Hacker Detection: Jamming a WSN
1 / 1

Hacker Detection: Jamming a WSN Nabila Rahman Matthew WrightJohn DavisEric Manuel - PowerPoint PPT Presentation

  • Uploaded on
  • Presentation posted in: General

Hacker Detection: Jamming a WSN Nabila Rahman Matthew WrightJohn DavisEric Manuel nabila.rahman@mavs.uta.edu mwright@cse.uta.edu johndeana@aol.com manuel.eric@gmail.com. Teacher Introduction :

I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.

Download Presentation

Hacker Detection: Jamming a WSN Nabila Rahman Matthew WrightJohn DavisEric Manuel

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.

- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript

Hacker Detection: Jamming a WSN

Nabila Rahman Matthew WrightJohn DavisEric Manuel


Teacher Introduction:

Eric Manuel teaches at Duncanville High School in Duncanville, Texas. Computer Maintenance, Telecommunications and Cabling, Electronics, and Advanced Electronics. In his 5th year of teaching, his classes consist mostly of sophomores through seniors. This is the second year of his participation in the RET program.

  • Project Background

  • Wireless Sensor Network:

    • Can be used for detecting intruders in a secured area

  • Jamming Characteristics:

  • Deliberate transmission of signals to disrupt communications

  • Known issues:

    • Early detection of jamming the desired regions

  • Experimentation – WSN performed indoors under a 49 count network. Summer weather conditions made outdoor experimentation difficult due to the standing water and humidity.

    • Research

    • Utilizing the motes,the team was able to effectively conduct 2 complete indoor experiments. The resulting data was generated based on simulation programs written by Nabila using TinyOS 2.0 and run by John and myself. From these trials, the following data could be viewed.

    • How many neighbors were viewed to be active during jamming period.Precision of data packets reaching their destination

    • How many nodes jammed per session.Percentage of packets being recalled.

    Simulation Results


    Modifications for lesson plan

    The data was able to verify that while jamming the nodes, the neighbors were grouped in an amorphous shape. The jamming was effective for at least 2 neighbors away from the jammer.

    From this result, the jammer could cover an effective area for a short period of time.

    The sensors were sensitive to high levels of humidity and made outdoor experimentation difficult during wet weather.

    From the research this summer, I have been able to modify my lesson plan over physical security to include wireless sensors and their ability to detect activity. The physical security was a basic overview of what an IT group needs to safeguard the hardware for their users. The research allows me to include wireless sensors to demonstrate the susceptibility of a secure wireless network.

    Department of Computer Science and Engineering

    The University of Texas at Arlington

  • Login