Denial-of-Service Jammer Detector Training Course Worldsensing

Slides:



Advertisements
Similar presentations
Network security Dr.Andrew Yang.  A wireless sensor network is network a consisting of spatially distributed autonomous devices using sensors to cooperatively.
Advertisements

Tri-Band RF Transceivers for Dynamic Spectrum Access By Nishant Kumar and Yu-Dong Yao.
Antenna Booster. What is antenna booster? A device used to amplify the signal received (by ratio) by the antenna before feeding to the television receiver.
DIGITAL COMMUNICATIONS.  The modern world is dependent on digital communications.  Radio, television and telephone systems were essentially analog in.
Wireless LAN Technology
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
IE 419/519 Wireless Networks Lecture Notes #2 Wireless LAN Technology.
CCTV SYSTEMS WIRELESS BASED CCTV.
Communication and Ground Station 12 October 2008.
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
1 Summary of SDR Analog radio systems are being replaced by digital radio systems for various radio applications. SDR technology aims to take advantage.
 Defining the RF jamming system and showing the importance and need of using it in many places.  Giving a complete RF jamming system design based on.
SADARS An introduction to RF Spectrum Analysers With acknowledgements to Wikipedia.
Wireless Sensor Monitoring Group Members: Daniel Eke (COMPE) Brian Reilly (ECE) Steven Shih (ECE) Sponsored by:
Cullen College of Engineering RFID-Based Solutions for Piping Technology Piping Tech & UH July, 2007.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
White Space Internet Device By: Sean Iveson William Sadler.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
SWAN simulation A Simulation Study of Denial of Service Attacks on Wireless Ad-Hoc Networks Samuel C. Nelson, Class of 2006, Dept. of Computer Science,
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.
SYSTEM ADMINISTRATION Chapter 2 The OSI Model. The OSI Model was designed by the International Standards Organization (ISO) as a structural framework.
DEEJAM : Defeating Energy-Efficient Jamming in IEEE based Wireless Networks Paper Authors: Anthony D. Wood John A. Stankovic Gang Zhou Presented.
WIRELESS INTEGRATED NETWORK SENSORS
BORDER SECURITY USING WIRELESS INTEGRATED NETWORK SENSORS (WINS) By B.S.Indrani (07841A0406) Aurora’s Technological and Research Institute.
Computer Networks.  Which is the best definition of a circuit switched network?  An electric circuit where the connections get switched based on who.
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
By. Jadhav Avinash J Roll no - 2K13E11. Reference: Hewlett Packard Agilent Technology Wikipedia GwINSTEK.
 Abbreviation of fourth generation wireless technology  It will provide a comprehensive IP solution where voice, data and multimedia can be given to.
PROJECT DOMAIN : NETWORK SECURITY Project Members : M.Ananda Vadivelan & E.Kalaivanan Department of Computer Science.
By : Praveen Tiwari.  It is a malicious technique of tricking a web user into clicking on something different to what the user perceives they are clicking.
Stallings, Wireless Communications & Networks, Second Edition, © 2005 Pearson Education, Inc. All rights reserved Wireless LAN Technology.
IT-101 Section 001 Lecture #15 Introduction to Information Technology.
Artificial Intelligence In Power System Author Doshi Pratik H.Darakh Bharat P.
Software Defined Radio (SDR)
Personal Communication Services & WiFi
Chapter 2 PHYSICAL LAYER.
Seminar on 4G wireless technology
CompTIA Security+ Study Guide (SY0-401)
Latency and Communication Challenges in Automated Manufacturing
Chapter 19: Network Management
Outline Introduction Type of Multiplexing FDMA TDMA CDMA Future Work
Bandwidth Utilization (Multiplexing and Spectrum Spreading)
Border security using Wireless Integrated Network Sensors(WINS)
Integrated Energy and Spectrum Harvesting for 5G Wireless Communications submitted by –SUMITH.MS(1KI12CS089) Guided by – BANUSHRI.S(ASST.PROF,Dept.Of.CSE)
Wireless LANs Wireless proliferating rapidly.
Bandwidth Utilization
How SCADA Systems Work?.
Digital Communications
Ultra-Wideband - John Burnette -.
RAILWAY TRACK SNAP NOTIFICATION
Channel Allocation (MAC)
Internet of Things.
Video and Sensor Network Architecture and Displays
CompTIA Security+ Study Guide (SY0-401)
Network Basics Extended Learning Module E
Internet of Things Vulnerabilities
Cognitive Radio Networks
Tri-Band RF Jamming System
CIPSEC architecture CIPSEC workshop Frankfurt 16/10/2018
CIPSEC Framework components: XL-SIEM
Matteo Merialdo RHEA Group Innovative aspects in cyber range solutions.
Experiences from testing security solutions in the railway use-case
Wireless LAN Technology
Protocols.
Data Transmission And Digital Communication
Real Time Spectrum Sensing using SDR for RFI Analysis
Protocols.
Presentation transcript:

Enhancing Critical Infrastructure Protection with innovative SECurity framework Denial-of-Service Jammer Detector Training Course Worldsensing The research leading to these results has received funding from the European Union’s Horizon 2020 Research and Innovation Programme, under Grant Agreement no 700378.

Wireless everywhere Wireless networking plays an important role in achieving ubiquitous computing where network devices embedded in environments provide continuous connectivity and services, thus improving human’s quality of life. However, due to the exposed nature of wireless links, current wireless networks can be easily attacked by jamming technology. Jamming can cause Denial-of-Service (DoS) problem that may result in several other higher-layer security problems, although these are often not adequately addressed. © May 2018

Jamming Jamming makes use of intentional radio interferences to harm wireless communications by keeping communicating medium busy, causing a transmitter to back-off whenever it senses busy wireless medium, or corrupted signal received at receivers. Jamming mostly targets attacks at the physical layer but sometimes cross-layer attacks are possible too. © May 2018

The problem Jammers are malicious wireless nodes planted by an attacker to cause intentional interference in a wireless network. Depending upon the attack strategy, a jammer can either have the same or different capabilities from legitimate nodes in the network, which they are attacking. The jamming effect of a jammer depends on its radio transmitter power, location and influence on the network or the targeted node. © May 2018

Jamming techniques There are four main types of jamming signals: CONTINUOUS WAVE: RF sinusoidal narrowband signal with constant amplitude and constant frequency. FREQUENCY MODULATED: RF sinusoidal signal with constant amplitude and variable frequency that sweeps service band frequencies. © May 2018

Jamming techniques PULSED SIGNALS: Intermittent RF signal that has several harmonic components split in the entire service band. WIDEBAND: Transmits a band of frequencies that is large with respect to the bandwidth of a single emitter. © May 2018

Wireless bands in CI The following communication bands are frequently used in critical infrastructures: © May 2018

Jamming in practise Jammers can: Prevent your cell phone from operating, making it impossible to emit or receive calls or messages Prevent connections to the internet blocking digital payments and data transmission from a device Freezing the image on CCTV systems and security cameras Tamper with car central locking systems to facilitate robbery Prevent correct positioning to be received for GPS, making it impossible to track or locate a transportation mean and making it digitally invisible © May 2018

Jamming in hospital infrastructure case © LAIRD https://www.lairdtech.com/solutions/embedded-wireless/what-connected-hospital © May 2018

Jamming in train infrastructure case © GUMUSKAYA http://www.gumuskaya.com/ © May 2018

The solution DoSSensing provides a device that is capable of detecting different types of radio jammer signals at the physical layer and inform the users that a particular jammer is performing an attack. It will visually provide the jammer type and estimated power over time for a particular frequency or wireless channel. The users can then identify the threat and approach the area to find the jammer device. Having several devices on that area will better help to identify and find the threat that will be pointed out by more than one detector. © May 2018

The solution The monitoring tool helps identify whenever a jamming attack is taking place. © May 2018

The solution © May 2018

The solution © May 2018

The solution WIRELESS JAMMER DETECTOR: Detection of different types of radio frequency jamming attacks by analyzing the radio signal at the physical layer. ATTACK LOGGER: Logs and also communicates the jamming attacks detected, including type of jammer, jammer to noise ratio, timestamp and frequency. It is integrated with ATOS XL-SIEM solution. CONFIGURABLE: By default, the jammer detector analyses the WiFi 2.4 GHz band. However, it can be configured to analyze any frequencies between 1 MHz to 6 GHz PORTABLE: Software solution is portable to different processing environments to generate real time results using configurable bandwidth. PLUG & MONITOR: Plug the detector and monitor any anomalies affecting your wireless networks, through our visualization environment. © May 2018

The solution – General architecture SDR module Processing Board Monitoring Server Visualization Tool Antenna: used to capture the radiofrequency spectrum analogically SDR Module: it measures the wireless signals and transforms the wave to digital samples Processing Board: processes all the sampled data real time in order to make a decision whether there is a jamming signal or not Monitoring Server: it gathers detection decisions, post processes them and stores them so that they can be visualized Visualization Tool: used to present the detection results in a user friendly interface © May 2018

The solution – The code The code for the DoS Jammer Detector Sensor provided by Worldsensing in the framework of the CIPSEC project is OpenSource and can be found in the following repository: https://github.com/worldsensinginnovation/cipsec This software will allow users to connect a HackRf One to the processing board, perform the detection and visualize the detection results via standard output. In addition, the jammer_msg_rx executable is an example application that reads detection events from a Linux queue and prints them on standard output. This application shows how to retrieve the events in case the solution wants to be extended as it is done on the DoS Sensing solution. Note: the public repository does not include any Monitoring Server or Visualization Tool code. The output decisions obtained may need to be refined. © May 2018

The solution – The code (output) - No Jammer Main software (sdrjd executable) Example consumer (jammer_msg_rx) © May 2018

The solution – The code (output) - Jammer Main software (sdrjd executable) Example consumer (jammer_msg_rx) © May 2018

In Detail: Detection Algorithm Brief description of the steps taken place for the detection of the jamming attacks. STEPS: Compute the noise floor estimation. Create the spectrogram: representation in frequency. Project the measure into time domain (FT). Compute mean of the measures. Binarize the measures. FT to perform the decision making process. Decision Algorithm © May 2018

In Detail: Decision Algorithm © May 2018

In detail: The Hardware © May 2018

In detail: The platform - No jammer © May 2018

In detail: The platform - Jammer Detected © May 2018

Thank you for your attention,