hence in every wireless network employ certain techniques to detect or to avoid or to prevent jamming attacks. Jammers deny services to the authorized users by jamming legitimate traffic by illegitimate traffic. An attacker sends unauthorized packets to the nodes in the network and increase the traffic to jam the network. The jammers purposefully interfere with the physical transmission and reception of the wireless communication. The jamming attacks do not comply with the MAC protocols. The impact of an unintentional disruption can be minimized by identifying the presence of the jamming attacks and by implementing an appropriate prevention methods. Jammers can be identified in the MAC layer. To prevent these attacks, some schemes such as Triple DES, multilevel steganography. This paper also investigates the solutions to reduce the effectiveness of jammer as well as to decrease the jamming rate.
EXISTING SYSTEM :
? We conduct a comprehensive, in-depth review on existing jamming attacks in various wireless networks, including WLANs, cellular networks, CRNs, Bluetooth and ZigBee networks, LoRaWANs, VANETs, UAVs, RFID systems, and GPS systems.
? The vulnerability of existing wireless networks can be attributed to the lack of effective anti-jamming mechanisms in practice.
? The jamming vulnerability of existing wireless networks also underscores the critical need and fundamental challenges in designing practical anti-jamming schemes.
? With the primer knowledge provided above, we now dive into the review of existing jamming attacks in WLANs.
DISADVANTAGE :
? These jammers create a lot of noise in the total network and create problems at both the ends of transmission and affect the performance of the wireless networks.
? The work in studies the problem of a legitimate node and a jammer transmitting to a common receiver in an on-off mode in a game-theoretic framework.
? The impact of an unintentional disruption can be minimized by identifying the presence of the jamming attacks and by implementing an appropriate prevention methods.
? With regard to the machinery and impact of jamming attacks, they usually aim at the physical layer and are realized by means of a high transmission power signal that corrupts a communication link or an area.
PROPOSED SYSTEM :
• While there are many jamming attacks that were originally proposed for Wi-Fi networks, they can also be applied to other types of wireless systems.
• Their proposed scheme is capable of replying ACK packets to the legitimate transmitter to hijack its retransmission protocol, thereby resulting in a complete Wi-Fi packet loss whenever packet error occurs.
• Frequency-sweeping jamming attacks were proposed to get around of this constraint, such that a jammer can quickly switch (e.g., in the range of 10 µs) to different channels.
• Then, the preamble attacks proposed for thwarting timing synchronization can also be used to destroy the frequency offset correction functionalities.
ADVANTAGE :
? If the attacker abuses a protocol with the goal to obtain performance benefits itself, the attack is referred to as misbehavior.
? Jamming can be considered as one of fundamental way of degrading network performance.
? Our findings show that a selective jammer can significantly impact performance with very low effort.
? To detect jamming attacks some statistics are used such as signal strength, carrier sensing time, packet delivery ratio.
? Jammer can achieve this goal by either blocking real traffic or, by preventing reception of messages. There are different jamming models which can be used by jammer to address jamming attacks.
|