DISCOVERY-MAINTAINING AND DISHONEST RECOGNITION OF PACKET REDUCING ATTACKS IN WIRELESS AD HOC NETWORKS

Kollipakula Ramadevi, Fareeda Shaik, Challa Bhaskar Rao

Abstract


We create an effective formula for recognition of selective packet drops produced by insider attackers and it also additionally provides a truthful furthermore to freely verifiable decision statistics as being a proof to keep recognition decision. Within our work we're interested to discover once the losses be a consequence of link errors otherwise using the collective after effect of malicious drop and link errors with the observation within the packet losses inside the network. we enhance your homomorphic linear authenticator based structure of public auditing allowing the detector to make sure truth of packet loss data as reported by nodes.  This structure is collusion proof, privacy preserving, and incur low communication furthermore to storage overheads.  Our suggested system views mix-statistics between lost packets to make a additional informative decision, and thus reaches sharp impact on fliers and card printing that depend only on distribution of amount of lost packets.


Keywords


Privacy Preserving; Malicious; Link Errors; Packet Losses; Insider Attackers;

References


J. Crowcroft, R. Gibbens, F. Kelly, and S. Ostring, “Modelling incentives for collaboration in mobile ad hoc networks,” presented at the First Workshop Modeling Optimization Mobile, Ad Hoc Wireless Netw., Sophia Antipolis, France, 2003.

W. Kozma Jr., and L. Lazos, “REAct: Resource-efficient accountability for node misbehavior in ad hoc networks based on random audits,” in Proc. ACM Conf. Wireless Netw. Secur., 2009, pp. 103–110.

K. Liu, J. Deng, P. Varshney, and K. Balakrishnan, “An acknowledgement- based approach for the detection of routing misbehaviour in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2006.

Y. Liu and Y. R. Yang, “Reputation propagation and agreement in mobile ad-hoc networks,” in Proc. IEEE WCNC Conf., 2003, pp. 1510–1515.

S. Buchegger and J. Y. L. Boudec, “Performance analysis of the confidant protocol (cooperation of nodes: Fairness in dynamic adhoc networks),” in Proc. 3rd ACM Int. Symp. Mobile Ad Hoc Netw. Comput. Conf., 2002, pp. 226–236.

L. Buttyan and J. P. Hubaux, “Stimulating cooperation in selforganizing mobile ad hoc networks,” ACM/Kluwer Mobile Netw. Appl., vol. 8, no. 5, pp. 579–592, Oct. 2003.


Full Text: PDF

Refbacks

  • There are currently no refbacks.




Copyright © 2012 - 2021, All rights reserved.| ijitr.com

Creative Commons License
International Journal of Innovative Technology and Research is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJITR , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.