Mitigation of Control Channel Jamming under Node Capture Attacks
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
computer science topics
Active In SP
**

Posts: 610
Joined: Jun 2010
#1
01-07-2010, 04:45 PM


Mitigation of Control Channel Jamming under Node Capture Attacks



Abstract:

Availability of service in many wireless networks depends on the ability for network users to establish and maintain communication channels using control messages from base stations and other users. An adversary with knowledge of the underlying communication protocol can mount an efficient denial of service attack by jamming the communication channels used to exchange control messages. The use of spread spectrum techniques can deter an external adversary from such control channel jamming attacks.
However, malicious colluding insiders or an adversary who captures or compromises system users is not deterred by spread spectrum, as they know the required spreading sequences.



Algorithm / Technique used:

GUIDE Algorithm.







Algorithm Description:

A greedy algorithm is any algorithm that follows the problem solving metaheuristic of making the locally optimal choice at each stage with the hope of finding the global optimum. For example, applying the greedy strategy to the traveling salesman problem yields the following algorithm.


Existing System:

The use of distinct, dedicated communication channels to transmit data and control traffic introduces a single point of failure for a denial of service attack, in that an adversary may be able to jam control channel traffic and prevent relevant data traffic. Hence, it is of interest to design control channel access schemes which are resilient to jamming. We map the problem of providing resilient control channel access under jamming to that of secure communication channel establishment. We propose the use of random key distribution to hide the location of control channels in time and/or frequency. We evaluate performance metrics of resilience to control channel jamming, identification of compromised users, and delay due to jamming as a function of the number of compromised users.

Proposed System:

We propose a framework for control channel access schemes using the random assignment of cryptographic keys to hide the location of control channels. We propose and evaluate metrics to quantify the probabilistic availability of service under control channel jamming by malicious or compromised users and show that the availability of service degrades gracefully as the number of colluding insiders or compromised users increases. We propose an algorithm called GUIDE for the identification of compromised users in the system based on the set of control channels that are jammed. We evaluate the estimation error using the GUIDE algorithm in terms of the false alarm and miss rates in the identification problem. We discuss various design trade-offs between robustness to control channel jamming and resource expenditure.







Modules:

1. Network module
2. Channel Access module
3. Control Message Access module
4. Control Channel Jamming module
5. Node Capture Attack Module

Module Description:

1. Network module

Client-server computing or networking is a distributed application architecture that partitions tasks or workloads between service providers (servers) and service requesters, called clients. Often clients and servers operate over a computer network on separate hardware. A server machine is a high-performance host that is running one or more server programs which share its resources with clients. A client also shares any of its resources; Clients therefore initiate communication sessions with servers which await (listen to) incoming requests.




2. Channel Access module

Designing control channel access schemes which allow for efficient reception of control messages while maintaining a degree of independence between the hopping sequences held by different users. In this work, we focus our attention on designing schemes which are robust to control channel jamming attacks by malicious colluding insiders or compromised users.

3. Control Message Access module

We develop a correspondence between the problems of key establishment and control channel access in wireless networks and develop a framework for control channel access schemes providing probabilistic availability of control messages using random key assignment.

We propose metrics of resilience and delay to quantify the probabilistic availability of service and the quality of provided service, respectively, under control channel jamming attacks.






4. Control Channel Jamming module

Channel access protocol can perform a DoS attack against individual users or local neighborhoods in the mobile network by jamming the communication channels. Moreover, if the access protocol uses a fixed predetermined schedule for data and control messages, allowing the adversary to distinguish between channels for data and control messages, a control channel jamming attack focusing only on the control channels can be mounted with energy savings of several orders of magnitude less than that required to jam all communication channels.




5. Node Capture Attack Module

The bipartite graph G thus provides a one-to-one correspondence between control channel access schemes and symmetric key assignment schemes. Hence, key assignment solutions that provide secure communication which is robust to node capture attacks can be used to design control channel access schemes which are resilient to control channel jamming attacks by compromised users.







Hardware Requirements:

¢ System : Pentium IV 2.4 GHz.
¢ Hard Disk : 40 GB.
¢ Floppy Drive : 1.44 Mb.
¢ Monitor : 15 VGA Colour.
¢ Mouse : Logitech.
¢ Ram : 256 Mb.


Software Requirements:


¢ Operating system : - Windows XP Professional.
¢ Coding Language : - Java.
¢ Tool Used : - Eclipse.
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#2
15-10-2010, 03:25 PM

INTERNAL GUIDE:
MRS.RUPA EZHILARASI

EXTERNAL GUIDE:
MR.RACKKI

Presented by:
ANAND.K


.ppt   ANAND.K 2.ppt (Size: 911 KB / Downloads: 254)


Abstract

In many wireless networks depends on the ability for network users to establish and maintain communication channels using control messages from base stations.
An adversary with knowledge of the underlying communication protocol can mount an efficient denial of service attack by jamming the communication channels used to exchange control messages.
The use of spread spectrum techniques can deter an external adversary from such control channel jamming attacks.
However, malicious colluding insiders or an adversary who captures or compromises system users is not deterred by spread spectrum, as they know the required spreading sequences.
 
Reply
hariharasudhan
Active In SP
**

Posts: 1
Joined: Nov 2010
#3
16-11-2010, 11:53 AM

Respected sir,
i am diploma computer student in srpc college at namakkal.sir please kindly sent my project and implimentation details and there source code to my email id.....
Title:Mitigation of Control Channel Jamming under Node Capture Attacks

Respected sir,
i am diploma computer student in srpc college at namakkal.sir please kindly sent my project and implimentation details and there source code to my email id.....
Title:Mitigation of Control Channel Jamming under Node Capture Attacks
Thanking you!
Reply
seminar surveyer
Active In SP
**

Posts: 3,541
Joined: Sep 2010
#4
18-11-2010, 09:30 AM

pls go through the following thread for more details on 'Mitigation of Control Channel Jamming under Node Capture Attacks'

seminar and presentationproject and implimentationsattachment.php?aid=6190
Reply
mahalakshmigp
Active In SP
**

Posts: 1
Joined: Feb 2011
#5
11-02-2011, 09:53 AM

i need data flow diagram and use case diagram
Reply
lakshmimaha03
Active In SP
**

Posts: 1
Joined: Feb 2011
#6
12-02-2011, 10:45 AM

i need data flow diagrams ,software engineering process model with descripition ,future enhancement for this project and implimentation
Reply
chethan017
Active In SP
**

Posts: 1
Joined: Apr 2011
#7
17-04-2011, 10:45 AM

plz send me d reportttttttt.plzzzzzzzzzzz
plz send me d complete project and implimentation.plzzzzzzzzzzz
Reply
patidargl
Active In SP
**

Posts: 1
Joined: Apr 2011
#8
27-06-2011, 04:30 PM

i am MCA student in amc college at bangalore.sir please kindly sent my project and implimentation details and there source code to my email id-patidargl@gmail.com
Title:Mitigation of Control Channel Jamming under Node Capture Attacks
Thanks
Rolleyes
Reply
PRIYADHANS
Active In SP
**

Posts: 1
Joined: May 2011
#9
03-07-2011, 07:30 PM

sir plz send me more contents to make documentaion.. not the pdf file sir..



Reply
seminar flower
Super Moderator
******

Posts: 10,120
Joined: Apr 2012
#10
25-07-2012, 01:18 PM

Mitigation of Control Channel Jamming under Node Capture Attacks


.pdf   jamming.pdf (Size: 495.46 KB / Downloads: 13)
Abstract—

Availability of service in many wireless networks depends on the ability for network users to establish and maintain
communication channels using control messages from base stations and other users. An adversary with knowledge of the underlying
communication protocol can mount an efcient denial of service attack by jamming the communication channels used to exchange
control messages. The use of spread spectrum techniques can deter an external adversary from such control channel jamming
attacks. However, malicious colluding insiders or an adversary who captures or compromises system users are not deterred by spread
spectrum, as they know the required spreading sequences. For the case of internal adversaries, we propose a framework for control
channel access schemes using the random assignment of cryptographic keys to hide the location of control channels. We propose and
evaluate metrics to quantify the probabilistic availability of service under control channel jamming by malicious or compromised users
and show that the availability of service degrades gracefully as the number of colluding insiders or compromised users increases. We
propose an algorithm called GUIDE for the identication of compromised users in the system based on the set of control channels that
are jammed.

INTRODUCTION

EFFICIENT communication in mobile networks requires
the use of multiple access protocols allowing
mobile users to share the wireless medium by separating
user data in any combination of time, frequency,
signal space, and physical space. The entire class of
multiple access can thus be described by the unifying
framework of orthogonal frequency division multiple
access (OFDMA) [2]. Allocation of access and resources
to mobile users must be periodically updated in order
to maintain the efciency of the multiple access protocol
when base station group membership, user demands,
and wireless channel conditions are dynamic. Hence,
there is a necessary overhead involved in the multiple
access protocol to handle the resource allocation to users.

MODEL ASSUMPTIONS

In this section, we state the assumed models for the
multiple access protocol and control message structure,
adversary, and service provider or trusted authority. We
provide a summary of the notation used throughout this
work in Table 1.

Control Message Access Model

We describe the multiple access protocol in terms of the
OFDMA framework [2] with separation of signals over
orthogonal carrier signals and in time as follows. We
let = f 0; : : : ; M
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  Implementation of UPQC for Voltage Sag Mitigation seminar class 5 2,228 23-02-2015, 02:55 PM
Last Post: madival
Thumbs Up Inventory Control System uttuswami 2 742 20-10-2014, 07:46 PM
Last Post: CxWfRyIPv
  DEFENDING AGAINST SYBIL ATTACKS USING SYBILLIMIT PROTOCOL smart paper boy 3 1,702 01-03-2014, 01:01 PM
Last Post: sujivijay
  Risk-Aware Response for Mitigating MANET Routing Attacks seminar projects maker 0 363 26-09-2013, 02:11 PM
Last Post: seminar projects maker
  Fuzzy MLS: An Experiment on Quantified Risk– Adaptive Access Control seminar projects maker 0 350 26-09-2013, 02:10 PM
Last Post: seminar projects maker
  RATIONSHOP INVENTORY CONTROL SYSTEM full report smart paper boy 17 6,907 20-09-2013, 09:47 AM
Last Post: seminar projects maker
  Kalman Filter-Based Distributed Predictive Control of Large-Scale Multi-Rate pdf study tips 0 376 09-09-2013, 03:32 PM
Last Post: study tips
  TRACEBACK OF DDOS ATTACKS USING ENTROPHY VARIATIONS seminar ideas 3 764 09-09-2013, 09:27 AM
Last Post: study tips
  Sensor Network Based Oilwell Health Monitoring and Intelligent Control pdf study tips 0 424 01-08-2013, 12:47 PM
Last Post: study tips
  A Defense Technique for Jamming Attacks in Wireless Sensor Networks Based On SI pdf study tips 0 387 10-06-2013, 03:41 PM
Last Post: study tips