Hacker Detection:  Jamming in a Wireless Sensor Network
Download
1 / 1

Department of Computer Science and Engineering The University of Texas at Arlington - PowerPoint PPT Presentation


  • 71 Views
  • Uploaded on

Hacker Detection: Jamming in a Wireless Sensor Network. John Davis Mansfield Legacy High School [email protected] Nabila Rahman University of Texas, Arlington [email protected] Eric Manuel Duncanville High School [email protected] Matthew Wright

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Department of Computer Science and Engineering The University of Texas at Arlington' - zamir


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

Hacker Detection: Jamming in a Wireless Sensor Network

  • John Davis

  • Mansfield Legacy High School

  • [email protected]

  • Nabila Rahman

  • University of Texas, Arlington

  • [email protected]

  • Eric Manuel

  • Duncanville High School

  • [email protected]

  • Matthew Wright

  • University of Texas, Arlington

  • [email protected]

Background

Wireless Sensor Networks (WSN) can be deployed for monitoring secure areas. Each sensor (or “mote”) communicates with nearby motes. A jammer attempts to interrupt this communication by flooding the motes with information, preventing meaningful communication between the motes.

The RET Program

The Research Experience for Teachers is a two-year experience for High School Science, Math and Technology teachers, funded by a grant from the National Science Foundation.

Research

Adaptation

  • Research areas include:

  • Identifying neighbors.

  • Jamming detection.

  • Reporting jamming.

  • Determining the jammed areas.

  • Mapping the jammed areas.

  • Performance analysis.

  • Students will:

  • Calculate wavelength of EM waves.

  • Simulate a wireless network of cell phones (thought experiment).

  • Develop a method for identifying jamming and location of jammer.

  • Use laser pointers and diffraction gratings to demonstrate EM interference

Simulation Results

  • Calculations and Analysis are extrapolated through a program for different sized hypothetical networks.

Application

Extension

Students are asked to write a short essay on the ethical and practical effects of jamming technology such as cell phones. Students also perform a traditional lab on electromagnetic interference patterns with laser pointers and diffraction gratings.

  • Students:

  • Calculate the wavelength of 2.4GHz EM radiation (used in motes and cellphones).

  • Simulate a network where they are the motes and text messages are the means of communication.

  • Describe how they would detect a jammer, and locate that jammer.

Lab Experiment

Functioning Network

Jammed Network

  • Department of Computer Science and Engineering

  • The University of Texas at Arlington

In this experiment, jammed motes are indicated by a blue light.


ad