Denial of Service Attacks in Wireless Networks:
The Case of Jammers
ABSTRACT:
The shared nature of the medium in wireless networks makes it easy for an adversary to
launch a Wireless Denial of Service (WDoS) attack. Recent studies, demonstrate that
such attacks can be very easily accomplished using off-the shelf equipment. To give a
simple example, a malicious node can continually transmit a radio signal in order to
block any legitimate access to the medium and/or interfere with reception. This act is
called jamming and the malicious nodes are referred to as jammers. Jamming techniques
vary from simple ones based on the continual transmission of interference signals, to
more sophisticated attacks that aim at exploiting vulnerabilities of the particular protocol
used. In this survey, we present a detailed up-to-date discussion on the jamming attacks
recorded in the literature. We also describe various techniques proposed for detecting the
presence of jammers. Finally, we survey numerous mechanisms which attempt to protect
the network from jamming attacks. We conclude with a summary and by suggesting
future directions.
EXISTING SYSTEM
SECURITY is one of the critical attributes of any communication network. Various
attacks have been reported over the last many years. Most of them, however, target wired
networks. Wireless networks have only recently been gaining widespread deployment. At
the present time, with the advances in technology, wireless networks are becoming more
affordable and easier to build. Many metropolitan areas deploy public WMANs for
people to use freely. Moreover, the prevalence of WLANs as the basic edge access
solution to the Internet is rapidly becoming the reality. However, wireless networks are
accompanied with an important security flaw; they are much easier to attack than any
wired network.
PROPOSED SYSTEM
In this survey paper, we describe some of the most harmful attacks that can be launched
by a jammer. We develop such as one system, to show the effect of the dos attack.
In our proposed system, the normal client and server process is initially depicted, then the attack is lauched manually to show how the dos attack affect the normal client/server process.
HARDWARE REQUIREMENTS
The most common set of requirements defined by any operating system or
software application is the physical computer resources, also known as hardware. The
hardware requirements required for this project are:
20 GB of Hard disk
256 MB RAM
Pentium 133 MHZ or above (Processor)
PC’s which are interconnected in LAN
Network Adapter card configured with an IP address
SOFTWARE REQUIREMENTS
Software Requirements deal with defining software resource requirements and
pre-requisites that need to be installed on a computer to provide optimal functioning of an
application. These requirements or pre-requisites are generally not included in the
software installation package and need to be installed separately before the software is
installed. The software requirements that are required for this project are:
Java 1.3 or more
Windows 98 or more
Modules:
Client Application
DoS attack
File Server
Location Guard
File Server
Location Guard
Normal Client
REFERENCE
Konstantinos Pelechrinis, Marios Iliofotou and Srikanth V. Krishnamurthy,
“Denail of Service Attacks in Wireless Networks: The Case of Jammers”,
IEEE Communications Surveys & Turtorials, Vol. 13, No.2, Second for more details contact denniscodd site:
http://www.denniscodd.com
No comments:
Post a Comment