SECURING PERFORMANCE OF THE NETWORK IN VIEW SELECTIVE DROPS

B. Anusha, Y Sravana Sandhya

Abstract


We're concerned in combating an insider attack and thinking about complexity of discovering happening of selective packet drops and recognize malicious node which are responsible for such drops. We develop accurate formula for recognition of selective packet drops which are produced by insider attackers. For making certain of computation of correlations, we create a homomorphic straight line authenticator that's on public auditing design basis that enables the detector to verify honesty of packet loss information that is as stated by nodes. In broad wireless means, link errors are relatively important, and may not be significantly lesser than packet shedding rate of insider attacker hence insider attacker can hide in backdrop of harsh funnel conditions.  Within our work during study of packet sequence losses inside the network, we're concerned in figuring out whether losses come from way of link errors simply, otherwise by collective aftereffect of link errors in addition to malicious drop. This arrangement is privacy preserving, and sustains low communication in addition to storage spending. Our formula additionally provides honest in addition to openly verifiable decision statistics as proof to keep recognition decision.


Keywords


Malicious Node; Selective Packet; Privacy Preserving; Public Auditing;

References


W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the ACM MobiHoc Conference, pages 46–57, 2005.

K. Balakrishnan, J. Deng, and P. K. Varshney. TWOACK: preventing selfishness in mobile ad hoc networks. In Proceedings of the IEEE WCNC Conference, 2005.

Y. Liu and Y. R. Yang. Reputation propagation and agreement in mobile ad-hoc networks. In Proceedings of the IEEE WCNC Conference, pages 1510–1515, 2003.

W. Galuba, P. Papadimitratos, M. Poturalski, K. Aberer, Z. Despotovic, and W. Kellerer. Castor: Scalable secure routing for ad hoc networks. In INFOCOM, 2010 Proceedings IEEE, pages 1 –9, march 2010.

R. Rao and G. Kesidis. Detecting malicious packet dropping using statistically regular traffic patterns in multichip wireless networks that are not bandwidth limited. In Proceedings of the IEEE GLOBECOM Conference, 2003.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2021, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.