Open Access   Article Go Back

Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks

Chintagunta Mukundha1 , Usha Thalloju2

  1. Dept. of IT, Sreenidhi institution of science and technology, Hyderabad, India.
  2. Dept. of IT, Sreenidhi institution of science and technology, Hyderabad, India.

Section:Review Paper, Product Type: Journal Paper
Volume-5 , Issue-12 , Page no. 207-212, Dec-2017

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v5i12.207212

Online published on Dec 31, 2017

Copyright © Chintagunta Mukundha, Usha Thalloju . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Chintagunta Mukundha, Usha Thalloju, “Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.12, pp.207-212, 2017.

MLA Style Citation: Chintagunta Mukundha, Usha Thalloju "Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks." International Journal of Computer Sciences and Engineering 5.12 (2017): 207-212.

APA Style Citation: Chintagunta Mukundha, Usha Thalloju, (2017). Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks. International Journal of Computer Sciences and Engineering, 5(12), 207-212.

BibTex Style Citation:
@article{Mukundha_2017,
author = { Chintagunta Mukundha, Usha Thalloju},
title = {Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2017},
volume = {5},
Issue = {12},
month = {12},
year = {2017},
issn = {2347-2693},
pages = {207-212},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1603},
doi = {https://doi.org/10.26438/ijcse/v5i12.207212}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v5i12.207212}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1603
TI - Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wireless Ad Hoc Networks
T2 - International Journal of Computer Sciences and Engineering
AU - Chintagunta Mukundha, Usha Thalloju
PY - 2017
DA - 2017/12/31
PB - IJCSE, Indore, INDIA
SP - 207-212
IS - 12
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
543 388 downloads 219 downloads
  
  
           

Abstract

Tunnel blunders, venomous packet losses are two purposes behind bundle drops in a multi-jump remote specially appointed system. This examination, watching the gathering of bundle drops in a system have keen on deciding in those drops spawned burrow mistakes just, else in joined effect of tunnel blunders, venomous blunders. They especially intrigued by the inline assault scenario, where by venomous hubs that a piece of the path expounds those content to specifically tossed in a couple of bundles genuine for system execution. Due to the bundle losing rate, for the situation, is practically identical to the channel blunder rate, regular calculations that depend on distinguishing the packet loss rate can`t accomplish culminate discernment exactness. For expansion of observation precision, we invent to expound the connections on lost packets. Likewise, for guarantee honest to goodness computation of these associations, we build up a Homomorphic straight authenticator(HLA) typed open reviewing plan [1],[2],[10]that engages the identifier to attest the reliability of packet misfortune data pointed through hubs. Its headway is protection safeguarding, crash evidence, increases less correspondence, cutoff fixed costs. For decreasing the computation operation cost of the example plot, bundle-piece-based part is similarly created by empowering the acknowledgment precision for bringing down figuring unusualness. By these broad reproductions, we watch the designed systems achieve by and large best perception accuracy over normal procedures, for instance, a most extreme probability based identification.

Key-Words / Index Term

Homomorphic linear authenticator(HLA), Packet block based mechanism, Denial of service(DOS), Multipath routing algorithms

References

[1] C. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, ―Provable data possession at untrusted stores,‖ in Proc. ACM Conf. Comput. and Commun. Secure., Oct. 2007, pp. 598– 610.
[2] G. Ateniese, S. Kamara, and J. Katz, ―Proofs of storage from homomorphic identification protocols,‖ in Proc. Int. Conf. Theory Appl. Cryptol. Inf. Security, 2009, pp. 319–333.
[3] B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-

Rotaru, and H. Rubens, ―ODSBR: An on-demand fixed byzantine resilient routing protocol for remote ad hoc networks,‖ ACM Trans. Inform. Syst. Security, vol. 10, no. 4, pp. 1–35, 2008.
[4] T. Hayajneh, P. Krishnamurthy, D. Tipper, and T.

Kim, ―Detecting venomous packet dropping in the presence of collisions and channel blunders in remote ad hoc networks,‖ in Proc. IEEE Int. Conf. Commun.,

2009, pp. 1062–1067.
[5] D. B. Johnson, D. A. Maltz, and J. Broch, “DSR: The dynamic source routing protocol for multi-hop remote ad hoc networks,” in Ad Hoc Networking. Reading, MA, USA: Addison-Wesley, 2001, ch. 5, pp. 139–172.
[6] G. Noubir and G. Lin, “Low-power DoS assaults in data wireless lans and countermeasures,” ACM SIGMOBILE Mobile Comput. Commun. Rev., vol. 7, no. 3, pp. 29–30, Jul. 2003.
[7] A. Proano and L. Lazos, “Selective jamming assaults in remote networks,” in Proc. IEEE ICC Conf., 2010, pp. 1–6.
[8] A. Proano and L. Lazos, “Packet-hiding methods for preventing selective jamming assaults,” IEEE Trans. Depend. Fixed Comput., vol. 9, no. 1, pp. 101–114, Jan./Feb. 2012.
[9] R. Rao and G. Kesidis, “Detecting venomous packet dropping using statistically regular traffic patterns in multi-hop remote networks that are not bandwidth limited,” in Proc. IEEE GLOBECOM Conf., 2003, pp. 2957–2961.
[10] H. Shacham and B. Waters, “Compact Proofs of retrievability,” in Proc. Int. Conf. Theory Appl. Cryptol. Inf. Secure., Dec. 2008, pp. 90– 107.
[11] T. Shu, M. Krunz, and S. Liu, “Fixed data collection in remote sensor networks using randomized dispersive routes,” IEEE Trans. Mobile Comput., vol. 9, no. 7, pp. 941–954, Jul. 2010.
[12] T. Shu, S. Liu, and M. Krunz, “Fixed data collection in remote sensor networks using randomized dispersive routes,” in Proc. IEEE INFOCOM Conf., 2009, pp. 2846
2850.
[13] C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” in Proc. IEEE INFOCOM Conf., Mar. 2010, pp. 1–9.
[14] W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The feasibility of dropping and detecting jamming assaults in remote networks,” in Proc. ACM MobiHoc Conf., 2005, pp. 46–57.
[15] Y. Zhang, L. Lazos, and W. Kozma, “AMD: Audit-based misbehavior perception in remote ad hoc networks,” IEEE Trans. Mobile Comput., PrePrint, Vol. 99, published online on 6 Sept. 2013.
[16] L. Buttyan and J. P. Hubaux, “Stimulating cooperation in selforganizing mobile ad hoc networks,” ACM/Kluwer Mobile Netw. Appl., vol. 8, no. 5, pp. 579–592, Oct. 2003.
[17] S. Zhong, J. Chen, and Y. R. Yang, “Sprite: A simple cheat-proof, credit-based system for mobile ad-hoc networks,” in Proc. IEEE INFOCOM Conf., 2003, pp. 1987–1997.
[18] J. Crowcroft, R. Gibbens, F. Kelly, and S. Ostring, “Modelling incentives for collaboration in mobile ad hoc networks,” presented at the First Workshop Modeling Optimization Mobile, Ad Hoc Remote Netw., Sophia Antipolis, France, 2003.
[19] K. Liu, J. Deng, P. Varshney, and K. Balakrishnan, “An acknowledgement-based approach for the perception of routing misbehavior in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2006.
[20] V. N. Padmanabhan and D. R. Simon, “Fixed traceroute to detect faulty or venomous routing,” in Proc. ACM SIGCOMM Conf., 2003, pp. 77–82.
[21] P. Papadimitratos and Z. Haas, “Fixed message transmission in mobile ad hoc networks,” Ad Hoc Netw., vol. 1, no. 1, pp. 193–209, 2003.
[22] B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, “ODSBR: An on-demand fixed byzantine resilient routing protocol for remote ad hoc networks,” ACM Trans. Inf. Syst. Secure., vol. 10, no. 4, pp. 11–35, 2008.
[23] K. Balakrishnan, J. Deng, and P. K. Varshney, “TWOACK: Preventing selfishness in mobile ad hoc networks,” in Proc. IEEE Remote Commun. Netw. Conf., 2005, pp. 2137–2142.
[24] Y. Xue and K. Nahrstedt, “Providing fault-tolerant ad-hoc routing service in adversarial environments,” Remote Pers. Commun., Special Issue Secure. Next Generation Commun., vol. 29, no. 3, pp. 367– 388, 2004