10 likes | 171 Views
Hacker Detection: Jamming a WSN Nabila Rahman Matthew Wright John Davis Eric Manuel nabila.rahman@mavs.uta.edu mwright@cse.uta.edu johndeana@aol.com manuel.eric@gmail.com. Teacher Introduction :
E N D
Hacker Detection: Jamming a WSN Nabila Rahman Matthew Wright John Davis Eric Manuel nabila.rahman@mavs.uta.edumwright@cse.uta.edujohndeana@aol.commanuel.eric@gmail.com Teacher Introduction: Eric Manuel teaches at Duncanville High School in Duncanville, Texas. Computer Maintenance, Telecommunications and Cabling, Electronics, and Advanced Electronics. In his 5th year of teaching, his classes consist mostly of sophomores through seniors. This is the second year of his participation in the RET program. • Project Background • Wireless Sensor Network: • Can be used for detecting intruders in a secured area • Jamming Characteristics: • Deliberate transmission of signals to disrupt communications • Known issues: • Early detection of jamming the desired regions Experimentation – WSN performed indoors under a 49 count network. Summer weather conditions made outdoor experimentation difficult due to the standing water and humidity. • Research • Utilizing the motes,the team was able to effectively conduct 2 complete indoor experiments. The resulting data was generated based on simulation programs written by Nabila using TinyOS 2.0 and run by John and myself. From these trials, the following data could be viewed. • How many neighbors were viewed to be active during jamming period. Precision of data packets reaching their destination • How many nodes jammed per session. Percentage of packets being recalled. Simulation Results Conclusion: Modifications for lesson plan The data was able to verify that while jamming the nodes, the neighbors were grouped in an amorphous shape. The jamming was effective for at least 2 neighbors away from the jammer. From this result, the jammer could cover an effective area for a short period of time. The sensors were sensitive to high levels of humidity and made outdoor experimentation difficult during wet weather. From the research this summer, I have been able to modify my lesson plan over physical security to include wireless sensors and their ability to detect activity. The physical security was a basic overview of what an IT group needs to safeguard the hardware for their users. The research allows me to include wireless sensors to demonstrate the susceptibility of a secure wireless network. Department of Computer Science and Engineering The University of Texas at Arlington