Privacy-Preserving and Truthful Detection of Packet Dropping attacks in Wireless Ad Hoc Networks
DOI:
https://doi.org/10.26438/ijcse/v5i12.207212Keywords:
Homomorphic linear authenticator(HLA), Packet block based mechanism, Denial of service(DOS), Multipath routing algorithmsAbstract
Tunnel blunders, venomous packet losses are two purposes behind bundle drops in a multi-jump remote specially appointed system. This examination, watching the gathering of bundle drops in a system have keen on deciding in those drops spawned burrow mistakes just, else in joined effect of tunnel blunders, venomous blunders. They especially intrigued by the inline assault scenario, where by venomous hubs that a piece of the path expounds those content to specifically tossed in a couple of bundles genuine for system execution. Due to the bundle losing rate, for the situation, is practically identical to the channel blunder rate, regular calculations that depend on distinguishing the packet loss rate can't accomplish culminate discernment exactness. For expansion of observation precision, we invent to expound the connections on lost packets. Likewise, for guarantee honest to goodness computation of these associations, we build up a Homomorphic straight authenticator(HLA) typed open reviewing plan [1],[2],[10]that engages the identifier to attest the reliability of packet misfortune data pointed through hubs. Its headway is protection safeguarding, crash evidence, increases less correspondence, cutoff fixed costs. For decreasing the computation operation cost of the example plot, bundle-piece-based part is similarly created by empowering the acknowledgment precision for bringing down figuring unusualness. By these broad reproductions, we watch the designed systems achieve by and large best perception accuracy over normal procedures, for instance, a most extreme probability based identification.
References
C. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, ―Provable data possession at untrusted stores,‖ in Proc. ACM Conf. Comput. and Commun. Secure., Oct. 2007, pp. 598– 610.
G. Ateniese, S. Kamara, and J. Katz, ―Proofs of storage from homomorphic identification protocols,‖ in Proc. Int. Conf. Theory Appl. Cryptol. Inf. Security, 2009, pp. 319–333.
B. Awerbuch, R. Curtmola, D. Holmer, C. Nita- Rotaru, and H. Rubens, ―ODSBR: An on-demand fixed byzantine resilient routing protocol for remote ad hoc networks,‖ ACM Trans. Inform. Syst. Security, vol. 10, no. 4, pp. 1–35, 2008.
T. Hayajneh, P. Krishnamurthy, D. Tipper, and T. Kim, ―Detecting venomous packet dropping in the presence of collisions and channel blunders in remote ad hoc networks,‖ in Proc. IEEE Int. Conf. Commun., 2009, pp. 1062–1067.
D. B. Johnson, D. A. Maltz, and J. Broch, “DSR: The dynamic source routing protocol for multi-hop remote ad hoc networks,” in Ad Hoc Networking. Reading, MA, USA: Addison-Wesley, 2001, ch. 5, pp. 139–172.
G. Noubir and G. Lin, “Low-power DoS assaults in data wireless lans and countermeasures,” ACM SIGMOBILE Mobile Comput. Commun. Rev., vol. 7, no. 3, pp. 29–30, Jul. 2003.
A. Proano and L. Lazos, “Selective jamming assaults in remote networks,” in Proc. IEEE ICC Conf., 2010, pp. 1–6.
A. Proano and L. Lazos, “Packet-hiding methods for preventing selective jamming assaults,” IEEE Trans. Depend. Fixed Comput., vol. 9, no. 1, pp. 101–114, Jan./Feb. 2012.
R. Rao and G. Kesidis, “Detecting venomous packet dropping using statistically regular traffic patterns in multi-hop remote networks that are not bandwidth limited,” in Proc. IEEE GLOBECOM Conf., 2003, pp. 2957–2961.
H. Shacham and B. Waters, “Compact Proofs of retrievability,” in Proc. Int. Conf. Theory Appl. Cryptol. Inf. Secure., Dec. 2008, pp. 90– 107.
T. Shu, M. Krunz, and S. Liu, “Fixed data collection in remote sensor networks using randomized dispersive routes,” IEEE Trans. Mobile Comput., vol. 9, no. 7, pp. 941–954, Jul. 2010.
T. Shu, S. Liu, and M. Krunz, “Fixed data collection in remote sensor networks using randomized dispersive routes,” in Proc. IEEE INFOCOM Conf., 2009, pp. 2846-2850.
C. Wang, Q. Wang, K. Ren, and W. Lou, “Privacy-preserving public auditing for data storage security in cloud computing,” in Proc. IEEE INFOCOM Conf., Mar. 2010, pp. 1–9.
W. Xu, W. Trappe, Y. Zhang, and T. Wood, “The feasibility of dropping and detecting jamming assaults in remote networks,” in Proc. ACM MobiHoc Conf., 2005, pp. 46–57.
Y. Zhang, L. Lazos, and W. Kozma, “AMD: Audit-based misbehavior perception in remote ad hoc networks,” IEEE Trans. Mobile Comput., PrePrint, Vol. 99, published online on 6 Sept. 2013.
L. Buttyan and J. P. Hubaux, “Stimulating cooperation in selforganizing mobile ad hoc networks,” ACM/Kluwer Mobile Netw. Appl., vol. 8, no. 5, pp. 579–592, Oct. 2003.
S. Zhong, J. Chen, and Y. R. Yang, “Sprite: A simple cheat-proof, credit-based system for mobile ad-hoc networks,” in Proc. IEEE INFOCOM Conf., 2003, pp. 1987–1997.
J. Crowcroft, R. Gibbens, F. Kelly, and S. Ostring, “Modelling incentives for collaboration in mobile ad hoc networks,” presented at the First Workshop Modeling Optimization Mobile, Ad Hoc Remote Netw., Sophia Antipolis, France, 2003.
K. Liu, J. Deng, P. Varshney, and K. Balakrishnan, “An acknowledgement-based approach for the perception of routing misbehavior in MANETs,” IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536–550, May 2006.
V. N. Padmanabhan and D. R. Simon, “Fixed traceroute to detect faulty or venomous routing,” in Proc. ACM SIGCOMM Conf., 2003, pp. 77–82.
P. Papadimitratos and Z. Haas, “Fixed message transmission in mobile ad hoc networks,” Ad Hoc Netw., vol. 1, no. 1, pp. 193–209, 2003.
B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, “ODSBR: An on-demand fixed byzantine resilient routing protocol for remote ad hoc networks,” ACM Trans. Inf. Syst. Secure., vol. 10, no. 4, pp. 11–35, 2008.
K. Balakrishnan, J. Deng, and P. K. Varshney, “TWOACK: Preventing selfishness in mobile ad hoc networks,” in Proc. IEEE Remote Commun. Netw. Conf., 2005, pp. 2137–2142.
Y. Xue and K. Nahrstedt, “Providing fault-tolerant ad-hoc routing service in adversarial environments,” Remote Pers. Commun., Special Issue Secure. Next Generation Commun., vol. 29, no. 3, pp. 367– 388, 2004
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
