Você está na página 1de 32

MITIGATING CHANNEL JAMMING

1. INTRODUCTION
Efficient communication in mobile networks requires the use of multiple access protocols allowing mobile users to share the wireless medium by separating user data in any combination of time, frequency, signal space, and physical space. The entire class of multiple access can thus be described by the unifying framework of orthogonal frequency division multiple access. Allocation of access and resources to mobile users must be periodically updated in order to maintain the efficiency of the multiple access protocol when base station group membership, user demands, and wireless channel conditions are dynamic. In many systems, dedicated channels are established for the exchange of control messages. These control channels can be used for a wide variety of functions, from topological information propagation for network routing to access control in subscription services. Control channels thus serve as a platform on which higher-level protocol functionality is supported and, hence, as critical points of failure that can be targeted by a malicious adversary in a denial of service attack. An adversary with knowledge of the underlying channel access protocol can perform a denial of service attack against individual users or local neighborhoods in the mobile network by jamming the communication channels. Preventive Measures: The use of jamming-resistant communication protocols such as Direct Sequence Spread Spectrum or Frequency Hopping Spread Spectrum, introduce pseudo randomness into the access schedule by keeping the spreading or hopping sequences, respectively, unknown to the adversary. Alternative anti jamming techniques include the use of random channel surfing to randomly hop away from jammed channels and resynchronize on available channels and the use of wormholes to create a channel for reports or alarms from a jammed region. The above mentioned anti jamming NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

techniques consider jamming attacks by an external adversary and are not intended to mitigate jamming by valid network insiders. A set of malicious colluding users or an adversary who captures or subverts network users in a node capture attack, potentially inserting replicated or fabricated devices into the system, is able to bypass the anti jamming techniques above by assuming the collective roles of the compromised users in the network. An access protocol, which gives the same information to all network users, is thus ineffective against denial of service attacks by internal adversaries, as a malicious insider has the ability to perform any task of a valid user. Multiple distinct pseudorandom sequences must exist and be held by different users. The set of distinct sequences should exhibit a degree of coverfreeness in that at least one of the sequences of each user should be different from the union of the set of sequences held by malicious colluding users with a non-negligible probability to ensure collusion resistance. The Report: The report contains five chapters. The chapter 1 is introduction. Chapter 2 deals with literature survey. The chapter 3 describes system analysis. Chapter 4 mentions about system specification and finally chapter 5 explains project implementation. System analysis gives information about existing and the proposed system. System specification includes software requirements, hardware requirements, description about java and sql, which is the front end and back end of this project respectively. Project implementation includes the proposed system architecture. Based on this architecture a design is made and this design is implemented in this project. The outputs and screenshots are also included in project implementation, finally conclusion and references are also included.

NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

2. LITERATURE SURVEY
Securing Adhoc Networks: Bouam (2004) proposed that adhoc networks are a new paradigm of wireless communication for mobile hosts. In adhoc networks, there is no fixed infrastructure such as base stations or mobile switching centers. Mobile nodes that are with in each others radio range communicate directly via wirelss links, while those that are far apart rely on their nodes to rely messages as routers. Node mobility in an adhoc network causes frequent changes of the network topology . To secure adhoc network, attributes such as availability, confidentiality, integrity, consistency ,authentication, and non repudiation are considered. Availability ensures the survivability of network services denial of service attacks. Confidentiality ensures that certain information is never disclosed to unauthorized entities. Integrity guarantees that a message being transferred is never corrupted. Authentication enables a node to ensure the identity of the peer node it is communicating with. Without authentication, an adversary could masquerade a node, thus gaining unauthorized access to resource and sensitive information and interfacing with the operation of other nodes.. Finally, non repudiation ensures that the origin of a message cannot deny having sent the message. Non repudiation is useful for detection and isolation of compromised nodes. Routing Protocol in Adhoc Networks Perrig et al. (2005), suggested that adhoc network is a group of wireless mobile computers, in which nodes cooperate by forwarding packets for each other to allow them to communicate beyond direct wireless transmission range. Adhoc networks require no centralized administration or fixed network infrastructure such as base stations or access points, can be quickly and inexpensively set up as needed. They NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

can be used in scenarios in which no infrastructure exists, or in which the existing infrastructure does not meet application requirements for reasons such as security and cost. Applications such as military exercises, disaster relief, and mine site operation may benefit from ad hoc networking, but secure and reliable communication is a necessary prerequisite for such applications. Adhoc networks are a step closer to realizing the anytime, any where computing paradigm. The term ad hoc networks is most often used in the context of mobile devices, and in that case referred to as mobile ad hoc network. They are often characterized by the following network topology is dynamic, nodes have a limited power capacity, there is limited wireless bandwidth for communication, and absence of any central authority. In adhoc networks, there is no fixed infrastructure such as base stations or mobile switching centers. Adhoc networks are a new paradigm of wireless communication for mobile hosts. Adhoc networks are a step closer to realizing the anytime, anywhere computing paradigm. The term ad hoc networks is most often used in the context of mobile devices, and in that case referred to as mobile Adhoc Network. They are often characterized by network topology is dynamic, nodes have a limited power capacity, there is limited wireless bandwidth for communication, and absence of any central authority. There are two contributions to the area of secure routing protocols for ad hoc networks. First a model for the types of attacks possible in such system, and describe several new attacks on ad hoc network routing protocols. IPSe in Mobile Adhoc Networks .

According to Hansen (2000), wireless adhoc use of the communication infrastructure imposes many new requirements on both mobility management and security of the system. This is especially true if adhoc types of operations are to be supported by NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

corporate users or offered by public network operators to paying subscribers. Traditional internet protocol (IP) routing is based on the fact that the IP address specifies unambiguously a node's point of attachment to the Internet. Mobile IP allows a mobile node to move between different sub networks while retaining its own IP address and established connections. IP sec extends the basic IP functionality with security functions for authentication, integrity checks, and confidentiality. For two nodes to be able to secure the communications between them they have to establish a security association. In practice this means that they agree on the used security algorithms and share common security keys. The establishment and updating of the variables of the security association is the responsibility of a key management protocol. Industrial standard archithecture key management protocol provides a framework for authentication and key exchange but does not define them. Any protocol fulfilling the Industrial standard architecture key management protocol requirements can be used. The establishment of a security association is seen on the IP layer as an exchange of IP packets. Internal key exchange is seen as the strongest candidate for the establishment of the IP sec security association. The use of internal key exchange and other similar protocols inflicts considerable delay, they require the exchange of multiple messages, and the use of public key encryption requires heavy computation. Multipath Approach for Secure Data Collection Mao (2005), defined that wireless sensor networks are systems that comprise large numbers of wirelessly connected heterogeneous sensor nodes that are spatially distributed across a large field of interest. However, the nature of wireless sensor networks makes them very vulnerable to an adversarys malicious attacks. An adversary can physically compromise a subset of sensor nodes in a wireless sensor NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

network to eavesdrop information. The compromised nodes become black holes in the wireless sensor networks. Due to the unattended nature of wireless sensor network, adversaries can easily produce such black holes. Therefore, network security is an important issue to wireless sensor networks. Generally speaking, network security techniques are grouped into two categories prevention based techniques and detection based techniques. When an intrusion takes place, prevention based techniques are often the first line of defense against attacks, while detection based techniques aim at identifying and excluding the attacker after the fail of prevention based techniques. Detection based techniques can be divided into two categories, misuse detection and anomaly detection. Misuse detection techniques match patterns of well known attack profiles with the current changes, whereas anomaly detection uses established normal profiles and detects unusual deviations from the normal behavior as anomalies. Multipath routing allows the establishment of multiple paths between a single source and single destination node. Multipath Routing in Adhoc Wireless Network Roy et al. (2003), verified that multipath routing protocols are distinguished from single path routing by the fact that they look for and use several routes from a source to destination. Several routing schemes have been proposed in the context of mobile adhoc networks that uses multiple paths simultaneously by splitting the information among the multitude of paths. The routing schemes for adhoc networks usually employ single path routing. Multipath routing scheme employs a set of paths from source to destination so that total volume of traffic may be divided and communicated via selected multiple paths which would perform load balancing and eventually reduce congestion and end to end delay. Multipath routing also diminishes the effects of unreliable wireless links in the constantly changing topology of adhoc NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

networks to a large extent. Route coupling, caused by the interference during the simultaneous communication through multiple paths between a pair of source and destination, severely limits the performance gained by multipath routing. Using node disjoint multiple paths to avoid coupling is not at all sufficient to improve the routing performance in this context. End to end delay does not depend only on the congestion characteristics of the nodes,pattern of communication in the neighborhood region also contributes to this delay. This phenomenon is called route coupling. Route coupling may be reduced to a great extent if zone disjoint or even partially zone disjoint paths are used for data communication. New Directions in Cryptography Diffie and Hellman (2004), examined two kinds of contemporary developments in cryptographic communications over an insecure channel order to use cryptography. Widening applications of teleprocess cryptography to insure privacy, however, it currently necessary for the security, given rise to a need for new types of cryptographic communicating parties to share a key which is known to no systems, which minimize the need for secure key distribution one else. In public key cryptosystem the design limitations of mechanical computing and brought enciphering and deciphering are governed by distinct keys, E the cost of high grade cryptographic devices down to where and D, such that computing D from E is computationally infeasible, they can be used in commercial applications. In turn, such applications E can thus be publicly disclosed without compromising the applications to create a need for new types of cryptographic systems deciphering key D. Each user of the network can, therefore, which minimize the necessity of secure key distribution can place enciphering key in a public directory. Cryptography is the study of mathematical systems involving two kinds of security problems, privacy and

NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

authentication. Adhoc wireless networks are envisioned as infrastructure less networks where each node is a mobile router, equipped with a wireless transceiver. A privacy system prevents the extraction information by unauthorized parties from messages transmitted over a public channel, thus assuring the sender of a message that it is being read only by the intended recipient. A cryptographic system is a single parameter family such a way that a small change in the input block produces a major change in the resulting output. A cryptographic system is a single parameter family such a way that a small change in the input block produces a major change in the resulting output. In authentication systems, cryptography is used to guarantee the authenticity of the message to the receiver. The goal in designing the cryptosystem is to guarantee the authenticity of a message. Adhoc Network Security Singh et al. (2005) documented that adhoc networks are a new paradigm of wireless communication for mobile hosts where node mobility causes frequent changes in topology. Adhoc networks are self configurable and autonomous systems consisting of routers and hosts, which are able to support movablity and organize themselves arbitrarily. This means that the topology of the adhoc network changes dynamically and unpredictably. Moreover, the adhoc network can be either constructed or destructed quickly and autonomously without any administrative server or infrastructure. Without support from the fixed infrastructure, it is undoubtedly arduous for people to distinguish the insider and outsider of the wireless network. Routing in mobile adhoc networks faces additional problems and challenge when compared to routing in traditional wired networks with fixed infrastructure. There are several well known protocols in the literature that have been specifically developed to cope with the limitations imposed by adhoc networking environments. Most of the

NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

existing routing protocols follow two different design approaches to confront the inherent characteristics of adhoc networks, the table driven and the source initiated on demand approaches. Adhoc network is a group of wireless mobile computers, in which nodes cooperate by forwarding packets for each other to allow them to communicate. Issues and Challenges in Multipath Routing Mueller et al. (2001), suggested that mobile adhoc networks consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station or a wired backbone network. Adhoc networks are a new paradigm of wireless communication for mobile hosts where node mobility causes frequent changes in topology. Adhoc networks are self configurable and autonomous systems consisting of routers and hosts, which are able to support movablity and organize themselves arbitrarily. Mobile adhoc networks have potential use in a wide variety of disparate situations. Such situations include moving battlefield communications to disposable sensors which are dropped from high altitudes and dispersed on the ground for hazardous materials detection. In mobile adhoc networks communication between nodes is done through the wireless medium. Because nodes are mobile and may join or leave the networks have a dynamic topology. Nodes that are in transmission range of each other are called neighbors. Neighbors can send directly to each other. However, when a node needs to send data to another non neighboring node, the data is routed through a sequence of multiple hops, with intermediate nodes acting as routers. There are numerous issues to consider when deploying Mobile adhoc networks. In unpredictability of environment adhoc networks may be deployed in unknown terrains, hazardous conditions, and even hostile environments where tampering or the actual destruction

NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

10

of a node may be imminent. Depending on the environment, node failures may occur frequently. Unreliability of wireless medium is communication through the wireless medium is unreliable and subject to errors. Also, due to varying environmental conditions such as high levels of electromagnetic interference (EMI) or inclement weather, the quality of the wireless link may be unpredictable. Cluster Based Multipath Routing Zhang et al. (2006), revealed that multipath routing can be classified in two three types according to the purpose of the multi paths. The first one is to get a back up path for emergency. The back up path is set up simultaneously as the main path is down, the source node uses the back up path. In multi hop wireless networks,channel utilization becomes 1/3 or 1/4 of channels capacity at best due to the real request to send or clear to send interference between neighboring nodes. Clustering is usually used to route discovery by structuring the overall network nodes hierarchically. Clusters are setup at start time and maintained periodically or dynamically. Routing is performed at the cluster level, while path setup inside the cluster is done by the cluster maintenance mechanism. The cluster radius is usually set to be two or three hops. In cluster based networking, a cluster network usually contains two types of links. Intra cluster link to connect nodes in a cluster and inter cluster link to connect clusters. When a cluster is created, a head node is chosen for administration of the cluster. The head node will work as a base station in his cluster to control channel access, perform power measurements, and guarantee bandwidth for real time traffic. Each member node in a cluster is assigned a node identity and a cluster ident. Cluster based multi path routing combines cluster based routing and multi path routing efficiently. This shows significance of multi path routing. Clustering is usually used to route discovery by structuring the overall network nodes

NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

11

Secure Routing for Mobile Adhoc Networks Papadimitratos and Haas (2002), verified that the emergence of adhoc networks technology advocates self organized wireless inter connection of communication devices that would either extend or operate in concrete with the wired networking infrastructure or, possibly, evolve to autonomous networks. Adhoc wireless networks networks are envisioned as infrastructure less networks where each node is a mobile router, equipped with a wireless transceiver. Mobile adhoc consist of a collection of wireless mobile nodes which dynamically exchange data among themselves without the reliance on a fixed base station or a wired backbone network. In either case, the proliferation of mobile adhoc networks based applications depends on a multitude of factors, with trustworthiness being one of the primary challenges to be met. Despite the existence of well known security mechanisms, additional vulnerabilities and features pertinent to this new networking paradigm might render such traditional solutions inapplicable. The provision of security services in the mobile ad hoc networks context faces a set of challenges specific to this new technology. The insecurity of the wireless links, energy constraints, relatively poor physical protection of nodes in a hostile environment, and the vulnerability of statically configured security schemes has been identified.

NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

12

3. SYSTEM ANALYSIS
Existing System: The use of jamming-resistant communication protocols such as direct sequence spread spectrum (DSSS) or frequency hopping spread spectrum (FHSS), introduce pseudo randomness into the access schedule by keeping the spreading or hopping sequences, respectively, unknown to the adversary. Alternative anti jamming techniques include the use of random channel surfing to randomly hop away from jammed channels and resynchronize on available channels and the use of wormholes to create a channel for reports or alarms from a jammed region. The above mentioned anti jamming techniques consider jamming attacks by an external adversary and are not intended to mitigate jamming by valid network insiders. The use of dedicated communication channels to transmit data control traffic introduces a single point of failure for a denial of service attack, in that an adversary may be able to jam control channel traffic and prevent relevant data traffic. Hence, it is of interest to design control channel access schemes which are resilient to jamming. The problem of providing resilient control channel access under jamming to that of secure communication channel establishment is mapped. The use of random key distribution to hide the location of control channels in time and/or frequency is proposed and the performance metrics of resilience to control channel jamming, identification of compromised users, and delay due to jamming as a function of the number of compromised users is evaluated. Proposed System: This proposes a framework for control channel access schemes using the random assignment of cryptographic keys to hide the location of control channels and also NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

13

evaluate metrics to quantify the probabilistic availability of service under control channel jamming by malicious or compromised users and show that the availability of service degrades gracefully as the number of colluding insiders or compromised users increases. An algorithm called GUIDE for the identification of compromised users in the system based on the set of control channels that are jammed is also proposed. This evaluates the estimation error using the GUIDE algorithm in terms of the false alarm and miss rates in the identification problem. The trade-offs that exist between robustness to control channel jamming and resource expenditure which result from the use of random key assignment protocols, serving as a foundation for the design of control channel access schemes. In many systems, dedicated channels are established for the exchange of control messages. These control channels can be used for a wide variety of functions, from topological information propagation for network routing to access control in subscription services. Overview of Modules: For the easy understandability and easiness the system is bring divided into many modules and further process is carried on these modules. Module wise refinement is much easier than that of unique processing. Here the system is divided into five modules and they are network module, channel access module, control message access module, control channel jamming module, node capture attack module.

NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

14

4. SYSTEM DEVELOPMENT
Software Specification: The only language in which the project can be implemented is by java. Java sockets is responsible for this. Wincap is the tool used exclusively for catching the packets at the receiver terminal. The project needs a database for storing different values, sql is used as the database, thus SQL(structured query language) serves as back end. The platform for the project was java ,thus the front end for the project is java and net beans is the integrated development environment used. Net beans helps to do programming in java more easily. Even though linux can be used, windows was used as the operating system. It is due to its wide popularity. Hardware Specification: Inter domain packet filter is used within the hardware for filtering the packets received by the destination router. This packet filter is used to check the conditions for rejecting the packets. Since the hardware required specially for the implementation is an ethernet, the project can be run on anywhere. Pentium IV processor was used for the development of the system. Since the Pentium series is effective in networking, its being chosen. A 512 MB (mega byte) main memory is the working memory which decides the speed of the system and 40GB (gega byte) hard disk serves the requirement of the system. A HDD (hard disk drive) is a nonvolatile storage device which stores digitally encoded data on rapidly rotating platters with magnetic surfaces. Hard disk is used for storing data. Early HDDs had removable media, however, an HDD today is typically a sealed unit (except for a filtered vent hole to equalize air pressure) with fixed Media. They read the data back by detecting the magnetization of the material. An intel chipset is used as the mother board of the system. NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING Java:

15

As most current java developers know, the java application programming interface consists of pre developed code that you can use in your applications. This pre developed code is organized into packages filled with useful classes and methods designed to make it easy to program with java. The core package for the java programming language is called java.lang. Although the java.lang package provides the core functionality of the java programming language, it is not the only package included in the official java developer's kit (JDK) from java soft. The official developer's kit includes eight basic packages java.applet, java.awt, java.awt.image, java.awt.peer, java.io, java.lang, java.net and java.util. The JDK also includes an add on package called sun.tools.debug. Together the basic and add on packages provide everything you need to create and debug advanced java applications. The application program interface (API) in the developer's kit is only the beginning for java APIs. Currently, there are eight other APIs in development by java Soft. The java programming language is unusual in that a program is both compiled and interpreted. The working of java is shown in Figure.1.

Figure.1.Working of Java With the compiler, first translate a program into an intermediate language called java byte codes the platform independent codes interpreted by the interpreter on the java

NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

16

platform. The interpreter parses and runs each java byte code instruction on the computer. Compilation happens just once interpretation occurs each time the program is executed. Once can think of java byte codes as the machine code instructions for the java Virtual Machine (JVM). Every java interpreter, whether its a development tool or a Web browser that can run applets, is an implementation of the JVM. Java byte codes help make write once, run anywhere possible. It can compile program into byte codes on any platform that has a java compiler. The byte codes can then be run on any implementation of the JVM. Java Platform: A platform is the hardware or software environment in which a program runs. The java platform differs from most other platforms in that it is a software only platform that runs on top of other hardware based platforms. The java platform has two components, java virtual machine (JVM) and the java application programming interface (JAPI). The JAPI is a large collection of readymade software components that provide many useful capabilities, such as graphical user interface (GUI) widgets. The JAPI is grouped into libraries of related classes and interfaces, these libraries are known as packages. The JAPI and the virtual machine insulate the program from the hardware. As a platform independent environment, the java platform can be a bit slower than native code. The java platform is shown in Figure.2.

NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING Figure.2.Java Platform Swing :

17

Swing components facilitate efficient graphical user interface (GUI) development. These components are a collection of lightweight visual components. Swing components contain a replacement for the heavyweight components as well as complex user interface components such as trees and tables. Swing components contain a pluggable look and feel (PL & F). This allows all applications to run with the native look and feel on different platforms. PL & F allows applications to have the same behavior on various platforms. Swing components do not contain peers. Swing components allow mixing heavyweight and swing lightweight components in an application. The major difference between lightweight and heavyweight components is that lightweight components can have transparent pixels while heavyweight components are always opaque. Lightweight components can be non rectangular while heavyweight components are always rectangular. Swing components are javabeans compliant. This allows components to be used easily in a bean aware application building program. The root of the majority of the swing hierarchy is the java component class. The swing component toolkit consists of over 250 pure java classes and 75 interfaces contained in about 10 packages. They are used to build lightweight user interfaces. Swing consists of user interface (UI) classes and non user interface classes. The non user interface classes provide services and other operations for the UI classes. Swing offers a number of advantages, which include wide variety of components, pluggable look and feel, special architecture, keystroke handling, action objects, nested containers, virtual desktops, compound borders, customized dialogues, standard dialog classes, structured table and tree

NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

18

components. Powerful text manipulation and generic undo capabilities accessibility support. These features make the swings to be used extremely in GUI development. Open Database Connectivity: Microsoft open database connectivity (ODBC) is a standard programming interface for application developers and database systems providers. Before ODBC became a de facto standard for windows programs to interface with database systems, programmers had to use proprietary languages for each database they wanted to connect to. Now, ODBC has made the choice of the database system almost irrelevant from a coding perspective, which is as it should be. Application developers have much more important things to worry about than the syntax that is needed to port their program from one database to another when business needs suddenly change. Through the ODBC administrator in control panel, you can specify the particular database that is associated with a data source that an ODBC application program is written to use. Think of an ODBC data source as a door with a name on it. Each door will lead you to a particular database. For example, the data source named sales figures might be a server database, whereas the accounts payable data source could refer to an access database. The physical database referred to by a data source can reside anywhere on the local area network. Java Database Connectivity: In an effort to set an independent database standard application program interface for java, sun microsystems developed java database connectivity (JDBC). JDBC offers a generic database access mechanism that provides a consistent interface to a variety of data base management systems. This consistent interface is achieved through the use of plug-in database connectivity modules, or drivers. If a database vendor wishes to NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

19

have JDBC support, he or she must provide the driver for each platform that the database and Java run on. To gain a wider acceptance of JDBC, Sun based JDBCs framework on open database connectivity (ODBC). ODBC has widespread support on a variety of platforms. Basing JDBC on ODBC will allow vendors to bring JDBC drivers to market much faster than developing a completely new connectivity solution. Microsoft Structured Query Language Server: Microsoft structured query language (SQL) server is a relational model database server produced by microsoft. Protocol layer implements the external interface to SQL server. All operations that can be invoked on SQL server are communicated to it via a microsoft defined format called tabular data stream (TDS). Since the memory held by garbage is not of any consequence, it is considered free space. TDS is an application layer protocol, used to transfer data between a database server and a client. Initially designed and developed by sybase inc for their sybase SQL server relational database engine in 1984, and later by microsoft in microsoft SQL server, TDS packets can be encased in other physical transport dependent protocols, including transmission control protocols, named pipes and shared memory. Consequently, access to SQL server is available over these protocols. In addition, the SQL server application program interface is also exposed over band web services. The data in the database are stored in primary data files with an extension .mdf. Secondary data files, identified with an .ndf extension, are used to store optional metadata. Log files are identified with the .ldf extension. Storage space allocated to a database is divided into sequentially numbered pages. Thus the SQL is the programming language that defines and manipulates the database. SQL databases are relational databases, this means simply the data is store in a set of simple relations. A NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

20

database can have one or more table. One can define and manipulate data in a table with SQL commands. The data definition language (DDL) commands are used here for creating and altering databases and tables.

5. PROJECT IMPLEMENTATION
General: The system is divided into five modules and they are network module, channel access module, control message access module, control channel jamming module, node capture attack module. Client-server computing or networking is a distributed application architecture that partitions tasks or workloads between service providers (servers) and service requesters, called clients. Often clients and servers operate over a computer network on separate hardware. A server machine is a high-performance host that is running one or more server programs which share its resources with clients. A client also shares any of its resources; Clients therefore initiate communication sessions with servers which await (listen to) incoming requests. Designing control channel access schemes which allow for efficient reception of control messages while maintaining a degree of independence between the hopping sequences held by different users. In this work, we focus our attention on designing schemes which are robust to control channel jamming attacks by malicious colluding insiders or compromised user. A correspondence between the problems of key establishment and control channel access in wireless networks and develop a framework for control channel access schemes providing probabilistic availability of control messages using random key assignment is proposed. A metrics of resilience and delay to quantify the probabilistic availability of service and the quality of provided service, respectively, under control channel jamming attacks is verified here. Channel access protocol can perform a DoS attack against individual users or

NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

21

local neighborhoods in the mobile network by jamming the communication channels. Moreover, if the access protocol uses a fixed predetermined schedule for data and control messages, allowing the adversary to distinguish between channels for data and control messages, a control channel jamming attack focusing only on the control channels can be mounted with energy savings of several orders of magnitude less than that required to jam all communication channels. The bipartite graph G thus provides a one-to-one correspondence between control channel access schemes and symmetric key assignment schemes. Key assignment solutions that provide secure communication which is robust to node capture attacks can be used to design control channel access schemes which are resilient to control channel jamming attacks by hackers.

NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

22

Client A Client B

Server Monitoring the Traffic

Client C Guide Algorithm Node Capture Attack Data communication Processing

Module Testing:

Figure.3.Module Diagram

Test cases are solely based on the requirement of the specification of the program or modules and the internal content of the module or the program is not considered for the selection of the test cases. While testing the modules, the individual modules are tested. The module testing involves the following tasks: preparation of module test cases, perform testing of modules using applicable module test case, test cases are executed as

NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

23

per test plan and module test case document and the test results are recorded, all observed errors are logged, corrected and verified, test is repeated if code is changed. In this the test cases are generated on the logic of each module by drawing flow graphs of that module and logical decisions are tested on all the cases. It has been used to generate the test cases in the following cases: guarantee that all independent paths have been executed, execute all logical decisions on their true and false sides execute all loops at their boundaries and within their operational bounds. It has been made sure that the interfaces of all the modules to make sure that the modules behave properly when integrated together. The different modules can exist as single functional units and can perform their functions individually without depending other modules. Together they effectively serve the system. Server Window: This is the main page of the system. This window mainly consists up of a received file and message section, a key providing section and an intruder section. The received file and message section provide the details about the messages and files that are received. In the key section we will be able to provide our secret code that is used for transmission. This will be in encrypted form at the time of transmission. Intruder details consist up of the time, the client from which the hacking is done and the corresponding time. These are the various components available in Server window. The Figure.3. shows Server window.

NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

24

Figure.4.Server Window Channel Window: In the channel window the different channels by which the data will be sent is provided. During the time of transmission the channels are particularly traversed according to the port number and the data will be sent accordingly. They are named alphabetically so that the traversed path can be known easily. Every client traverses in a different way by which the pathway is being kept unique which adds the security. Figure .4. shows the Channel window.

NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

25

Figure.5.Channel Window Client Window: Based upon the number of clients that are registered to the server there may be any number of clients. They are named client A, client B and so on. The Client window consists up of an option to register the client, an area to provide spreading sequence number and a text box which displays the data. There will also be a pictorial representation of spreading sequence. This shows the how effectively the data is transferred.Figure.5 shows the Client window. NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

26

Figure.6.Client Window Registering the Clients: Every client has to be registered to the server. On the time of registration a code will be generated. This code will be unique to each client and not accessible once its generated. That provides the link between the server and the clients. This code which is generated during the time of registration serves as the client identification number. The key is otherwise called as spreading value. This spreading value is the main concept of the project. Clients should provide special care in keeping the identification number secret. Figure.6 shows the window for registering the clients.

NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

27

Figure.7.Registering the Clients Verifying Spreading Value: When the client passes a data to the server the server first checks the spreading value provided by the user. It will then verify it with that of the one registered. If both of the spreading value is same it will grant access if else it wont. This is the main step of the safety verification step. If the user is an intruder he wont be able to know the spreading vale as it is provide by the clients. Another safety measure is also been provided at the database level. Thus the spreading value cant be accessed by the intruder. Figure.7. shows the verification of the clients and determining whether access should be provided or not NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

28

Figure 8.Verifying Spreading Value Transmitting Data: After verifying spreading value the server encrypts the value into an unknown format and then transmitted. This process is called as encryption. Different types of encryption methods available. This is done through the channel. Thus the channel serves as an interface between the clients and the server. In the transmission window all the channels will be displayed and the data passage is also made available. Hence shows the pathway by which the data is traversed. Figure.8. shows the transmitting data window NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

29

Figure.9.Transmitting Window After the transmitting section the transferred data will be accepted by the server. Thus only from trusted registered clients the server would be able to accept the data. Those users who are trying to gain access through hacked sequence wont be able to gain access and they are marked as intruders. The encrypted transmission of data increases the security purpose of the system. The compromised user can be easily found out. NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

30

CONCLUSION
The project was done keeping in mind the fact that it should follow all the steps of the software engineering process and covers the complete software development in life cycle. The user interface provided by this project is widely accepted by the users in general. All documents associated with the development of the system have been included in this report. The mitigation of control channel jamming by malicious colluding insiders and compromised system users as well as the identification of compromised users without prior knowledge of the number of compromised users in the system is addressed. The problem of control channel access that is robust to jamming by compromised users to the problem of secure key establishment under node capture attacks is mapped. Based on the mapping, a framework for control channel access schemes using random key assignment is proposed. An analytical approximation to evaluate the false alarm and miss rates in the identification of compromised users resulting from the GUIDE algorithms is provided. The design trade-offs in the key assignment parameters and the identification interval used by the TA is discussed. The future and latest technology can also be implemented and the system could be enhanced. At the end of this project, it is known that it is just started. There are many things to improve. From this strong base, we can make more improvements easily. This may increase the number of modules of the present system. Software is very flexible to make improvements. The software has been designed at the maximum possible excellence. Still the field of software is prone to many updations every now and then. Here, some enhancements can be added so that the software may be delivered at its best. The updated versions can also decrease the execution time. If the number of modules increases, the efficiency of the present system also increases. Hence they can be incorporated to the project as it is found out to make the system more effective NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING REFERENCES

31

1. Anderson, R., (2001). Security Engineering: A Guide to Building Dependable Distributed Systems, John Wiley & Sons, Inc.,New York.,pp.500-512 2. Asoke,K.G., (2003). Advanced Programming in Java, Prentice Hall of India Private Limited M-97, Connaught Circus, New Delhi-110001,pp.210-215 3. Balaguruswamy, E., (2006). Programming With Java, Tata McGraw-Hill Publishing Company Limited, New Delhi.pp.1058-1070 4. Behrouz, F., (2004). Data Communications and Networking, 3rd edition, Tata McGraw- Hill Publications Limited, New Delhi,pp.582-589 5. David,H and H.N. Nagaraja., (2003). Order Statistics, Third edition, John Wiley & Sons, Inc, 6. Fazel, K and S. Kaiser., (2003). Multi-Carrier and Spread Spectrum Systems, John Wiley & Sons, New York. 7. Feller,W., (1957). An Introduction to Probability Theory and Its Applications,vol. 1. John Wiley & Sons, Inc. 8. Naughton, P., (2002). Java 2 The Complete Reference, Tata McGraw Hill Publications Limited, New Delhi-110008. 9. Rappaport,T., (2001). Wireless Communications: Principles and Practice, Prentice Hall, Second Edition. 10. Tague, P and Poovendran.,(2009). IEEE Transactions on Mobile Computing, vol. 8, no. 9, IEEE.

NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

MITIGATING CHANNEL JAMMING

32

NEHRU COLLEGE OF ENGINEERING AND RESEARCH CENTRE

Você também pode gostar