SlideShare ist ein Scribd-Unternehmen logo
1 von 6
A Trigger Identification Service for Defending Reactive
                Jammers in Wireless Sensor Network



ABSTRACT

During the last decade, Reactive Jamming Attack has emerged as a great security
threat to wireless sensor networks, due to its mass destruction to legitimate sensor
communications and difficulty to be disclosed and defended. Considering the
specific characteristics of reactive jammer nodes, a new scheme to deactivate them
by efficiently identifying all trigger nodes, whose transmissions invoke the jammer
nodes, has been proposed and developed. Such a trigger-identification procedure
can work as an application-layer service and benefit many existing reactive-
jamming defending schemes. In this paper, on the one hand, we leverage several
optimization problems to provide a complete trigger-identification service
framework for unreliable wireless sensor networks. On the other hand, we provide
an improved algorithm with regard to two sophisticated jamming models, in order
to enhance its robustness for various network scenarios. Theoretical analysis and
simulation results are included to validate the performance of this framework.

EXISTING SYSTEM:

Reactive Jamming Attack has emerged as a great security threat to wireless sensor
networks, due to its mass destruction to legitimate sensor communications and
difficulty to be disclosed and defended. Among the various attacks, jamming attack
where a jammer node disrupts the message delivery of its neighboring sensor
nodes with interference signals, has become a critical threat to WSNs.

PROPOSED SYSTEM:

We present a simulation based trigger-identification service for reactive-jamming
in wireless sensor networks, which promptly provides the list of trigger-nodes
using a lightweight decentralized algorithm, without introducing neither new
hardware devices, nor significant message overhead at each sensor node.




MODULES:

    Network Model
    Attacker Model
    Jamming range
    Triggering range
    Jammer distance




MODULES DESCRIPTION:

Network Model
We consider a wireless sensor network consisting of n sensor nodes and one base
station (larger networks with multiple base stations can be split into small ones to
satisfy the model). Each sensor node is equipped with a globally synchronized time
clock, omnidirectional antennas, m radios for in total k channels throughout the
network, where k > m. For simplicity, the power strength in each direction is
assumed to be uniform, so the transmission range of each sensor can be abstracted
as a constant rs and the whole network as a unit disk graph (UDG) G ¼ ðV ;EÞ,
where any node pair i; j is connected iff the Euclidean distance between i; j: _ði; jÞ
_ rs. We leave asymmetric powers and polygonal transmission area for further
study.

Attacker Model

We consider both a basic attacker model and several advanced attacker models in
this paper. Specifically, we provide a solution framework toward the basic attacker
model, and validate its performance toward multiple advanced attacker models
theoretically and experimentally



Jamming range

R. Similar to the sensors, the jammers are equipped with omnidirectional antennas
with uniform power strength on each direction. The jammed area can be regarded
as a circle centered at the jammer node, with a radius R, where R is assumed
greater than rs, for simulating a powerful and efficient jammer node. All the
sensors within this range will be jammed during the jammer wake-up period. The
value of R can be approximated based on the positions of the boundary sensors
(whose neighbors are jammed but themselves not), and then further refined.

Triggering range

On sensing an ongoing transmission, the decision whether or not to launch a
jamming signal depends on the power of the sensor signal Ps, the arrived signal
power at the jammer Pa with distance r from the sensor, and the power of the
background noise Pn.




Jammer distance

Any two jammer nodes are assumed not to be too close to each other, i.e., the
distance between jammer J1 and J2 is _ðJ1; J2Þ > R. The motivations behind this
assumptions are three-fold: 1) the deployment of jammers should maximize the
jammed areas with a limited number of jammers, therefore large overlapping
between jammed areas of different jammers lowers down the attack efficiency; 2)
_ðJ1; J2Þ should be greater than R, since the transmission signals from one
jammer should not interfere the signal reception at the other jammer. Otherwise,
the latter jammer will not able to correctly detect any sensor transmission signals,
since they are accompanied with high RF noises, unless the jammer spends a lot of
efforts in denoising or embeds jammer-label in the jamming noise for the other
jammers to recognize. Both ways are infeasible for an efficient attack; 3) the
communications between jammers are impractical, which will expose the jammers
to anomaly detections at the network authority.


SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:


   • System               : Pentium IV 2.4 GHz.
   • Hard Disk           : 40 GB.
   • Floppy Drive        : 1.44 Mb.
   • Monitor             : 15 VGA Colour.
   • Mouse               : Logitech.
   • Ram                 : 512 Mb.




SOFTWARE REQUIREMENTS:


   • Operating system : - Windows XP.
   • Coding Language : JAVA
REFERENCE:

Ying Xuan, Yilin Shen, Nam P. Nguyen, and My T. Thai, “A Trigger
Identification Service for Defending Reactive Jammers in WSN”, IEEE
TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 5, MAY 2012

Weitere ähnliche Inhalte

Was ist angesagt?

Wireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum DesignWireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum DesignJim Jenkins
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor networkAdit Pathak
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networksVishnu Kudumula
 
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGDETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGPrakash Kumar
 
A survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessA survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessfarrukh Farrukh
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Cooperative tv spectrum sensing in cognitive radio BY DEEPAK PORIYA
Cooperative tv spectrum sensing in cognitive radio BY DEEPAK PORIYACooperative tv spectrum sensing in cognitive radio BY DEEPAK PORIYA
Cooperative tv spectrum sensing in cognitive radio BY DEEPAK PORIYADeepak Poriya
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendeSAT Publishing House
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security ghaidaa WN
 
Protocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor networkProtocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor networkIOSR Journals
 
A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...eSAT Journals
 
A review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wirelessA review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wirelesseSAT Publishing House
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsmmjalbiaty
 
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSN
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSNMulti-Robot Sensor Relocation to Enhance Connectivity in a WSN
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSNijasuc
 

Was ist angesagt? (19)

Wireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum DesignWireless Communications & Spread Spectrum Design
Wireless Communications & Spread Spectrum Design
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Security in wireless sensor network
Security in wireless sensor networkSecurity in wireless sensor network
Security in wireless sensor network
 
security in wireless sensor networks
security in wireless sensor networkssecurity in wireless sensor networks
security in wireless sensor networks
 
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKINGDETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
DETECTION OF SYBIL ATTACK IN MOBILE ADHOCK NETWORKING
 
Security in WSN
Security in WSNSecurity in WSN
Security in WSN
 
A survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wirelessA survey on complex wormhole attack in wireless
A survey on complex wormhole attack in wireless
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Chapter
ChapterChapter
Chapter
 
Cooperative tv spectrum sensing in cognitive radio BY DEEPAK PORIYA
Cooperative tv spectrum sensing in cognitive radio BY DEEPAK PORIYACooperative tv spectrum sensing in cognitive radio BY DEEPAK PORIYA
Cooperative tv spectrum sensing in cognitive radio BY DEEPAK PORIYA
 
Tqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defendTqds time stamped quantum digital signature to defend
Tqds time stamped quantum digital signature to defend
 
Wormhole attack
Wormhole attackWormhole attack
Wormhole attack
 
Wireless Sensor Network Security
Wireless Sensor Network  Security Wireless Sensor Network  Security
Wireless Sensor Network Security
 
Protocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor networkProtocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor network
 
50120140506007 2
50120140506007 250120140506007 2
50120140506007 2
 
A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...A review paper on watchdog mechanism in wireless sensor network to eliminate ...
A review paper on watchdog mechanism in wireless sensor network to eliminate ...
 
A review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wirelessA review paper on watchdog mechanism in wireless
A review paper on watchdog mechanism in wireless
 
Wireless sensor network lifetime constraints
Wireless sensor network lifetime constraintsWireless sensor network lifetime constraints
Wireless sensor network lifetime constraints
 
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSN
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSNMulti-Robot Sensor Relocation to Enhance Connectivity in a WSN
Multi-Robot Sensor Relocation to Enhance Connectivity in a WSN
 

Andere mochten auch

Sindrome compartimental expo 1
Sindrome compartimental expo 1Sindrome compartimental expo 1
Sindrome compartimental expo 1Danilo Solórzano
 
2012 13 eee ieee projects - jp infotech
2012 13 eee ieee projects - jp infotech2012 13 eee ieee projects - jp infotech
2012 13 eee ieee projects - jp infotechJPINFOTECH JAYAPRAKASH
 
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...JPINFOTECH JAYAPRAKASH
 
A stochastic model of multivirus dynamics
A stochastic model of multivirus dynamicsA stochastic model of multivirus dynamics
A stochastic model of multivirus dynamicsJPINFOTECH JAYAPRAKASH
 
Adaptive membership functions for hand written character recognition by voron...
Adaptive membership functions for hand written character recognition by voron...Adaptive membership functions for hand written character recognition by voron...
Adaptive membership functions for hand written character recognition by voron...JPINFOTECH JAYAPRAKASH
 
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...JPINFOTECH JAYAPRAKASH
 
A gossip protocol for dynamic resource management in large cloud environments
A gossip protocol for dynamic resource management in large cloud environmentsA gossip protocol for dynamic resource management in large cloud environments
A gossip protocol for dynamic resource management in large cloud environmentsJPINFOTECH JAYAPRAKASH
 
The China Analyst - September 2011
The China Analyst - September 2011The China Analyst - September 2011
The China Analyst - September 2011Hattie L Peng
 

Andere mochten auch (15)

Sindrome compartimental expo 1
Sindrome compartimental expo 1Sindrome compartimental expo 1
Sindrome compartimental expo 1
 
2012 13 eee ieee projects - jp infotech
2012 13 eee ieee projects - jp infotech2012 13 eee ieee projects - jp infotech
2012 13 eee ieee projects - jp infotech
 
Whadddyathink
WhadddyathinkWhadddyathink
Whadddyathink
 
IEEE PROJECTS 2013 for me
IEEE PROJECTS 2013 for meIEEE PROJECTS 2013 for me
IEEE PROJECTS 2013 for me
 
2012 ieee android project titles
2012 ieee android project titles2012 ieee android project titles
2012 ieee android project titles
 
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...Enabling dynamic data and indirect mutual trust for cloud computing storage s...
Enabling dynamic data and indirect mutual trust for cloud computing storage s...
 
A stochastic model of multivirus dynamics
A stochastic model of multivirus dynamicsA stochastic model of multivirus dynamics
A stochastic model of multivirus dynamics
 
Marco
MarcoMarco
Marco
 
Android ieee projects 2012
Android ieee projects 2012Android ieee projects 2012
Android ieee projects 2012
 
Adaptive membership functions for hand written character recognition by voron...
Adaptive membership functions for hand written character recognition by voron...Adaptive membership functions for hand written character recognition by voron...
Adaptive membership functions for hand written character recognition by voron...
 
Marco
MarcoMarco
Marco
 
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
 
A gossip protocol for dynamic resource management in large cloud environments
A gossip protocol for dynamic resource management in large cloud environmentsA gossip protocol for dynamic resource management in large cloud environments
A gossip protocol for dynamic resource management in large cloud environments
 
The China Analyst - September 2011
The China Analyst - September 2011The China Analyst - September 2011
The China Analyst - September 2011
 
Feb mar
Feb marFeb mar
Feb mar
 

Ähnlich wie Trigger Identification Service for Defending Reactive Jammers

Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a surveywsnapple
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKRutvik Pensionwar
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkIJMTST Journal
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORijcsa
 
Analysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackAnalysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackJyotiVERMA176
 
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdfSpread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdfakritigallery
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSnanocdac
 
7_adhoc and wireless network (1).ppt
7_adhoc and wireless network (1).ppt7_adhoc and wireless network (1).ppt
7_adhoc and wireless network (1).pptleonalmessibd21
 
A survey on jamming attacks, detection and defending strategies in wireless s...
A survey on jamming attacks, detection and defending strategies in wireless s...A survey on jamming attacks, detection and defending strategies in wireless s...
A survey on jamming attacks, detection and defending strategies in wireless s...eSAT Journals
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 

Ähnlich wie Trigger Identification Service for Defending Reactive Jammers (20)

Ar03302620266
Ar03302620266Ar03302620266
Ar03302620266
 
Jammers in wsn
Jammers in wsnJammers in wsn
Jammers in wsn
 
Sensor networks a survey
Sensor networks a surveySensor networks a survey
Sensor networks a survey
 
A1803060110
A1803060110A1803060110
A1803060110
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
Sensor net
Sensor netSensor net
Sensor net
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
 
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor NetworkNode Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
Node Deployment in Homogeneous and Heterogeneous Wireless Sensor Network
 
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSORIMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
IMPLEMENTATION OF SECURITY PROTOCOL FOR WIRELESS SENSOR
 
Analysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attackAnalysis and reactive measures on the blackhole attack
Analysis and reactive measures on the blackhole attack
 
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdfSpread Spectrum TechniquesDescribe in detail a simple data communi.pdf
Spread Spectrum TechniquesDescribe in detail a simple data communi.pdf
 
C0511318
C0511318C0511318
C0511318
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKS
 
F04 3-3944
F04 3-3944F04 3-3944
F04 3-3944
 
7_adhoc and wireless network (1).ppt
7_adhoc and wireless network (1).ppt7_adhoc and wireless network (1).ppt
7_adhoc and wireless network (1).ppt
 
Article GSM
Article GSMArticle GSM
Article GSM
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
A survey on jamming attacks, detection and defending strategies in wireless s...
A survey on jamming attacks, detection and defending strategies in wireless s...A survey on jamming attacks, detection and defending strategies in wireless s...
A survey on jamming attacks, detection and defending strategies in wireless s...
 
Indoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor NetworksIndoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor Networks
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 

Kürzlich hochgeladen

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 

Kürzlich hochgeladen (20)

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Trigger Identification Service for Defending Reactive Jammers

  • 1. A Trigger Identification Service for Defending Reactive Jammers in Wireless Sensor Network ABSTRACT During the last decade, Reactive Jamming Attack has emerged as a great security threat to wireless sensor networks, due to its mass destruction to legitimate sensor communications and difficulty to be disclosed and defended. Considering the specific characteristics of reactive jammer nodes, a new scheme to deactivate them by efficiently identifying all trigger nodes, whose transmissions invoke the jammer nodes, has been proposed and developed. Such a trigger-identification procedure can work as an application-layer service and benefit many existing reactive- jamming defending schemes. In this paper, on the one hand, we leverage several optimization problems to provide a complete trigger-identification service framework for unreliable wireless sensor networks. On the other hand, we provide an improved algorithm with regard to two sophisticated jamming models, in order to enhance its robustness for various network scenarios. Theoretical analysis and simulation results are included to validate the performance of this framework. EXISTING SYSTEM: Reactive Jamming Attack has emerged as a great security threat to wireless sensor networks, due to its mass destruction to legitimate sensor communications and
  • 2. difficulty to be disclosed and defended. Among the various attacks, jamming attack where a jammer node disrupts the message delivery of its neighboring sensor nodes with interference signals, has become a critical threat to WSNs. PROPOSED SYSTEM: We present a simulation based trigger-identification service for reactive-jamming in wireless sensor networks, which promptly provides the list of trigger-nodes using a lightweight decentralized algorithm, without introducing neither new hardware devices, nor significant message overhead at each sensor node. MODULES:  Network Model  Attacker Model  Jamming range  Triggering range  Jammer distance MODULES DESCRIPTION: Network Model
  • 3. We consider a wireless sensor network consisting of n sensor nodes and one base station (larger networks with multiple base stations can be split into small ones to satisfy the model). Each sensor node is equipped with a globally synchronized time clock, omnidirectional antennas, m radios for in total k channels throughout the network, where k > m. For simplicity, the power strength in each direction is assumed to be uniform, so the transmission range of each sensor can be abstracted as a constant rs and the whole network as a unit disk graph (UDG) G ¼ ðV ;EÞ, where any node pair i; j is connected iff the Euclidean distance between i; j: _ði; jÞ _ rs. We leave asymmetric powers and polygonal transmission area for further study. Attacker Model We consider both a basic attacker model and several advanced attacker models in this paper. Specifically, we provide a solution framework toward the basic attacker model, and validate its performance toward multiple advanced attacker models theoretically and experimentally Jamming range R. Similar to the sensors, the jammers are equipped with omnidirectional antennas with uniform power strength on each direction. The jammed area can be regarded as a circle centered at the jammer node, with a radius R, where R is assumed greater than rs, for simulating a powerful and efficient jammer node. All the
  • 4. sensors within this range will be jammed during the jammer wake-up period. The value of R can be approximated based on the positions of the boundary sensors (whose neighbors are jammed but themselves not), and then further refined. Triggering range On sensing an ongoing transmission, the decision whether or not to launch a jamming signal depends on the power of the sensor signal Ps, the arrived signal power at the jammer Pa with distance r from the sensor, and the power of the background noise Pn. Jammer distance Any two jammer nodes are assumed not to be too close to each other, i.e., the distance between jammer J1 and J2 is _ðJ1; J2Þ > R. The motivations behind this assumptions are three-fold: 1) the deployment of jammers should maximize the jammed areas with a limited number of jammers, therefore large overlapping between jammed areas of different jammers lowers down the attack efficiency; 2) _ðJ1; J2Þ should be greater than R, since the transmission signals from one jammer should not interfere the signal reception at the other jammer. Otherwise, the latter jammer will not able to correctly detect any sensor transmission signals, since they are accompanied with high RF noises, unless the jammer spends a lot of
  • 5. efforts in denoising or embeds jammer-label in the jamming noise for the other jammers to recognize. Both ways are infeasible for an efficient attack; 3) the communications between jammers are impractical, which will expose the jammers to anomaly detections at the network authority. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: • System : Pentium IV 2.4 GHz. • Hard Disk : 40 GB. • Floppy Drive : 1.44 Mb. • Monitor : 15 VGA Colour. • Mouse : Logitech. • Ram : 512 Mb. SOFTWARE REQUIREMENTS: • Operating system : - Windows XP. • Coding Language : JAVA
  • 6. REFERENCE: Ying Xuan, Yilin Shen, Nam P. Nguyen, and My T. Thai, “A Trigger Identification Service for Defending Reactive Jammers in WSN”, IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 11, NO. 5, MAY 2012