ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research
|
|
|
- Rosemary Owen
- 10 years ago
- Views:
Transcription
1 A Real-time Packet Classification System Based On Combining Cryptographic Primitives with Physical-Layer Attributes To Address Jamming Attacks in Wireless Networks G.Deepthi H.Akshay G. Rajesh T. Swetha Associate professor, A.Suresh Rao Professor &HoD, Abstract: Since RF (radio frequency) is essentially an open medium, jamming can be a huge problem for wireless networks. Jamming is one of many exploits used compromise the wireless environment. It works by denying service to authorized users as legitimate traffic is jammed by the overwhelming frequencies of illegitimate traffic.the issue of jamming mostly relates to older wireless local area networks as they are not fully equipped to make the adaptation to numerous types of interference. These networks typically call for an administrator to manually adjust each access point through trial and error. To avoid this daunting task, the best practice is to invest into a newer WLAN system. These environments offer real-time RF management features capable of identifying and adapting to unintentional interference.wireless Networks are becoming an increasingly important technology that is bringing the world closer together. In this type of network environment there could be more chances of attacks. The packets cannot be easily transferred over the network. It affects network performance degrade.while eavesdropping and message injection can be prevented using cryptographic methods, jamming attacks are much harder to counter. They have been shown to actualize severe Denial-of-Service (DoS) attacks against networks. In Simplest form adversary blocks the packets that are transmitted over wireless network. Typically, jamming attacks has been considered under an external threat model, in which the jammer is not part of the network. To overcome the above problem of network traffic and performance in this paper we have considered a packet hiding methods that can be securely transmit packets over the network. We are addressing the problem of jamming attacks under internal threat model and two schemes are proposed that prevent real-time packet classification of packets by combining hiding scheme based on cryptographic primitives. Keywords: Jamming signals, Strong hiding commitment scheme, cryptographic puzzle hiding scheme, Wireless networks, denial-of-service. Introduction: Jamming is usually distinguished from interference that can occur due to device malfunctions or other accidental circumstances. Devices that simply cause interference are regulated under different regulations. Unintentional jamming occurs when an operator transmits on a busy frequency without first checking whether it is in use, or without being able to hear stations using the frequency. Another form of unintentional jamming occurs when equipment accidentally radiates a signal, such as a cable television plant that accidentally emits on an aircraft emergency frequency. Originally the terms were used interchangeably but nowadays most radio users use the term jamming to describe the deliberate use of radio noise or signals in an attempt to disrupt communications (or prevent listening to broadcasts) whereas the term interference is used Page 33
2 to describe unintentional forms of disruption (which are far more common). However the distinction is still not universally applied. For inadvertent disruptions, see electromagnetic compatibility.intentional communications jamming is usually aimed at radio signals to disrupt control of a battle. A transmitter, tuned to the same frequency as the opponents receiving equipment and with the same type of modulation, can, with enough power, override any signal at the receiver. Digital wireless jamming for signals such as Bluetooth and WiFi is possible with very low power. The most common types of this form of signal jamming are random noise, random pulse, stepped tones, warbler, random keyed modulated CW, tone, rotary, pulse, spark, recorded sounds, gulls, and sweep-through. These can be divided into two groups obvious and subtle.obvious jamming is easy to detect because it can be heard on the receiving equipment. It usually is some type of noise such as stepped tones (bagpipes), random-keyed code, pulses, music (often distorted), erratically warbling tones, highly distorted speech, random noise (hiss) and recorded sounds. Various combinations of these methods may be used often accompanied by regular morse identification signal to enable individual transmitters to be identified in order to assess their effectiveness. For example, China, which used jamming extensively and still does, plays a loop of traditional Chinese music while it is jamming channels (c.f. Attempted jamming of number stations). The purpose of this type of jamming is to block reception of transmitted signals and to cause a nuisance to the receiving operator. One early Soviet attempt at jamming western broadcasters used the noise from the diesel generator that was powering the jamming transmitter. Subtle jamming is jamming during which no sound is heard on the receiving equipment. The radio does not receive incoming signals yet everything seems superficially normal to the operator. These are often technical attacks on modern equipment, such as squelch capture. Thanks to the FM capture effect, frequency modulated broadcasts may be jammed, unnoticed, by a simple unmodulated carrier. The receiver locks onto the larger carrier signal and hence will ignore the FM signal with information. Digital signals use complex modulation techniques such as QPSK. These signals are very robust in the presence of interfering signals. However, the signal relies on hand shaking between the transmitter and receiver to identify and determine security settings and method of high level transmission. If the jamming device sends initiation data packets the receiver will begin its state machine to establish two way data transmission. A jammer will loop back to the beginning instead of completing the handshake. This method jams the receiver in an infinite loop where it keeps trying to initiate a connection but never completes it, which effectively blocks all legitimate communication. Bluetooth and other consumer radio protocols such as WiFi have built in detectors so that they only transmit when the channel is free. Simple continuous transmission on a given channel will continuously stop a transmitter transmitting, hence jamming the receiver from ever hearing from its intended transmitter. Other jammers work by analysing the packet headers and depending on the source or destination, selectively transmit over the end of the message, corrupting the packet. Jamming Solutions: If an attacker truly wanted to compromise your LAN and wireless security, the most effective approach would be to send random unauthenticated packets to every wireless station in the network. This exploit can be easily achieved by purchasing hardware off the shelf from an electronics retailer and downloading free software from the internet. In some cases, it is simply impossible to defend against jamming as an experienced attacker may have the ability to flood all available network frequencies. If the major concern relates to malicious jamming, an intrusion prevention and detection system may be your best option. At the bare minimum, this type of system should be able to detect the presence of an RPA (Rogue Access Point) or any authorized client device in your wireless network. More advanced systems can prevent unauthorized clients from accessing the system, alter configurations to maintain network performance in the presence of an attack, blacklist certain threats and pinpoint the physical location of a rogue device to enable faster containment. Page 34
3 Identify the Presence of the Jammer: To minimize the impact of an unintentional disruption, it is important the identify its presence. Jamming makes itself known at the physical layer of the network, more commonly known as the MAC (Media Access Control) layer. The increased noise floor results in a faltered noise-to-signal ratio, which will be indicated at the client. It may also be measurable from the access point where network management features should able to effectively report noise floor levels that exceed a predetermined threshold. From there the access points must be dynamically reconfigured to transmit channel in reaction to the disruption as identified by changes at the physical layer. For example, if the attack occurred on an RF corresponding to channel 1, the access point should switch to channel 6 or 11 in order to avoid the attack. However, selecting a different channel does not always eliminate the issue of interference. An experienced attacker will often use all available channels in the attack. When this happens, your only option may be to physically hunt down the attacker and confront them face to face. Wireless networks are computer networks that are not connected by cables of any kind. Wireless System enables wireless connectivity to the Internet via radio waves rather than wires on a personals home computer, smartphone, laptops or similar mobile device. The use of a wireless network makes enterprises to avoid the costly process of introducing cables into buildings or as a connection between different equipment locations. The bases for wireless systems are radio-waves; it means an implementation that takes place at the physical level of network structure. In the computing world, the term wireless can be used as ambiguous, since it may refer to several different wireless technologies. Wireless Networks are becoming an increasingly important technology that is bringing the world closer together. Wireless Networks are used in every area, such as agriculture, education, pharmaceuticals, manufacturing, military, transportation and research. Therefore, the importance of Wireless Networks security is significant. Security is one of the critical attributes of any communication network. Various attacks were reported over the last many years. Wireless networks are highly sensitive to Denial of Service (DoS) attack. A Denial of Service (DoS) attack can be characterized as an attack with the purpose of preventing legitimate users from using a specified network resource such as a website, web service, or computer system. The wireless communication medium is a broadcast channel, exposing physical layer of wireless communication to jamming. Past research has mostly focused on defending voice communication using spread spectrum techniques. The SS techniques provide bitlevel protection by spreading bits according to a secret pseudo-noise (PN) code, known only to the communicating parties. Such approach spreads the signal into a very large frequency band and makes a jammer with limited energy resources unable to afford jamming the entire band. These methods only protect wireless transmissions under the external threat model. Non-continuous jamming only results in a graceful degradation of the voice quality. Therefore, this approach is effective to protect voice communication against jamming. Existing System: Wireless networks rely on the uninterrupted availability of the wireless medium to interconnect participating nodes. However, the open nature of this medium leaves it vulnerable to multiple security threats. Anyone with a transceiver can eavesdrop on wireless transmissions, inject spurious messages, or jam legitimate ones. While eavesdropping and message injection can be prevented using cryptographic methods, jamming attacks are much harder to counter. They have been shown to actualize severe Denial-of- Service (DoS) attacks against wireless networks. In the simplest form of jamming, the adversary interferes with the reception of messages by transmitting a continuous jamming signal, or severalshort jamming pulses. Typically, jamming attacks have been considered underan external threat model, in which the jammer is not part of the network. To prevent the jamming attack we are propose the following technique. Proposed System: The proposed system is used to prevent selective jamming attack in wireless network. Page 35
4 This can be overcome by using random padding signature algorithm for preventing jamming attacks. Before performing the random padding signature we are generating random number for generation of signature. The procedure of random padding signature algorithm has follows. Radom padding signature Algorithm : Step 1. A large prime number p is produced by system, α is a generator of Zp*, x(1<x < ( p) ) is the signer s private key, the corresponding signature public keyβ can be calculated byβ =α xmod p, and opened to the public key. Step2. Two different random number t and k are randomly selected by system. Where t, k and x must be coprime and there is inverse.γ and λ are calculated by the γ =α kmod p, λ =α tmod p and retainγ and λ. Step3: Signature explicitly m, δ is calculated using the results of the first two steps as well as the extended Euclidean algorithm and modular inversion algorithm bym = (xγ + kλ + tδ )mod( p 1). It should be avoided to take the same random number and simple functional relationship exists between random numbers at the course of obtaining a number of signatures. Step4: Discarded the random number k and t, then the required public key p, β and α are obtained. The private key is x. The signature of plain text m is (γ,λ,δ ). Encryption and Decryption process: Before Transferring message the sender will encrypt message using QR technique for converting plain format to cipher format. The proposed technique uses any standard encryption technique which incorporates lossless compressionin order to cater to the needs of low bandwidth and data security. As mentioned above, let L be a defined language over the alphabet set _. For example, L be English and _ be {A,B,... Z,a, b,..., z}. Let the letters of _ be indexed by a bijection function I that maps a letter to an integer i, where 1 i _. Δ is a constant, called modulus constant. Let the data string M be {m1,m2,m3,..., mn} _. Performing modulus operation on every I(mi) by Δ, sequentially yields remainder set R as {r1, r2, r3,..., rn} and quotient set Q as {q1, q2, q3,..., qn}. The elements in R havie the values between [0,Δ 1]. So, we consider the elements in R to be a vector of numbers in base R. Each ritakes _log2 R_ bitsfor binary representation. If the message is of n characters, the number of bits required to represent the vector R is n _log2 R_. The quotient set is represented in a different way. Let B = _ _ Δ _+1 be another parameter called Base-valuer. The elements of Q will have values within [0,B 1]. Consider Q as a number in base B, i.e. (q1, q2,...,qn)b. Convert the number to a higher base. It is obvious that a higher base representation would reduce the digits in the number. If B is less then10, the we convert QB to a Q10 number. The Encoding Algorithm can be stated as : 1) Input: M 2) n= M, i.e. length of M 3) Z = n bit size i.e. bit size is the number of bits require to represent each charecter. 4) fori = 1 to n 4.1) Read mi the ithcharacter from M. 4.2) Find R R[i] = I(mi)%Δ 4.3) Find Q Q[i] = I(mi)/Δ 5) Representation of R fori = 1 to n 5.1) Represent R[i] in Base Δ. 6) Representation of Q Interpret Q as Base B number and convert it to Base 10 The vector R is communicated through open channel, whereas Q is encrypted to a cipher Qcusing any standard cryptographic technique and communicated to the receiver to ensure the confidentiality of the message M. By doing so, the overhead of encryption is reduced as we encrypt only tuple Q, rather than the whole message M. The receiver on receiving R and Qc, decrypts Qc to Q and decodes the message from the bituple < R,Q>. The Decoding Algorithm as follows: 1) Input: Bi-tuple < R,Q> 2) Convert Q from Base 10 to Base B Let QB = (q1, q2,...,qn) be the representation in Base B 3) Interpret R as a vector of Base Δ number 4) for1 i n 4.1) i = qi Δ+ri whereqi the ithdigit of QB rithe ithelement of R. Page 36
5 4.2) mi = I 1(i) 5) M = (m1,m2,..., mn) Verification : Step5: (γ,λ,δ ) is sent to the corresponding customers by system. The customers use the following equation to verify the correctness of plaintext m digital signatures. If equal, the signature is correct. Otherwise, the signature is incorrect or transmission errors. The equation as follows: αm =β γγλλδ mod p They are equal then retrieve the packet. If not equal discard packets sended by sender to the verifier. This way we can preventing the selective jamming attack. [6] T. X. Brown, J. E. James, and A. Sethi. Jamming and sensing of encrypted wireless ad hoc networks. In Proceedings of MobiHoc, pages , [7] M. Cagalj, S. Capkun, and J.-P.Hubaux.Wormholebased antijamming techniques in sensor networks. IEEE Transactions on Mobile Computing, 6(1): , [8] L. Lazos, S. Liu, and M. Krunz.Mitigating controlchannel jamming attacks in multi-channel ad hoc networks. In Proceedings of the 2ndACM conference on wireless network security, pages , About Author s: CONCLUSIONS: The problem of selective jamming attacks under internal threat model is considered. Here jammer is part of the network under attack, thus being aware of the protocol specifications and shared network secrets. To avoid packet classification in wireless transmission we proposed two schemes such as commitment scheme based on strong hiding and hiding based on cryptographic puzzle. These two schemes prevent the jammer from blocking the packets that is transmitted over wireless network so that the data reaches the receiver without any inaccuracies. REFERENCES: [1] Alejandro Proan o and LoukasLazos, Packet-Hiding Methods for Preventing Selective Jamming Attacks, ieee transactions on dependable and secure computing, vol. 9, no. 1, january/february 2012 [2] L. Lazos, S. Liu, and M. Krunz.Mitigating controlchannel jamming attacks in multi-channel ad hoc networks. In Proceedings of the 2nd ACM conference on wireless network security, pages ,2009. [3] G. Noubir and G. Lin. Low-power DoS attacks in data wireless lans and countermeasures. Mobile Computing and Communications Review,7(3):29 30, [4] M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. Levitt. Spread Spectrum Communications Handbook. McGraw-Hill, Y. Desmedt. Broadcast anti-jamming systems. Computer Networks,35(2-3): , February 2001 [5] Y. Desmedt. Broadcast anti-jamming systems. Computer Networks, 35(2-3): , February G.Deepthi H.Akshay G. Rajesh T. Swetha Associate professor, TKR College of Engineering A.Suresh Rao Professor &HoD, TKR College of Engineering Page 37
PREVENTING SELECTIVE JAMMING ATTACKS BY USING PACKET-HIDING METHOD
PREVENTING SELECTIVE JAMMING ATTACKS BY USING PACKET-HIDING METHOD Mr.Ganesh R.Patil 1, Prof. Prashant S. Wankhade 2 1 PG Scholar,Dept ofelectronics & Telecomm. Engg, ARMIET, Asangaon,Mumbai (India) 2
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
Secure Authentication Methods for Preventing Jamming Attacks In Wireless Networks
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 962-966 Secure Authentication Methods for Preventing Jamming Attacks In Wireless
Review of Prevention techniques for Denial of Service Attacks in Wireless Sensor Network
Review of Prevention techniques for Denial of Service s in Wireless Sensor Network Manojkumar L Mahajan MTech. student, Acropolis Technical Campus, Indore (MP), India Dushyant Verma Assistant Professor,
Wireless Sensor Networks Chapter 14: Security in WSNs
Wireless Sensor Networks Chapter 14: Security in WSNs António Grilo Courtesy: see reading list Goals of this chapter To give an understanding of the security vulnerabilities of Wireless Sensor Networks
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS)
SECURITY ASPECTS IN MOBILE AD HOC NETWORK (MANETS) Neha Maurya, ASM S IBMR ABSTRACT: Mobile Ad hoc networks (MANETs) are a new paradigm of wireless network, offering unrestricted mobility without any underlying
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
PREVENTING WIRELESS LAN DENIAL OF SERVICE ATTACKS
PREVENTING WIRELESS LAN DENIAL OF SERVICE ATTACKS A Guide to combating WLAN DoS Vulnerabilities Executive Summary Wireless communications that use a shared Radio Frequency (RF) medium are often vulnerable
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
Security in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria [email protected] [email protected]
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
GSM and UMTS security
2007 Levente Buttyán Why is security more of a concern in wireless? no inherent physical protection physical connections between devices are replaced by logical associations sending and receiving messages
CS 356 Lecture 29 Wireless Security. Spring 2013
CS 356 Lecture 29 Wireless Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND
chap18.wireless Network Security
SeoulTech UCS Lab 2015-1 st chap18.wireless Network Security JeongKyu Lee Email: [email protected] Table of Contents 18.1 Wireless Security 18.2 Mobile Device Security 18.3 IEEE 802.11 Wireless
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Client Server Registration Protocol
Client Server Registration Protocol The Client-Server protocol involves these following steps: 1. Login 2. Discovery phase User (Alice or Bob) has K s Server (S) has hash[pw A ].The passwords hashes are
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
Defense in Cyber Space Beating Cyber Threats that Target Mesh Networks
Beating Cyber Threats that Target Mesh Networks Trent Nelson, Cyber Security Assessment Lead, Idaho National Laboratory Jeff Becker, Global Wireless Business Director, Honeywell Process Solutions Table
How To Secure Wireless Networks
Lecture 24 Wireless Network Security modified from slides of Lawrie Brown Wireless Security Overview concerns for wireless security are similar to those found in a wired environment security requirements
Introduction to Wireless Sensor Network Security
Smartening the Environment using Wireless Sensor Networks in a Developing Country Introduction to Wireless Sensor Network Security Presented By Al-Sakib Khan Pathan Department of Computer Science and Engineering
Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth
Security Requirements for Wireless Networks and their Satisfaction in IEEE 802.11b and Bluetooth Henrich C. Poehls Master s Thesis M.Sc. in Information Security Information Security Group Royal Holloway,
Revision of Lecture Eighteen
Revision of Lecture Eighteen Previous lecture has discussed equalisation using Viterbi algorithm: Note similarity with channel decoding using maximum likelihood sequence estimation principle It also discusses
Enterprise A Closer Look at Wireless Intrusion Detection:
White Paper Enterprise A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Josh Wright Senior Security Researcher Introduction As wireless enterprise networks become
Ting Ma,Yee Hui Lee and Maode Ma
Ting Ma,Yee Hui Lee and Maode Ma School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore Abstract: Security is an important concern in satellite multicast communications.
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 6 Wireless Network Security Objectives Overview of IEEE 802.11 wireless security Define vulnerabilities of Open System Authentication,
2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
Technical Brief. Wireless Intrusion Protection
Technical Brief Wireless Intrusion Protection Introduction One layer of the multi-layer wireless security solution provided by Aruba Wireless Networks is the ability to lock the air using wireless intrusion
CDMA TECHNOLOGY. Brief Working of CDMA
CDMA TECHNOLOGY History of CDMA The Cellular Challenge The world's first cellular networks were introduced in the early 1980s, using analog radio transmission technologies such as AMPS (Advanced Mobile
Wireless Local Area. Network Security
Wireless Local Area Network Security HONORS PROJECT CIS 345/ Section 131 Spring 2005 Mentor: Prof. C.S. Rani The first part of this research paper will answer questions such as: what is wireless, how wireless
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model
A Closer Look at Wireless Intrusion Detection: How to Benefit from a Hybrid Deployment Model Table of Contents Introduction 3 Deployment approaches 3 Overlay monitoring 3 Integrated monitoring 4 Hybrid
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
INTRODUCTION... 3 FREQUENCY HOPPING SPREAD SPECTRUM... 4 SECURED WIRELESS COMMUNICATION WITH AES ENCRYPTION... 6
Technology Overview CONTENTS INTRODUCTION... 3 FREQUENCY HOPPING SPREAD SPECTRUM... 4 FULL TWO-WAY SYNCHRONIZED TDMA COMMUNICATION... 5 SECURED WIRELESS COMMUNICATION WITH AES ENCRYPTION... 6 UNMATCHED
ITL BULLETIN FOR AUGUST 2012
ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division
Preventing Resource Exhaustion Attacks in Ad Hoc Networks
Preventing Resource Exhaustion Attacks in Ad Hoc Networks Masao Tanabe and Masaki Aida NTT Information Sharing Platform Laboratories, NTT Corporation, 3-9-11, Midori-cho, Musashino-shi, Tokyo 180-8585
United States Trustee Program s Wireless LAN Security Checklist
United States Trustee Program s Wireless LAN Security Checklist In support of a standing trustee s proposed implementation of Wireless Access Points (WAP) in ' 341 meeting rooms and courtrooms, the following
Wireless LAN Security Mechanisms
Wireless LAN Security Mechanisms Jingan Xu, Andreas Mitschele-Thiel Technical University of Ilmenau, Integrated Hard- and Software Systems Group [email protected], [email protected] Abstract.
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
Maximizing Receiver Dynamic Range for Spectrum Monitoring
Home Maximizing Receiver Dynamic Range for Spectrum Monitoring Brian Avenell, National Instruments Corp., Austin, TX October 15, 2012 As consumers continue to demand more data wirelessly through mobile
VOIP THE ULTIMATE GUIDE VERSION 1.0. 9/23/2014 onevoiceinc.com
VOIP THE ULTIMATE GUIDE VERSION 1.0 9/23/2014 onevoiceinc.com WHAT S IN THIS GUIDE? WHAT IS VOIP REQUIREMENTS OF A VOIP SYSTEM IMPLEMENTING A VOIP SYSTEM METHODS OF VOIP BENEFITS OF VOIP PROBLEMS OF VOIP
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation
Analysis of Denial-of-Service attacks on Wireless Sensor Networks Using Simulation 1 Doddapaneni.krishna Chaitanya, 2 Ghosh.Arindam Middlesex University Abstract Evaluation of Wireless Sensor Networks
Securing MANET Using Diffie Hellman Digital Signature Scheme
Securing MANET Using Diffie Hellman Digital Signature Scheme Karamvir Singh 1, Harmanjot Singh 2 1 Research Scholar, ECE Department, Punjabi University, Patiala, Punjab, India 1 [email protected] 2
How To Write A Transport Layer Protocol For Wireless Networks
Chapter 9: Transport Layer and Security Protocols for Ad Hoc Wireless Networks Introduction Issues Design Goals Classifications TCP Over Ad Hoc Wireless Networks Other Transport Layer Protocols Security
Comparison of Various Passive Distributed Denial of Service Attack in Mobile Adhoc Networks
Comparison of Various Passive Distributed Denial of Service in Mobile Adhoc Networks YOGESH CHABA #, YUDHVIR SINGH, PRABHA RANI Department of Computer Science & Engineering GJ University of Science & Technology,
Mobile Office Security Requirements for the Mobile Office
Mobile Office Security Requirements for the Mobile Office [email protected] Alcatel SEL AG 20./21.06.2001 Overview Security Concepts in Mobile Networks Applications in Mobile Networks Mobile Terminal used
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Network Security. Security of Wireless Local Area Networks. Chapter 15. Network Security (WS 2002): 15 Wireless LAN Security 1 Dr.-Ing G.
Network Security Chapter 15 Security of Wireless Local Area Networks Network Security WS 2002: 15 Wireless LAN Security 1 IEEE 802.11 IEEE 802.11 standardizes medium access control MAC and physical characteristics
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem
Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks - The routing problem Ernesto Jiménez Caballero Helsinki University of Technology [email protected] Abstract intrusion detection
Metrics for Detection of DDoS Attacks
Chapter 3 Metrics for Detection of DDoS Attacks The DDoS attacks are trying to interfere with the physical transmission and reception of wireless communications. Attacks are caused by jamming, exhaustion,
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
An Evaluation of Security Services schemes For IEEE 802.11 Wireless LAN s Using Qualnet
An Evaluation of Security Services schemes For IEEE 802.11 Wireless LAN s Using Qualnet Richa Gupta 1, Hamid Ali 2, munendra kumar das 3, Shalini Chaudhary 4 P.G. Student, Department of Electronics and
IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS
IMPROVISED SECURITY PROTOCOL USING NEAR FIELD COMMUNICATION IN SMART CARDS Mythily V.K 1, Jesvin Veancy B 2 1 Student, ME. Embedded System Technologies, Easwari Engineering College, Ramapuram, Anna University,
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System
Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Final exam review, Fall 2005 FSU (CIS-5357) Network Security
Final exam review, Fall 2005 FSU (CIS-5357) Network Security Instructor: Breno de Medeiros 1. What is an insertion attack against a NIDS? Answer: An insertion attack against a network intrusion detection
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.
Protection of Vulnerable Virtual machines from being compromised as zombies during DDoS attacks using a multi-phase distributed vulnerability detection & counter-attack framework Ashok Kumar Gonela MTech
SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS
SECURE SIGNATURE BASED CEDAR ROUTING IN MOBILE ADHOC NETWORKS Ayesha Tabassum 1 1 Assistant Professor, Department of Computer Science and Engineering, DCET, Osmania University, Telangana, India Abstract
All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices
Wireless Security All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices Portability Tamper-proof devices? Intrusion and interception of poorly
WHITE PAPER. WEP Cloaking for Legacy Encryption Protection
WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area
802.11 Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi [email protected]
802.11 Security (WEP, WPA\WPA2) 19/05/2009 Giulio Rossetti Unipi [email protected] 802.11 Security Standard: WEP Wired Equivalent Privacy The packets are encrypted, before sent, with a Secret Key
Observer Analyzer Provides In-Depth Management
Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing corporate security policies, the Observer Performance Management Platform is a complete,
Denial of Service Attacks in Wireless Networks: The case of Jammers
Denial of Service Attacks in Wireless Networks: The case of Jammers 1 Konstantinos Pelechrinis, Marios Iliofotou and Srikanth V. Krishnamurthy University of California, Riverside {kpele, marios, krish}@cs.ucr.edu
Wireless Network Security
Wireless Network Security Bhavik Doshi Privacy and Security Winter 2008-09 Instructor: Prof. Warren R. Carithers Due on: February 5, 2009 Table of Contents Sr. No. Topic Page No. 1. Introduction 3 2. An
First Semester Examinations 2011/12 INTERNET PRINCIPLES
PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
The Basics of Wireless Local Area Networks
The Basics of Wireless Local Area Networks Andreas Johnsen Student at Mälardalens högskola [email protected] +46 712345678 ABSTRACT This paper is written as a brief education about the basics of
Wireless LAN Security: Securing Your Access Point
IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.5B, May 2006 173 Wireless LAN Security: Securing Your Access Point Sia Sie Tung, Nurul Nadia Ahmad, Tan Kim Geok Faculty
Hello viewers, welcome to today s lecture on cellular telephone systems.
Data Communications Prof. A. Pal Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture minus 31 Cellular Telephone Systems Hello viewers, welcome to today s lecture
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: [email protected] Every day, millions of people
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES AND CHALLENGES
In: Advances in Communications and Media Research ISBN 978-1-60876-576-8 Editor: Anthony V. Stavros, pp. 2010 Nova Science Publishers, Inc. Chapter 3 DENIAL OF SERVICE IN WIRELESS SENSOR NETWORKS: ISSUES
Voice Over IP (VoIP) Denial of Service (DoS)
Introduction Voice Over IP (VoIP) Denial of Service (DoS) By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] Denial of Service (DoS) is an issue for any IP network-based
Wireless Network Analysis. Complete Network Monitoring and Analysis for 802.11a/b/g/n
Wireless Network Analysis Complete Network Monitoring and Analysis for 802.11a/b/g/n Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing
Wireless Local Area Network Deployment and Security Practices
HIGHLIGHTS AUDIT REPORT Wireless Local Area Network Deployment and April 24, 2014 Report Number HIGHLIGHTS BACKGROUND: The U.S. Postal Service is committed to providing a high quality, secure, and cost-effective
Wi-Fi, Health Care, and HIPAA
AN AIRMAGNET TECHNICAL WHITE PAPER Wi-Fi, Health Care, and HIPAA WLAN Management in the Modern Hospital by Wade Williamson WWW.AIRMAGNET.COM This page contains no topical information. Table of Contents
IY2760/CS3760: Part 6. IY2760: Part 6
IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily
Methodology: Security plan for wireless networks. By: Stephen Blair Mandeville A. Summary
Methodology: Security plan for wireless networks By: Stephen Blair Mandeville A. Summary The evolution to wireless networks allows connections with the same quality of data transfer at a lower cost but
A Security Architecture for. Wireless Sensor Networks Environmental
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 737-742 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4683 A Security Architecture for Wireless Sensor Networks Environmental
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT. October 2009 EXAMINERS' REPORT. Computer Networks
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT October 2009 EXAMINERS' REPORT Computer Networks General Comments The responses to questions were of marginally better quality than April 2009
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
Wireless Networks. Welcome to Wireless
Wireless Networks 11/1/2010 Wireless Networks 1 Welcome to Wireless Radio waves No need to be physically plugged into the network Remote access Coverage Personal Area Network (PAN) Local Area Network (LAN)
