Packet-Thrashing Methods for Preventing Discriminatory Blocking Attacks

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2016 by IJPTT Journal
Volume - 6 Issue - 1
Year of Publication : 2016
Authors : C.Mani, P.Anandraj
DOI :  10.14445/22492615/IJPTT-V23P401

Citation

C.Mani, P.Anandraj "Packet-Thrashing Methods for Preventing Discriminatory Blocking Attacks". International Journal of P2P Network Trends and Technology (IJPTT), V6(1) :10-19 Jan - Feb 2016, ISSN:2249-2615, www.ijpttjournal.org, Published by Seventh Sense Research Group.

Abstract

The open environment of the wireless middle leaves it susceptible to intentional interference attacks, normally referred to as blocking. This intended interference with wireless transmissions can be used as a mounting refutation of- Service attacks on wireless networks. Generally blocking has been addressed under an peripheral threat model. Though, adversaries with internal acquaintance of protocol specifications and network secrets can begin small-effort jamming attacks that are difficult to detect and counter. During this work, we address the problem of selective jamming attacks in wireless networks. In these attacks, the challenger is energetic simply for a small phase of time, selectively targeting messages of high importance. We demonstrate the advantages of selective jamming in terms of network performance degradation and challenger effort by presenting two case studies. a selective attack on TCP and one on routing. We show that selective jamming attacks can be launched by performing real-time packet classification at t he physical layer. En route for moderate these attacks, we extend three schemes to prevent existent-point packet organization by combining cryptographic primitives with physical-layer attributes. We analyze the security of our methods and evaluate their computational and communication transparency.

References

[1] T. X. Brown, J. E. James, and A. Sethi. Jamming and sensing of encrypted wireless ad hoc networks. In Proceedings of MobiHoc, pages 120–130, 2006.
[2] M. Cagalj, S. Capkun, and J.-P. Hubaux. Wormhole-based anti-jamming techniques in sensor networks. IEEE Transactions on Mobile Computing, 6(1):100–114, 2007.
[3] T. Dempsey, G. Sahin, Y. Morton, and C. Hopper. Intelligent sensing and classification in ad hoc networks: a case study. Aerospace and Electronic Systems Magazine, IEEE, 24(8):23–30, August 2009.
[4] Y. Desmedt. Broadcast anti-jamming systems. Computer Networks, 35(2- 3):223–236, February 2001.
[5] K. Gaj and P. Chodowiec. FPGA and ASIC implementations of AES. Cryptographic Engineering, pages 235–294, 2009.
[6] O. Goldreich. Foundations of cryptography: Basic applications. Cambridge University Press, 2004.
[7] B. Greenstein, D. Mccoy, J. Pang, T. Kohno, S. Seshan, and D. Wether-all. Improving wireless privacy with an identifier-free link layer protocol. In Proceedings of MobiSys, 2008.
[8] IEEE. IEEE 802.11 standard. http://standards.ieee.org/getieee802/ download/802.11-2007.pdf, 2007.
[9] L. Lazos, S. Liu, and M. Krunz. Mitigating control-channel jamming attacks in multi-channel ad hoc networks. In Proceedings of the 2nd ACM conference on wireless network security, pages 169–180, 2009.
[10] G. Lin and G. Noubir. On link layer denial of service in data wireless LANs. Wireless Communications and Mobile Computing, 5(3):273–284, May 2004.
[11] X. Liu, G. Noubir, and R. Sundaram. Spread: Foiling smart jammers using multi-layer agility. In Proceedings of INFOCOM, pages 2536– 2540, 2007.
[12] Y. Liu, P. Ning, H. Dai, and A. Liu. Randomized differential DSSS: Jamming-resistant wireless broadcast communication. In Proceedings of INFOCOM, San Diego, 2010.

Keywords
Selective Jamming, Denial-of-Service, Wireless Network s, Packet Classification.