+ All Categories
Home > Documents > Final Review

Final Review

Date post: 26-Oct-2014
Category:
Upload: ashok-kumar
View: 30 times
Download: 1 times
Share this document with a friend
Popular Tags:
32
Multiple-Path Routing Using Portfolio Selection for Congestion Avoidance Presented By, Biruntha.T (50808104006) Keerthiga.T.S (50808104028) Lilly Sara.A (50808104037) Mahalakshmi.N (50808104038) Guided By, M.Nalini ,ME(CSE)
Transcript
Page 1: Final Review

Multiple-Path Routing Using Portfolio

Selectionfor Congestion

Avoidance

Presented By, Biruntha.T (50808104006) Keerthiga.T.S (50808104028) Lilly Sara.A (50808104037) Mahalakshmi.N (50808104038)

Guided By,M.Nalini ,ME(CSE)

Page 2: Final Review

AgendaAgendaAbstractExisting SystemProposed SystemAlgorithmSystem ArchitectureSystem RequirementsModulesScreen shotsConclusionFuture EnhancementReference Papers

Page 3: Final Review

AbstractThe jammer controls the probability of jamming

and the transmission range.The jammer action ceases when it is detected by

the network, and a notification message is transferred out of the jammed region.

The network defends itself by computing the channel access probability to minimize the jamming detection plus notification time.

Page 4: Final Review

Existing SystemExisting System

Need prompt response.Network Intrusion Detection Systems (NIDS)

attempt to detect such behavior and flag these port scanners as malicious.

The sooner a NIDS detects malice, the lower the resulting damage.

Page 5: Final Review

DisadvantageDisadvantage

Disturb wireless communications Smaller number of connection Outsider / Insider Time Delay

Page 6: Final Review

Proposed SystemProposed SystemJamming attacks that are easy to launch but are

difficult to detect and confront, since they differ from brute force attacks.

To cause maximal damage to the network in terms of corrupted communication links.

jammer action ceases when it is detected by one or more monitoring nodes, and a notification message is transferred out of the jamming region

Page 7: Final Review

AdvantageAdvantage

Easy to launch Notification message is transferredCapture the attacker

Page 8: Final Review

Literature SurveyLiterature Survey1.Jamming Sensor Networks Attack and Defense

Strategies.

2.JAM: A Jammed-Area Mapping Service for Sensor Networks.

3.Denial Of Service in Sensor Networks.

4.Attacks and Network Defense Policies in Wireless Sensor Networks.

5.Denial Of Service in Wireless Sensor Networks:Attacks and Defences

Page 9: Final Review

AlgorithmHeuristic algorithm for an efficient jamming

strategy. 1.INSERT(initial-node, FRINGE)

2.Repeat: If FRINGE is empty then return failuren REMOVE (FRINGE)S STATE(n) IF GOAL(s) then return path or goal state For every state s in SUCCESSOR(s)

Create a node ‘n’

INSERT(n,FRINGE)

Page 10: Final Review

System ArchitectureSystem ArchitectureClient

A

Client B

Client C

Server

Monitoring the traffic

Algorithm

Node capturing attack

Data communication

processing

Page 11: Final Review

System RequirementsSystem RequirementsHARDWARE REQUIREMENTS:Hard Disk : 40 GB.System : Pentium IV 2.4 GHz.Floppy Drive : 1.44 Mb.Monitor : 15 VGA Colour.Mouse : Logitech.RAM : 256 Mb.

SOFTWARE REQUIREMENTS:Operating system : - Windows XP Professional.Coding Language: - Java.Tool Used : - Eclipse.

Page 12: Final Review

  ModulesModules1. Network module

2. Channel Access module

3. Control Message Access module

4. Control Channel Jamming module

5. Port Number Assignment

Page 13: Final Review

Modules DescriptionModules Description

1. Network module

Partitions tasks or workloads between service providers (servers) and service requesters, called clients.

Server machine is running one or more server programs which share its resources with clients

Page 14: Final Review

2. Channel Access module

Maintaining a degree of independence between the hopping sequences held by different users.

Designing schemes which are robust to control channel jamming attacks by malicious colluding insiders or compromised users.

Page 15: Final Review

3. Control Message Access module

Providing probabilistic availability of control messages using random key assignment.

We develop a correspondence between the problems of key establishment and control channel access in wireless networks and develop a framework

Page 16: Final Review

4. Control Channel Jamming module 

Channel access protocol can perform a DoS attack. Access protocol uses a fixed predetermined schedule for data and control messages

A control channel jamming attack focusing only on the control channels

Page 17: Final Review

5. Port Number Assignment

The monitor checks if the node is having any process running or any attacker has attached the node.

Monitor assigns a port number for the node which is connected and the transmission is done.

Page 18: Final Review

SnapshotsSnapshots: Giving: Giving InputsInputs

Page 19: Final Review

Nodes MonitoringNodes Monitoring

Page 20: Final Review
Page 21: Final Review

Sending Data From Sending Data From Node1 to Node2 in Node1 to Node2 in Normal modeNormal mode

Page 22: Final Review

Showing Notification Showing Notification MessageMessage

Page 23: Final Review

Sending File from Sending File from Node1 to Node2Node1 to Node2

Page 24: Final Review

Shows Received DataShows Received Data

Page 25: Final Review

SendingSending Data from Data from node3 to node2 in node3 to node2 in Attacker ModeAttacker Mode

Page 26: Final Review

Original Data is Original Data is ReceivedReceived

Page 27: Final Review

Raw dataRaw data

Page 28: Final Review

ConclusionConclusionData’s can be transmitted from Source to

Destination successfully.(Client_Server communication)

Congestion can be avoided based up on the Empirical Statistics method..

Page 29: Final Review

Future EnhancementFuture EnhancementThe network aims at alleviating the effect of the

attack and exposing the attacker to detection. Jamming and defending strategies under these

composite channel access protocols are left as a future research direction.

Payoff functions will likely result in different optimal jamming and anti jamming strategies.

Back-off and contention window adaptation are used to regulate the amount of transmitted traffic.

Page 30: Final Review

Reference PapersReference Papers M. Li, I. Koutsopoulos, and R. Poovendran, “Optimal

JammingAttacks and Defense Policies in Wireless Sensor Networks,” Proc.IEEE INFOCOM, 2007.

A.D. Wood and J.A. Stankovic, “Denial of Service in Sensor Networks,” Computer, vol. 35, no. 10, pp. 54-62, Oct 2002.

W. Xu, K. Ma, W. Trappe, and Y. Zhang, “Jamming sensor networks:Attack and defense strategies,” IEEE Network, vol. 20, no. 3, pp. 41–47,May/Jun. 2006.

R. Negi and A. Perrig, “Jamming Analysis of MAC Protocols,”Carnegie Mellon Technical Memo, 2003.

Page 31: Final Review

ContinuedContinued J.M. McCune, E. Shi, A. Perrig, and M.K. Reiter,

“Detection ofDenial-of-Message Attacks on Sensor Network Broadcasts,” Proc.IEEE Symp. Security and Privacy, 2005.

R. Mallik, R. Scholtz, and G. Papavassilopoulos, “Analysis of an On-Off Jamming Situation as a Dynamic Game,” IEEE Trans.Comm., vol. 48, no. 8, pp. 1360-1373, Aug. 2000.

G. Lin and G. Noubir, “On Link-Layer Denial of Service in DataWireless LANs,” Wiley J. Wireless Comm. and Mobile Computing,vol. 5, no. 3, pp. 273-284, May 2005.

Page 32: Final Review

Thank You!Thank You!

Queries..?&


Recommended