A Novel Technique For Truthful Detection Of Packet Dropping Attack In Wireless Adhoc Networks

VGL Narasamba, 2VSV Deepak, P. Sandeep Varma

Abstract


While watching an arrangement of packet losses in the system, we are occupied with figuring out if the losses are brought on by link errors just, or by the joined impact of connection mistakes and pernicious drop. We are particularly inspired by the insider-attack case, whereby malevolent nodes that are a piece of the course misuse their insight into the correspondence setting to specifically drop a little measure of bundles basic to the system execution. Since the parcel dropping rate for this situation is practically identical to the channel mistake rate, customary algorithms that depend on distinguishing the packet loss rate can't accomplish attractive discovery precision. To enhance the location exactness, we propose to misuse the connections between lost packets. Moreover, to guarantee honest count of these relationships, we build up a homomorphic straight authenticator (HLA) based open examining design that permits the identifier to check the honesty of the parcel misfortune data reported by nodes. This development is security saving, arrangement evidence, and causes low correspondence and capacity overheads. To diminish the calculation overhead of the pattern conspire, a packet-block based instrument is likewise proposed, which permits one to exchange discovery precision for lower calculation multifaceted nature.


References


J. N. Arauz, 802.11 Markov channel modeling, 2004.

C. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, D. Song, "Provable data possession at untrusted stores", Proc. ACM Conf. Comput. andCommun. Secur., pp. 598-610., Oct. 2007.

G. Ateniese, S. Kamara, J. Katz, "Proofs of storage from homomorphic identification protocols", Proc. Int. Conf. Theory Appl. Cryptol. Inf. Security, pp. 319-333., 2009. CrossRef

B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, H. Rubens, "ODSBR: An on-demand secure byzantine resilient routing protocol for wireless ad hoc networks", ACM Trans. Inform. Syst. Security, vol. 10, no. 4, pp. 1–35, 2008. Access at ACM

B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, H. Rubens, "ODSBR: An on-demand secure byzantine resilient routing protocol for wireless ad hoc networks", ACM Trans. Inf. Syst. Secur., vol. 10, no. 4, pp. 11-35, 2008. Access at ACM


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.