International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017
p-ISSN: 2395-0072
www.irjet.net
A Survey Paper on Jamming Attacks and its Countermeasures in Wireless Networks Chaithra H S1, Rashmi B2, Johnpaul C I3 1B.E.
in Information Science and Engineering, NIE, Mysuru, Karnataka, India
2B.E. 3Assistant
in Information Science and ENGINNERING, NIE, Mysuru, Karnataka, India Professor, Department of Science and Engineering, NIE, Mysuru, Karnataka, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - In a wireless networks communication between
the overwhelming frequencies of illegitimate traffic [2]. Two forms of jamming exist, they are
events uses logical communication channels i.e. the timing channel in which the information is encoded in timing. The use of timing channel has been proposed to defeat reactive jamming attacks; timing information cannot be jammed even though the attacker can destroy the contents of the packets. Since the target node and the jammer have conflicting interests, Game Theory is used to model the interactions between them. In this paper we analyze the interactions between the jammer and the target node using Game Theoretic Model. In game theory, the Nash equilibrium is a solution control of a non-cooperative game. In a network all communication nodes will set their own strategies and the reactions of the jammer will be according to the nodes strategies. This is been analyzed and modeled as a Stackelberg Game. The numerical results obtained are presented, which shows the system performance which is based on network parameters like bandwidth, delay etc.
Wireless transmission can be disrupted by jamming either in the form of interference noise or collision at the receiving node. It lowers the signal–to- noise ratio by injecting high level of noise to the transmitted signals. An ideal jamming attack should have less chance of being detected, energy efficient, resistant to anti jamming techniques and also it should disrupt the communication to maximum possible extent.
2. ANALYSIS OF JAMMING ATTACKS
Key Words: Game Theoretic Model, Stackelberg Game, Nash Equilibrium.
Communication security is associated with two features, reliability of the system. Secret message transmission to a valid receiver under certain conditions is called as message secrecy. If the intended message is reliably received by that receiver node is known as system reliability. Jammer is the threat to system reliability. Categories of Jamming attacks are:
1. INTRODUCTION In wireless networks transferring of any kind of information between one or more nodes takes place that are not physically connected. Because of its shared medium and broadcast nature, wireless networks are prone to various kinds of attacks. This leads to numerous security issues which need to be dealt. The communication in the network can be disturbed by many attacks strategies. Denial of service attack is one of the effective attacks on wireless network. Jamming attack comes under DOS attack [1]. Fundamental way of degrading network performance is by using jamming. Jamming is one of many exploits used to compromise the wireless environment. Its works by denying service to authorize users as legitimate traffic is jammed by
© 2017, IRJET
|
Impact Factor value: 5.181
External threat model: Jammer is not part of the network. Internal threat model: Jammer is the part of network.
2.1. Active and Passive attacks Passive attackers do not transmit any message; it just monitors the channel and tries to steal the packet containing IP addresses and other node related information. It does not cause any direct damage to the communication network it just steals the information which can be misused which causes a threat to network confidentiality. Active attackers make the network to malfunction which affects the normal operation of the specific node. Active attacker performs dropping of packets, deleting packets to wrong destination
|
ISO 9001:2008 Certified Journal
|
Page 955