1 / 1

Hacker Detection: Jamming a WSN Nabila Rahman Matthew Wright John Davis Eric Manuel

Hacker Detection: Jamming a WSN Nabila Rahman Matthew Wright John Davis Eric Manuel nabila.rahman@mavs.uta.edu mwright@cse.uta.edu johndeana@aol.com manuel.eric@gmail.com. Teacher Introduction :

annalise
Download Presentation

Hacker Detection: Jamming a WSN Nabila Rahman Matthew Wright John Davis Eric Manuel

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Hacker Detection: Jamming a WSN Nabila Rahman Matthew Wright John Davis Eric Manuel nabila.rahman@mavs.uta.edumwright@cse.uta.edujohndeana@aol.commanuel.eric@gmail.com Teacher Introduction: Eric Manuel teaches at Duncanville High School in Duncanville, Texas. Computer Maintenance, Telecommunications and Cabling, Electronics, and Advanced Electronics. In his 5th year of teaching, his classes consist mostly of sophomores through seniors. This is the second year of his participation in the RET program. • Project Background • Wireless Sensor Network: • Can be used for detecting intruders in a secured area • Jamming Characteristics: • Deliberate transmission of signals to disrupt communications • Known issues: • Early detection of jamming the desired regions Experimentation – WSN performed indoors under a 49 count network. Summer weather conditions made outdoor experimentation difficult due to the standing water and humidity. • Research • Utilizing the motes,the team was able to effectively conduct 2 complete indoor experiments. The resulting data was generated based on simulation programs written by Nabila using TinyOS 2.0 and run by John and myself. From these trials, the following data could be viewed. • How many neighbors were viewed to be active during jamming period. Precision of data packets reaching their destination • How many nodes jammed per session. Percentage of packets being recalled. Simulation Results Conclusion: Modifications for lesson plan The data was able to verify that while jamming the nodes, the neighbors were grouped in an amorphous shape. The jamming was effective for at least 2 neighbors away from the jammer. From this result, the jammer could cover an effective area for a short period of time. The sensors were sensitive to high levels of humidity and made outdoor experimentation difficult during wet weather. From the research this summer, I have been able to modify my lesson plan over physical security to include wireless sensors and their ability to detect activity. The physical security was a basic overview of what an IT group needs to safeguard the hardware for their users. The research allows me to include wireless sensors to demonstrate the susceptibility of a secure wireless network. Department of Computer Science and Engineering The University of Texas at Arlington

More Related