Hacker Detection: Jamming a WSN

Slides:



Advertisements
Similar presentations
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network,
Advertisements

Chapter 4 Computer Networks
A Security Protocol for Sensor Networks Khadija Stewart, Themistoklis Haniotakis and Spyros Tragoudas Dept. of Electrical and Computer Engineering Southern.
An Energy-Efficient Communication Scheme in Wireless Cable Sensor Networks Xiao Chen Neil C. Rowe epartment of Computer Science Department of Computer Science.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Steven Koelmeyer BDS(hons)1 Reconfigurable Hardware for use in Ad Hoc Sensor Networks Supervisors Charles Greif Nandita Bhattacharjee.
Globecom 2004 Energy-Efficient Self-Organization for Wireless Sensor Networks: A Fully Distributed approach Liang Zhao, Xiang Hong, Qilian Liang Department.
Urban Sensing Jonathan Yang UCLA CS194 Fall 2007 Jonathan Yang UCLA CS194 Fall 2007.
Agents, Mobility, Ubiquity & Virtuality Gregory O’Hare Department of Computer Science, University College Dublin Mobile Agents & Wireless Sensor Networks.
WISENET Wireless Sensor Network Project Team: J. Dunne D. Patnode Advisors: Dr. Malinowski Dr. Schertz.
Chapter 1: Overview Lecturer: Alias Mohd Telecommunications Department Faculty of Electrical Engineering UTM SET 4573: Data Communication and Switching.
1 BANAID: A Sensor Network Test-Bed for Wormhole Attack Hani Alzaid Suhail AbanmiSalil KanhereChun Tung Chou BANAID.
Jamming and Anti-Jamming in IEEE based WLANs Ravi Teja C 4/9/2009 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.:
Secure Localization Algorithms for Wireless Sensor Networks proposed by A. Boukerche, H. Oliveira, E. Nakamura, and A. Loureiro (2008) Maria Berenice Carrasco.
LPT for Data Aggregation in Wireless Sensor Networks Marc Lee and Vincent W.S. Wong Department of Electrical and Computer Engineering, University of British.
ANTHONY D.WOOD, A STANKOVIC & SANG H.SON UNIVERSITY OF VIRGINIA BY, SRIKANTH POKALA JAM: A Jammed-Area Mapping Service For Sensor Networks.
Power Save Mechanisms for Multi-Hop Wireless Networks Matthew J. Miller and Nitin H. Vaidya University of Illinois at Urbana-Champaign BROADNETS October.
Rapid Development and Flexible Deployment of Adaptive Wireless Sensor Network Applications Chien-Liang Fok, Gruia-Catalin Roman, Chenyang Lu
Telemedicine Foundations of Technology Telemedicine © 2013 International Technology and Engineering Educators Association STEM  Center for Teaching and.
RID: Radio Interference Detection in Wireless Sensor Networks Gang Zhou, Tian He, John A. Stankovic, Tarek Abdelzaher Department of Computer Sceince University.
Computer Networks. Why Create Networks? Communication Communication technologies such as , sms, video-conference can be used Makes communication.
1 Virtual Patrol : A New Power Conservation Design for Surveillance Using Sensor Networks Prasant Mohapatra, Chao Gui Computer Science Dept. Univ. California,
Implementation of Collection Tree Protocol in QualNet
Probabilistic Coverage in Wireless Sensor Networks Authors : Nadeem Ahmed, Salil S. Kanhere, Sanjay Jha Presenter : Hyeon, Seung-Il.
College of Engineering Anchor Nodes Placement for Effective Passive Localization Karthikeyan Pasupathy Major Advisor: Dr. Robert Akl Department of Computer.
1 Probabilistic Coverage in Wireless Sensor Networks Nadeem Ahmed, Salil S. Kanhere and Sanjay Jha Computer Science and Engineering, University of New.
Computer Science 1 TinySeRSync: Secure and Resilient Time Synchronization in Wireless Sensor Networks Speaker: Sangwon Hyun Acknowledgement: Slides were.
Senior Project Adam Champagne. Team (co)Captain of FIRST Robotics Team 3323.
Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Computer.
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
EM-MAC: A Dynamic Multichannel Energy-Efficient MAC Protocol for Wireless Sensor Networks ACM MobiHoc 2011 (Best Paper Award) Lei Tang 1, Yanjun Sun 2,
Rajani Muraleedharan and Lisa Ann Osadciw By: Mai Ali Sayed Ahmed.
Outline Introduction Network model Two-phase algorithm Simulation
Reliable Navigation of Mobile Sensors in Wireless Sensor Networks without Localization Service Qingjun Xiao, Bin Xiao, Jiaqing Luo and Guobin Liu Department.
I-Hsin Liu1 Event-to-Sink Directed Clustering in Wireless Sensor Networks Alper Bereketli and Ozgur B. Akan Department of Electrical and Electronics Engineering.
Cooperative Location-Sensing for Wireless Networks Charalampos Fretzagias and Maria Papadopouli Department of Computer Science University of North Carolina.
Experimental Ranging With Mica2 Motes M. Allen, E. Gaura, R. Newman, S. Mount Cogent Computing, Coventry University The experimental work here makes use.
1 Along & across algorithm for routing events and queries in wireless sensor networks Tat Wing Chim Department of Electrical and Electronic Engineering.
Securing Interconnect Networks By: Bryan Roberts.
1 CNT 3004 Computer Network Concept Cliff Zou School of Electrical Engineering and Computer Science University of Central Florida Summer 2012.
Wireless Sensor Network: A Promising Approach for Distributed Sensing Tasks.
Location Based Early Disaster Warning and Evacuation System on Mobile Phones Using OpenStreetMap Presented by Khandaker Mustakimur Rahman Roll No.:
Information Security and Privacy By: Mike Battestilli.
Understand Wireless Security LESSON Security Fundamentals.
Intro to Telecommunication The Wireless Network Project
Wireless Sensor Network for pipeline Leak Detection
MANAGEMENT AND METHODS OF MOBILE IP SECURITY
CRWSNP: correction with target nodes
Planning & System Installation
Ioana Apetroaei Ionuţ-Alexandru Oprea Bogdan-Eugen Proca
E 96 Introduction to Engineering Design Peter Reiher UCLA
Telemedicine: Issues in Mote Based Remote Patient Monitoring
Wireless Communication Project
On the Lifetime of Wireless Sensor Networks
By: Ziji Song Advisor: Prof. J. Spinelli
Introduction to Wireless Sensor Networks
WISENET Wireless Sensor Network
Framework for Approximate Data Collection in Wireless Sensor Networks- kuthadi and selvaraj
2003 RET Program Computer Science
Mrityunjai Tiwari, Sukumara T, Sasi SR Kumar /Presented to CIGRE Colloquium, Mysore, Adaptability of Wireless Sensor Network for Integrating.
Technical University of Cluj-Napoca
Wireless Sensor Network - course: Project to investigate requirements and applications using wireless sensor networks on a construction site Ykä Marjanen.
CNT 3004 Computer Network Concept
Developing a Community of Scholars and Teaching Modules for Water Resource Courses at KU, University of California, Davis, and the University of Alabama.
Wireless Sensor Networks and Internet of Things
Course Orientation Chaiporn Jaikaeo
Computer Networks Lesson 1.
Practical Network Computer Science IT&CS Third Class part Mohanad Ali
USN Introduction Computer Engineering Sejin Oh.
Presentation transcript:

Hacker Detection: Jamming a WSN Nabila Rahman Matthew Wright John Davis Eric Manuel nabila.rahman@mavs.uta.edu mwright@cse.uta.edu johndeana@aol.com manuel.eric@gmail.com Teacher Introduction: Eric Manuel teaches at Duncanville High School in Duncanville, Texas. Computer Maintenance, Telecommunications and Cabling, Electronics, and Advanced Electronics. In his 5th year of teaching, his classes consist mostly of sophomores through seniors. This is the second year of his participation in the RET program. Project Background Wireless Sensor Network: Can be used for detecting intruders in a secured area Jamming Characteristics: Deliberate transmission of signals to disrupt communications Known issues: Early detection of jamming the desired regions Experimentation – WSN performed indoors under a 49 count network. Summer weather conditions made outdoor experimentation difficult due to the standing water and humidity. Research Utilizing the motes, the team was able to effectively conduct 2 complete indoor experiments. The resulting data was generated based on simulation programs written by Nabila using TinyOS 2.0 and run by John and myself. From these trials, the following data could be viewed. How many neighbors were viewed to be active during jamming period. Precision of data packets reaching their destination How many nodes jammed per session. Percentage of packets being recalled. Simulation Results Conclusion: Modifications for lesson plan The data was able to verify that while jamming the nodes, the neighbors were grouped in an amorphous shape. The jamming was effective for at least 2 neighbors away from the jammer. From this result, the jammer could cover an effective area for a short period of time. The sensors were sensitive to high levels of humidity and made outdoor experimentation difficult during wet weather. From the research this summer, I have been able to modify my lesson plan over physical security to include wireless sensors and their ability to detect activity. The physical security was a basic overview of what an IT group needs to safeguard the hardware for their users. The research allows me to include wireless sensors to demonstrate the susceptibility of a secure wireless network. Department of Computer Science and Engineering The University of Texas at Arlington