www.seminarsonly.com

 

 

Mitigation of Control Channel Jamming

 

Abstract

Availability of service in many wireless networks depends on the ability for network users to establish and maintain communication channels using control messages from base stations and other users. An adversary with knowledge of the underlying communication protocol can mount an efficient denial of service attack by jamming the communication channels used to exchange control messages. The use of spread spectrum techniques can deter an external adversary from such control channel jamming attacks. However, malicious colluding insiders or an adversary who captures or compromises system users is not deterred by spread spectrum, as they know the required spreading sequences

Proposed System:

We propose a framework for control channel access schemes using the random assignment of cryptographic keys to hide the location of control channels. We propose and evaluate metrics to quantify the probabilistic availability of service under control channel jamming by malicious or compromised users and show that the availability of service degrades gracefully as the number of colluding insiders or compromised users increases. We propose an algorithm called GUIDE for the identification of compromised users in the system based on the set of control channels that are jammed. We evaluate the estimation error using the GUIDE algorithm in terms of the false alarm and miss rates in the identification problem. We discuss various design trade-offs between robustness to control channel jamming and resource expenditure

Hardware Requirements :
  • System : Pentium IV 2.4 GHz.
  • Hard Disk : 40 GB.
  • Floppy Drive : 1.44 Mb.
  • Monitor : 15 VGA Colour.
  • Mouse : Logitech.
  • Ram : 256 Mb

Software Requirements :

  • Operating system : - Windows XP Professional.
  • Coding Language : - Java.
  • Tool Used : - Eclipse

 

 

 

 

<< back

Related Projects : File Security System ,M-banking ,Flaw Tracking System ,Fleet Manager ,Friend Mapper on Mobiles ,Global Tracker ,Good Welfare Services ,Health Maintenance System ,Image Compression and De-compression ,Image Processing Editor ,Improving Utilization Of Infrastructure Clouds , Information Content-Based Sensor Selection ,Information Portal ,Insurance Broker System ,Learning Made Easy , Light-Weight Multi-Document Summarization Based On Two-Pass Re Ranking ,Load Shedding In Mobile Systems With Mobiqual ,M-banking ,MACA ,Mailing Portal ,Mail Client ,Marine Operations And Management System ,Medical Image Compression ,Millennium Planning ,Mindtech Bug And Component Systems ,Minimum Bandwidth Reservations For Periodic Streams In Wireless Real Time Systems ,Mitigation of Control Channel Jamming ,Mobi-Thesaurus ,Mobile Advertisement System ,Mobile Banking System

 
Copyright © V2computers 2006 through 2017