7/29/2019 Madhav First Review
1/19
7/29/2019 Madhav First Review
2/19
The shared nature of the medium in wirelessnetworks makes it easy for an adversary tolaunch a Wireless Denial of Service (WDoS)attack.
Recent studies, demonstrate that suchattacks can be very easily accomplished usingoff-the shelf equipment.
To give a simple example, a malicious nodecan continually transmit a radio signal in
order to block any legitimate access to themedium and/or interfere with reception
7/29/2019 Madhav First Review
3/19
ABSTRACT(Continued):This act is called jamming and the maliciousnodes are referred to as jammers.Jamming techniques vary from simple ones
based on the continues transmission of
interference signals, to more sophisticatedattacks that aim at exploiting vulnerabilities ofthe particular protocol used.
A detailed up-to-date discussion on the
jamming attacks recorded in the literaturewill be discussed in this project.
7/29/2019 Madhav First Review
4/19
ABSTRACT(Continued):
This project also describe varioustechniques proposed for detecting the
presence of jammers.Finally, the project conclude with a
summary and by suggesting future
directions.
7/29/2019 Madhav First Review
5/19
SECURITY is one of the critical attributes ofany communication network. Various attackshave been reported over the last many years.
Most of them, however, target wired
networks. Wireless networks have onlyrecently been gaining widespreaddeployment.
At the present time, with the advances in
technology, wireless networks are becomingmore affordable and easier to build
7/29/2019 Madhav First Review
6/19
EXISTING SYSTEM(Continued)
Many metropolitan areas deploy public
WMANs for people to use freely.
Moreover, the prevalence of WLANs as
the basic edge access solution to the
Internet is rapidly becoming the reality.
However, wireless networks are
accompanied with an important security
flaw; they are much easier to attack than
any wired network
7/29/2019 Madhav First Review
7/19
This project describes some ofthe most harmful attacks that
can be launched by a jammer.We develop such one system,to show the effect of the dos
attack.
7/29/2019 Madhav First Review
8/19
PROPOSED SYSTEM (Continued)
In the project proposed system, the
normal client and server process is
initially depicted, then the attack is
launched manually to show how the
dos attack affect the normalclient/server process.
7/29/2019 Madhav First Review
9/19
At this moment of time the Location
Guard will find the abnormalbehavior of packets and filter the
packets that are related to jammers.
PROPOSED SYSTEM (Continued)
7/29/2019 Madhav First Review
10/19
The most common set of requirements definedby any operating system or softwareapplication is the physical computer resources,also known as hardware. The hardware
requirements required for this project are: 20 GB of Hard disk 256 MB RAM Pentium 133 MHZ or above (Processor)
PCs which are interconnected in LAN Network Adapter card configured with an IP
address
7/29/2019 Madhav First Review
11/19
Software Requirements deal withdefining software resourcerequirements and pre-requisites thatneed to be installed on a computer to
provide optimal functioning of anapplication. These requirements orpre-requisites are generally notincluded in the software installation
package and need to be installedseparately before the software isinstalled.
7/29/2019 Madhav First Review
12/19
SOFTWARE REQUIREMENTS (Continued)
The software requirements for thisproject are:Java 1.3 or later versionsWindows 98 or later versions
7/29/2019 Madhav First Review
13/19
Client Application DoS attack
File Server
Location Guard Normal Client
7/29/2019 Madhav First Review
14/19
Construct Rout
Find pathAdministrator
Filter packet
Recieve Packet
Send Packet
User
Use case Diagram of DoS Attack System
7/29/2019 Madhav First Review
15/19
NodeS
+msg: string+path: String
+Browse()+Possible Path()+Feasible Path()
+Send()+Receive()+discard()
Routing
+Nwid: integer+Cost: integer+path: String
+find NextHop()+findcost()+Construct Route()
UserInterface
+Attribute1
+InitializeComponent()+AddComponent()+jButton1_actionperformed()+jButton2_actionperformed()+jButton3_actionperformed()
+jButton4_actionperformed()+jButton5_actionperformed()+jcomboBox_actionPerformed()
NodeD
+msg: String+path:String
+Browse()+Possiblepath()+feasiblepath()
+send()+Receive()+discard()
UserInterface
+Attribute1
+InitializeComponent()+AddComponent()+jButton1_actionperformed()+jButton2_actionperformed()+jButton3_actionperformed()+jButton4_actionperformed()+jButton5_actionperformed()+jcomboBox_actionPerformed()
Routing
+Nwid: integer+Cost: integer+path: String
+find NextHop()+findcost()+Construct Route()
Class Diagram of Proposed Project
7/29/2019 Madhav First Review
16/19
NodeS NodeB NodeD
1 : Find Next Hop()
2 : Findcost()
3 : Constuct Route()
Sequence diagram for Constructing route
7/29/2019 Madhav First Review
17/19
: Administrator
NodeS NodeD
1 : Browse()
2 : Find Feasible path()
3 : Select packet()
4 : Send packet()
Sequence Diagram for Sending Packet
7/29/2019 Madhav First Review
18/19
: Administrator
NodeS NodeD
1 : Browse()
2 : Find Feasible Path()
3 : Sendpacket()
4 : Filter packet()
5 : Recieve packet()
6 : Packet Recived()
Sequence Diagram for successfully Reciving Packet
7/29/2019 Madhav First Review
19/19
Konstantinos Pelechrinis, Marios Iliofotou andSrikanth V. Krishnamurthy, Denial of ServiceAttacks in Wireless Networks: The Case of
Jammers, IEEE Communications Surveys &Tutorials, Vol. 13, No.2, Second Quarter2012.