SlideShare a Scribd company logo
1 of 8
Download to read offline
Key Reconstruction and clustering opponent nodes in Minimum Cost
Blocking Problems
D.Sireesha
ASCET
M.Tech(CSE)
Siri3835@gmail.com
Prof C.Rajendra
srirajendra.c@gmail.com
ABSTRACT: This paper detects malicious activities on wireless mesh networks with
wireless routing protocols. Upon the selection of route discovery malicious attacks are
ahead to compromise the nodes such as network partitioning, node isolation activities
.The cardinal covering in the routing protocols address the packets in the network.
When attacks are take place by the opponent, negotiate the attacker node and choose
another way to send the packet from source to destination .But it can’t be moved from
the wireless network. Here proposing, looking into the Clustering protocols along with
id-based key update protocols, which is very predicting in wireless networks.
Cryptography techniques improvise the packet in an assured way from source to
destination and it doesn’t render to secure the network/system.
Keywords: Wirelessmeshnetworks, clustering, MSR protocol, adversary nodes, updating key.
1. INTORDUCTION:
Wireless mesh networks (WMN’S)
issued as a bright conception to meet the
disputes on succeeding generation wireless
networks. Providing flexibility, adaptability,
reconfigurable the network upon the cost-
efficient solutions to service provider. It has
the possibility to wipe out many of these
disadvantages like low-cost, wireless broad
band internet access for both wired and
mobile nodes. Wireless mesh networks are
an emerging technology right now. The use of
mesh wireless networks may bring the dream
of a seamlessly connected world into reality.
Wireless mesh Networks includes mesh
routers and mesh clients. Getting rid of the
wires from the wireless LAN’s, doubling the
access point is known as mesh routers and it
forms a backbone network. A mesh network
can be designed using a flooding technique
or a routing technique.[3] When using a
routing technique, the message is
propagated along a path, by hopping from
node to node until the destination is reached.
To ensure all its paths' availability, a routing
network must allow for continuous
352
INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
ISBN: 378 - 26 - 138420 - 5
www.iaetsd.in
connections and reconfiguration around
broken or blocked paths, using self-
healing algorithms. A mesh network whose
nodes are all connected to each other is
a fully connected network. Mesh networks
can be seen as one type of. Mobile adhoc
networks (MANETs) [1] and mesh networks
are therefore closely related. The mesh
routers render a rich radio connectivity in
which importantly brings down the direct
deployment cost of the network. Mesh routers
are usually stationary and it doesn’t have
power constraint. Mesh clients are mobile
nodes. Sometimes mesh routers can also act
as gateways which are connected to the
internet through a wired backbone.
2. RELATED WORK:
Privacy and security plays a major role in the
communication network for both wired and
wireless network. Security issues related to
the packet transmission from the source to
the destination nodes. Securing the data from
the opponent without changing the main
thing. Different technologies are introduced to
secure data from opponents by using
clustering the different nodes in the mesh
network. Clustering [4] and cryptography
techniques are included for protecting packet
from un-authorizers. It demonstrates the high
quality of multipath routing protocols above
traditional single path protocols in terms of
resiliency under the attacks of blocking and
node isolation types of attacks , particularly in
wireless networks domain. Multi-path
protocols for wireless mesh networks make it
particularly hard for an adversary to
effectively launch such attacks. Attempting to
model the theoretical hardness of attacks on
multi-path routing protocols for mobile nodes
and qualify it in mathematical terms. The
study will impact the areas of security and
robustness of routing protocols of wireless
mesh networks. [3], threshold cryptography
and network coding. In previously, every
node had a unique ID randomly, routing
occurs through protocols such as greedy and
LP algorithms. Problems incorporated in last
investigations are if any opponent were
hacked any of the nodes in the network, it
can retrieve the packet before sending the
destination. And one more consequence is
about the topological information of the
network, through that it may miss send the
packet without permissions of authenticated
nodes. To reduce these complications, here
introducing the clustering concepts[4] were
incorporated i.e. , grouping the nodes in the
mesh networks after identifying the
misbehaving node move out the effected
node from the network again make clustering
algorithms to group the nodes using
MSR(multipath split routing) protocol. Again
to protect data from adversary nodes
introducing cryptographic key distributions
techniques are integrated. Introducing the
clustering algorithms to group the nodes in
the mesh networks, giving different ID’s to the
nodes. Grouping sensor nodes into clusters
has been widely investigated by researchers
353
INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
ISBN: 378 - 26 - 138420 - 5
www.iaetsd.in
in order to achieve the network system's
scalability and management objectives. Every
cluster would have a leader sensor node,
often referred to as the cluster-head (CH),
which can be fixed or variable. CHs
aggregate the data collected by the sensor
nodes in its cluster, thus, clustering
decreases the number of relayed packets. As
the benefits of clustering, it conserves
communication bandwidth and avoids
redundant exchange of messages among
sensor nodes, because of limiting the inter-
cluster interactions. Therefore, clustering
prolongs the lifetime of WSNs [2][4].
(A).How does a mesh network works?
While traditional networks rely on a small
number of wired access points or wireless
hotspots to connect users, a wireless mesh
network spreads a network connection
among dozens or even hundreds of wireless
mesh nodes that "talk" to each other, sharing
the network connection across a large area.
Some think of the internet as being the
world's largest mesh network. When using
the internet, information travels by being
bounced automatically from one router to the
next until it reaches its destination. The
internet has billions of potential paths across
which data can travel.
3. PAPER ORGANIZATION:
The rest of this paper is organized as follows
section 4 discuss the implementation
process, section 4.1 introducing the finite
state machine to record the details of nodes
behavior, section 4.2 presents the clustering
algorithm implementation details, section 4.3
discuss key updating process after clustering
adversary nodes section 5 concludes the
paper with the future discussion.
4. IMPLEMENTATION:
Wireless mesh networks integrating a key
technology for next generation wireless
networks showing rapid progress and
numerous applications. In a WMN, high
speed routers integrated with each other in a
multi-hop fashion over wireless channels and
form a broadband backhaul. In the previous
analysis of the paper includes that in wireless
mesh networks. Due to the delivery of packet
from source to destination it should be send
through secure path by providing a key to the
packet. In WMN’s an adversary node involves
in the network can know the details of
topological information, obviously the routing
details. In order to secure the packet from the
opponent we need to reduce the way of
adversary nodes about topological
information[6] and providing another key to
the packet. Here in this paper introducing the
clustering and cryptographic key
regeneration. Analyzing the node behavior
whether it is acting in a normal way or not, it
is possible by using finite state machine.
Behavior of each node is noted in the table,
clustering misbehaving nodes using a unique
id and authorized one with another id’s. Upon
creating different id’s for misbehaving nodes
and authorized node packet details have to
354
INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
ISBN: 378 - 26 - 138420 - 5
www.iaetsd.in
be modified. This is re-generating the key to
protect data from opponents. Here
introducing MSR protocol for generating the
maximal disjoint paths in the network, and
how the MSR is working upon the selection of
routes in the network. To observer the
behavior of the nodes incorporating finite
state machine model. Examine each and
every nodes behavior about the status of
packet delivery and soon. The selfish node is
identified in the network based on data
collected by each node from its local
message unit (LMU). Clustering the
misbehaving nodes as a group and
authorized one’s a group. Although grouping
opponents doesn’t made packet in a secured
way. Again providing a key is an important
task to protect data i.e. re-generating
algorithms are introduced to provide a key at
the packet header.
4.1 MULTI-PATH SPLIT ROUTING:
Multipath Split Routing (MSR) protocol that
builds maximally disjoints paths. Multiple
routes, of which one is the shortest delay
path, are discovered on demand. Established
routes are not necessarily of equal length.
Data traffic is split into multiple routes to
avoid congestion[5] and to use network
resources efficiently. We believe providing
multiple routes are beneficial in network
communications, particularly in mobile
wireless networks where routes are
disconnected frequently because of mobility
and poor wireless link quality.
A. ROUTE DISCOVERY OF MSR:
Multipath split routing builds multi routes
using request/reply cycles. When source
needs routes to the destination but no route
information is known, it overflows the route
request message (RREQ) to the entire
network. Due to the packet overflow, several
replicate that spanned through different
routes to reach the destination. The
destination node selects multiple disjoint [5]
routes and sends route reply (RREP) packets
back to the source through the selected
routes.
4.2 THE FINITE STATE MACHINE MODEL:
In the proposed mechanism, the messages
corresponding to a RREQ flooding and the
uni-cast RREP are referred to as a message
unit. It is clear that no node in the network
can observe all the transmission in a
message unit. The subset of a message unit
that a node can observe is referred to as the
local message unit (LMU). The LMU for a
particular node consists of the messages
transmitted by the node and its neighbors,
and the messages overheard by the node.
The selfish node detection is done based on
data collected by each node from its
observed LMUs. For each message
transmission in an LMU, a node maintains a
record of its sender, and the receiver, and the
neighbor nodes that receive the RREQ
broadcast sent by the node itself.
The finite state machine depicts various
states
355
INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
ISBN: 378 - 26 - 138420 - 5
www.iaetsd.in
1. Init – in intial phase no RREQ is
observed.
2. Unexp RREP- receiving a RREP RREQ is
not observed.
3. Recv RREQ- acknowledgment of RREQ
is observed.
4. Frwd RREQ- distribute of a RREQ is
observed.
5. Timeout RREQ – Timeout after receiving
RREQ.
6. Recv RREP- Receipt of RREP is
observed.
7. LMU complete- forwarding a valid RREP
is observed.
8. Timeout RREP-Timeout after receipt of a
RREP.
In which a node may exist for each LMU [12].
The final states are shaded. Each message
sent by a node causes a transition in each of
its neighbor’s finite state machine. The finite
state machine in one neighbor gives only a
local view of the activities of that node. It
does not in any way, reflects the overall
behavior of the node. The collaboration of
each neighbor node makes it possible to get
an accurate picture about the monitored
node’s behavior. In the rest of the paper, a
node being monitored by its neighbors is
referred to as a monitored node[8], and its
neighbors are referred to as a monitor node.
In the protocol, each node plays the dual role
of a monitor node and a monitored node. A
local message unit (LMU).Each monitor node
observes a series of interleaved LMUs for a
routing session. Each LMU can be identified
by the source-destination pair contained in a
RREQ message. At the start of a routing
session, a monitored node is at the state 1 in
its finite state machine. As the monitor
node(s) observes the behavior of the
monitored node based on the LMUs, it
records transitions form its initial state 1 to
one of its possible final states -- 5, 7 and 8.
When a monitor node broadcasts a RREQ, it
assumes that the monitored node has
received it. The monitor node, therefore,
records a state transition 1->3 for the
monitored node’s finite state machine. If a
monitor node observes a monitored node to
broadcast a RREQ, then a state transition of
3->4 is recorded if the RREQ message was
previously sent by the monitor node to the
monitored node; otherwise a transition of 1->
4 is recorded since in this case, the RREQ
was received by the monitored node from
some other neighbor. The transition to a
timeout state occurs when a monitor node
finds no activity of the monitored node for the
LMU before the expiry of a timer. When a
monitor node observes a monitored node to
forward a RREP, it records a transition to the
Fig 1 : Finite state machine of a monitored node
356
INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
ISBN: 378 - 26 - 138420 - 5
www.iaetsd.in
final state – LMU complete (State No 7). At
this state, the monitored node becomes a
candidate for inclusion on a routing path.
When the final state is reached, the state
machine terminates and the state transitions
are stored by each node for each neighbor.
After sufficient number of events is collected,
a statistical analysis is performed to detect
the presence of any selfish nodes.
Above fig: depicts an example of LMU
observed by the node N during the discovery
of a route from the source node S to the
destination node D indicated by bold lines.
Table 1 shows the events observed by node
N and the corresponding state transitions for
each of its three neighbor nodes X, Y and Z.
Neighbor Events
State
changes
X
X broadcasts RREQ.
N broadcasts RREQ.
N sends RREP to X.
X sends RREP to S.
1to 4
4to 4
4to 6
6to 7
Y
Y broadcasts RREQ.
N broadcasts RREQ.
Timeout
1to 4
4to 4
4to5
Z
N broadcasts RREQ.
Z broadcasts RREQ.
Z sends RREP to N
1to3
3 to4
4to7
Table 1: The state transitions of the neighbor
nodes of node N
4.3 4.3 CLUSTERING ALGORITHM:
For clustering mesh networks need to
perform two phases clustering setup and
clustering maintenance .The first phase is
accomplished by choosing some nodes that
act as coordinators of the clustering process
(cluster heads). Then a cluster is formed by
associating a cluster head with some of its
neighbors that become the ordinary nodes of
the cluster. Based on the ID’ s and the
knowledge of the neighbor’s and the obtained
clustering has different properties with
respect to the initial one. Introducing
clustering algorithm suitable for both the
clustering set up and maintenance.
Distributed Mobility-Adaptive Clustering
(DMAC, for short) algorithm we obtain the
following properties.
 Nodes can move even in the clustering
setup DMAC is adaptive it can changes in the
topology of the network, remove any node
from the network.
 DMAC is fully distributed. A node
decides its own role (i.e., cluster head or
ordinary node) solely knowing its current one
hop neighbors.
 Every ordinary node always has direct
access to at least one cluster head. Thus, the
nodes in the cluster are at most two hops
apart. This guarantees fast intra-cluster
communication and fast inter-cluster
exchange of information between any pair of
Fig 2: An example local message unit
(LMU) observed by node N
357
INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
ISBN: 378 - 26 - 138420 - 5
www.iaetsd.in
nodes.
 DMAC uses a general mechanism for the
selection of the cluster heads. The choice is
now based on generic weights associated
with the nodes.
 The number of cluster heads that are
allowed to be neighbors is a parameter of the
algorithm
4.4 KEY UPDATING UPON
CLUSTERING CHEATER NODES:
In the MCBP (minimum cost blocking
problems) whether the nodes in the network
were attacked by the opponent are identified.
Before packet is sending a node has been
checking whether the neighboring nodes
were attacked by the cheater. If any of the
nodes in the network were attacked, then
node must comprise and choose another
path to send the packet.
Even though compromising the node doesn’t
changes the cheaters behavior, grasping the
topological information, Packet details. So
here we are introducing the key update
algorithms after clustering the misbehaving
node[10] from the authorized ones in the
wireless mesh networks.
Here in the key update algorithms we are
reconstructing the group key, including key
pieces algorithm.
i. Key Update:
Following are several conditions in which the
group key needs to be updated.
(1) A new mesh router connects to the
backbone network.
(2) An existing mesh router leaves the
backbone network.
(3) A cheater is detected in the network
before packets are sent by the source, if any
attacker present in the network it shows an
indication about the opponent.
To prevent a mobile attacker from breaking t
key pieces, every key piece should be
updated within a defined cycle T. Only after at
least t key pieces are obtained in the same
cycle, can the secret be reconstructed. Key
update involves the following four steps:
(1) The offline CA (Administrator center) is
aroused in the network.
(2).The CA constructs a new group key SK 
and selects new polynomial f (x) .The new
key pieces (di, SKi) are calculated and
delivered to n selected mesh routers. Then,
the CA disconnects itself from the network
and remains offline.
3) A mesh router requests (t-1) key pieces
from other mesh routers.
(4).After t key pieces are collected; the mesh
router reconstructs the new group key SK ,
d which cheater detection and identification
can be carried out as described.
5. CONCLUSION:
This paper concentrates on avoiding the
opponent in the network, identifying the
misbehaving nodes within the mesh networks
clustering the misbehaving nodes and the
authenticated persons separately. By finite
state machine observing the states of the
adversary nodes in the network, due to these
358
INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL ASSOCIATION OF ENGINEERING  TECHNOLOGY FOR SKILL DEVELOPMENT
ISBN: 378 - 26 - 138420 - 5
www.iaetsd.in
observation defines how it is behaving and
comparing both the authorized and opponent.
While delivering packet from the source to the
destination we need to secure the packet by
using some cryptographic techniques by
providing key to the packet. Introducing the
group key reconstruction algorithms gives
betterment in the delivery of packet before
clustering the adversary node from the
wireless mesh networks. Further we can
make simulations on these group key
reconstruction algorithms and the earlier
algorithms and additional clustering
techniques may be introduces.
6. REFERENCES:
[1].S. Mueller, R. Tsang, and D. Ghosal,
“Multipath routing in mo-bile ad hoc networks:
Issues and challenges,” in In Performance
Tools and Applications to Networked
Systems, volume 2965 of LNCS. Springer-
Verlag, 2004, pp. 209–234.
[2].Pavan kumar T, Ramesh Babu B,
Rajasekhar rao K, Dinesh Gopalni “cluster
based routing protocol for cognitive radio
wireless mesh networks”.
[3].Ann lee and Paul A.S Ward “A study of
routing algorithms in wireless mesh
networks”.
[4]. Nikos Dimokas, Dimitrios Katsaris, Yannis
Manolopoulos.”Node clustering in wireless
sensor networks by considering structural
characteristics of the network graph”.
[5].Jaydip Sen. Innovation labs “Security and
privacy issues in wireless mesh networks”.
[6].“A length-flexible threshold cryptosystem
with applications,” in Proceedings of the 8th
Australasian conference on Information
security and privacy, ser. ACISP’03. Berlin,
Heidelberg: Springer-Verlag, 2003, pp. 350–
364.
[7]. L. Ertaul and N. Chavan, “Security of ad
hoc networks and threshold cryptography,” in
Wireless Networks, Communications and
Mobile Computing, 2005 International
Conference on, vol. 1, June 2005, pp. 69 –
74
[8]. M. A. Moustafa, M. A. Youssef, and M. N.
El-Derini, “MSR: A multipath secure reliable
routing protocol for WSNs,” in Computer
Systems and Applications (AICCSA), 2011
9th IEEE/ACS Interna-tional Conference on,
December 2011, pp. 54 –59.
[9]. D. Ganesan, R. Govindan, S. Shenker,
and D. Estrin, “Highly-resilient, energy-
efficient multipath routing in wireless sensor
networks,” SIGMOBILE Mob. Comput.
Commun. Rev., vol. 5, pp. 11–25, October
2001.
[10]. J. R. Douceur, “The Sybil attack,” in
Peer-to-Peer Systems, First International
Workshop, IPTPS 2002, Cambridge, MA,
USA, March 7-8, 2002, Revised Papers.
Springer, 2002, pp. 251–260.
359
INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL ASSOCIATION OF ENGINEERING  TECHNOLOGY FOR SKILL DEVELOPMENT
ISBN: 378 - 26 - 138420 - 5
www.iaetsd.in

More Related Content

What's hot

Secon2007 bsmr
Secon2007 bsmrSecon2007 bsmr
Secon2007 bsmr
chandan_v8
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
irjes
 
Behavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant networkBehavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant network
Bittu Roy
 

What's hot (19)

Secon2007 bsmr
Secon2007 bsmrSecon2007 bsmr
Secon2007 bsmr
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
Security Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area NetworksSecurity Key Management Model for Low Rate Wireless Personal Area Networks
Security Key Management Model for Low Rate Wireless Personal Area Networks
 
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
02 1 nov17 28apr17 6333 17460-1-ed edit iqbal
 
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Mult...
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
Lt2520382043
Lt2520382043Lt2520382043
Lt2520382043
 
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...Correlation Associativity b/w Sensor Information Network Architecture & Softw...
Correlation Associativity b/w Sensor Information Network Architecture & Softw...
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
E42043640
E42043640E42043640
E42043640
 
Behavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant networkBehavioral malware detection in delay tolerant network
Behavioral malware detection in delay tolerant network
 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
 
Serial Communication Interface with Error Detection
Serial Communication Interface with Error DetectionSerial Communication Interface with Error Detection
Serial Communication Interface with Error Detection
 
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
SR-Code: Smart Relay Network Coding for Data Collection for Wireless Sensor N...
 
An overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networksAn overview of contemporary security problems in wireless mesh networks
An overview of contemporary security problems in wireless mesh networks
 
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
Efficient Secure Multi-Neuron Attack Defensive and Routing Security Technique...
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 

Viewers also liked

Iaetsd design and implementation of intelligent
Iaetsd design and implementation of intelligentIaetsd design and implementation of intelligent
Iaetsd design and implementation of intelligent
Iaetsd Iaetsd
 
Iaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloudIaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloud
Iaetsd Iaetsd
 
Iaetsd vlsi implementation of spatial modulation receiver
Iaetsd vlsi implementation of spatial modulation receiverIaetsd vlsi implementation of spatial modulation receiver
Iaetsd vlsi implementation of spatial modulation receiver
Iaetsd Iaetsd
 
Iaetsd robo control sytsem design using arm
Iaetsd robo control sytsem design using armIaetsd robo control sytsem design using arm
Iaetsd robo control sytsem design using arm
Iaetsd Iaetsd
 
Iaetsd performance analysis of multicarrier ds-cdma
Iaetsd performance analysis of multicarrier ds-cdmaIaetsd performance analysis of multicarrier ds-cdma
Iaetsd performance analysis of multicarrier ds-cdma
Iaetsd Iaetsd
 
Iaetsd single-phase single-stage multi-level ac–dc
Iaetsd single-phase single-stage multi-level ac–dcIaetsd single-phase single-stage multi-level ac–dc
Iaetsd single-phase single-stage multi-level ac–dc
Iaetsd Iaetsd
 
Iaetsd fpga implementation of various security based tollgate system using anpr
Iaetsd fpga implementation of various security based tollgate system using anprIaetsd fpga implementation of various security based tollgate system using anpr
Iaetsd fpga implementation of various security based tollgate system using anpr
Iaetsd Iaetsd
 
Iaetsd design and implementation of pseudo random number generator
Iaetsd design and implementation of pseudo random number generatorIaetsd design and implementation of pseudo random number generator
Iaetsd design and implementation of pseudo random number generator
Iaetsd Iaetsd
 
Iaetsd integration of distributed solar power generation
Iaetsd integration of distributed solar power generationIaetsd integration of distributed solar power generation
Iaetsd integration of distributed solar power generation
Iaetsd Iaetsd
 
Iaetsd identifying and preventing resource depletion attack in
Iaetsd identifying and preventing resource depletion attack inIaetsd identifying and preventing resource depletion attack in
Iaetsd identifying and preventing resource depletion attack in
Iaetsd Iaetsd
 
Iaetsd wavelet transform based latency optimized image compression for
Iaetsd wavelet transform based latency optimized image compression forIaetsd wavelet transform based latency optimized image compression for
Iaetsd wavelet transform based latency optimized image compression for
Iaetsd Iaetsd
 

Viewers also liked (16)

Iaetsd design and implementation of intelligent
Iaetsd design and implementation of intelligentIaetsd design and implementation of intelligent
Iaetsd design and implementation of intelligent
 
Iaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloudIaetsd secure data storage against attacks in cloud
Iaetsd secure data storage against attacks in cloud
 
Iaetsd vlsi implementation of spatial modulation receiver
Iaetsd vlsi implementation of spatial modulation receiverIaetsd vlsi implementation of spatial modulation receiver
Iaetsd vlsi implementation of spatial modulation receiver
 
Iaetsd automated dam monitering system
Iaetsd automated dam monitering systemIaetsd automated dam monitering system
Iaetsd automated dam monitering system
 
Rick Technologies Profile
Rick Technologies ProfileRick Technologies Profile
Rick Technologies Profile
 
Iaetsd robo control sytsem design using arm
Iaetsd robo control sytsem design using armIaetsd robo control sytsem design using arm
Iaetsd robo control sytsem design using arm
 
Quicksand - Credentials 2015
Quicksand - Credentials 2015Quicksand - Credentials 2015
Quicksand - Credentials 2015
 
Iaetsd gesture
Iaetsd gestureIaetsd gesture
Iaetsd gesture
 
Iaetsd performance analysis of multicarrier ds-cdma
Iaetsd performance analysis of multicarrier ds-cdmaIaetsd performance analysis of multicarrier ds-cdma
Iaetsd performance analysis of multicarrier ds-cdma
 
Iaetsd single-phase single-stage multi-level ac–dc
Iaetsd single-phase single-stage multi-level ac–dcIaetsd single-phase single-stage multi-level ac–dc
Iaetsd single-phase single-stage multi-level ac–dc
 
Iaetsd fpga implementation of various security based tollgate system using anpr
Iaetsd fpga implementation of various security based tollgate system using anprIaetsd fpga implementation of various security based tollgate system using anpr
Iaetsd fpga implementation of various security based tollgate system using anpr
 
Iaetsd design and implementation of pseudo random number generator
Iaetsd design and implementation of pseudo random number generatorIaetsd design and implementation of pseudo random number generator
Iaetsd design and implementation of pseudo random number generator
 
Iaetsd integration of distributed solar power generation
Iaetsd integration of distributed solar power generationIaetsd integration of distributed solar power generation
Iaetsd integration of distributed solar power generation
 
Iaetsd identifying and preventing resource depletion attack in
Iaetsd identifying and preventing resource depletion attack inIaetsd identifying and preventing resource depletion attack in
Iaetsd identifying and preventing resource depletion attack in
 
Quicksand's FoodLAB
Quicksand's FoodLABQuicksand's FoodLAB
Quicksand's FoodLAB
 
Iaetsd wavelet transform based latency optimized image compression for
Iaetsd wavelet transform based latency optimized image compression forIaetsd wavelet transform based latency optimized image compression for
Iaetsd wavelet transform based latency optimized image compression for
 

Similar to Iaetsd key reconstruction and clustering opponent nodes in minimum cost

A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
BRNSSPublicationHubI
 
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...
IJCNCJournal
 
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...
IJCNCJournal
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing Protocols
Amanda Brady
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
Amy Moore
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
eSAT Journals
 

Similar to Iaetsd key reconstruction and clustering opponent nodes in minimum cost (20)

A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
 
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
To Design a Hybrid Algorithm to Detect and Eliminate Wormhole Attack in Wirel...
 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a review
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 
Seminar PPT-4.pptx
Seminar PPT-4.pptxSeminar PPT-4.pptx
Seminar PPT-4.pptx
 
Security issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc NetworksSecurity issues in Mobile Ad-Hoc Networks
Security issues in Mobile Ad-Hoc Networks
 
Lt2520382043
Lt2520382043Lt2520382043
Lt2520382043
 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
 
Review on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETsReview on security issues of AODV routing protocol for MANETs
Review on security issues of AODV routing protocol for MANETs
 
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...
SECURE ROUTING PROTOCOL TO MITIGATE ATTACKS BY USING BLOCKCHAIN TECHNOLOGY IN...
 
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in...
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing Protocols
 
Reliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLANReliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLAN
 
Secure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor NetworksSecure Data Aggregation Of Wireless Sensor Networks
Secure Data Aggregation Of Wireless Sensor Networks
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...Designing an opportunistic routing scheme for adaptive clustering in mobile a...
Designing an opportunistic routing scheme for adaptive clustering in mobile a...
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
 
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
 
Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...Malicious attack detection and prevention in ad hoc network based on real tim...
Malicious attack detection and prevention in ad hoc network based on real tim...
 

More from Iaetsd Iaetsd

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
Iaetsd Iaetsd
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
Iaetsd Iaetsd
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
Iaetsd Iaetsd
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
Iaetsd Iaetsd
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
Iaetsd Iaetsd
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
Iaetsd Iaetsd
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
Iaetsd Iaetsd
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
Iaetsd Iaetsd
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
Iaetsd Iaetsd
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
Iaetsd Iaetsd
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
Iaetsd Iaetsd
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
Iaetsd Iaetsd
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
Iaetsd Iaetsd
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
Iaetsd Iaetsd
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
Iaetsd Iaetsd
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
Iaetsd Iaetsd
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
Iaetsd Iaetsd
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
Iaetsd Iaetsd
 

More from Iaetsd Iaetsd (20)

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
 

Recently uploaded

Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
hublikarsn
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
meharikiros2
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
mphochane1998
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (20)

8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 

Iaetsd key reconstruction and clustering opponent nodes in minimum cost

  • 1. Key Reconstruction and clustering opponent nodes in Minimum Cost Blocking Problems D.Sireesha ASCET M.Tech(CSE) Siri3835@gmail.com Prof C.Rajendra srirajendra.c@gmail.com ABSTRACT: This paper detects malicious activities on wireless mesh networks with wireless routing protocols. Upon the selection of route discovery malicious attacks are ahead to compromise the nodes such as network partitioning, node isolation activities .The cardinal covering in the routing protocols address the packets in the network. When attacks are take place by the opponent, negotiate the attacker node and choose another way to send the packet from source to destination .But it can’t be moved from the wireless network. Here proposing, looking into the Clustering protocols along with id-based key update protocols, which is very predicting in wireless networks. Cryptography techniques improvise the packet in an assured way from source to destination and it doesn’t render to secure the network/system. Keywords: Wirelessmeshnetworks, clustering, MSR protocol, adversary nodes, updating key. 1. INTORDUCTION: Wireless mesh networks (WMN’S) issued as a bright conception to meet the disputes on succeeding generation wireless networks. Providing flexibility, adaptability, reconfigurable the network upon the cost- efficient solutions to service provider. It has the possibility to wipe out many of these disadvantages like low-cost, wireless broad band internet access for both wired and mobile nodes. Wireless mesh networks are an emerging technology right now. The use of mesh wireless networks may bring the dream of a seamlessly connected world into reality. Wireless mesh Networks includes mesh routers and mesh clients. Getting rid of the wires from the wireless LAN’s, doubling the access point is known as mesh routers and it forms a backbone network. A mesh network can be designed using a flooding technique or a routing technique.[3] When using a routing technique, the message is propagated along a path, by hopping from node to node until the destination is reached. To ensure all its paths' availability, a routing network must allow for continuous 352 INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT ISBN: 378 - 26 - 138420 - 5 www.iaetsd.in
  • 2. connections and reconfiguration around broken or blocked paths, using self- healing algorithms. A mesh network whose nodes are all connected to each other is a fully connected network. Mesh networks can be seen as one type of. Mobile adhoc networks (MANETs) [1] and mesh networks are therefore closely related. The mesh routers render a rich radio connectivity in which importantly brings down the direct deployment cost of the network. Mesh routers are usually stationary and it doesn’t have power constraint. Mesh clients are mobile nodes. Sometimes mesh routers can also act as gateways which are connected to the internet through a wired backbone. 2. RELATED WORK: Privacy and security plays a major role in the communication network for both wired and wireless network. Security issues related to the packet transmission from the source to the destination nodes. Securing the data from the opponent without changing the main thing. Different technologies are introduced to secure data from opponents by using clustering the different nodes in the mesh network. Clustering [4] and cryptography techniques are included for protecting packet from un-authorizers. It demonstrates the high quality of multipath routing protocols above traditional single path protocols in terms of resiliency under the attacks of blocking and node isolation types of attacks , particularly in wireless networks domain. Multi-path protocols for wireless mesh networks make it particularly hard for an adversary to effectively launch such attacks. Attempting to model the theoretical hardness of attacks on multi-path routing protocols for mobile nodes and qualify it in mathematical terms. The study will impact the areas of security and robustness of routing protocols of wireless mesh networks. [3], threshold cryptography and network coding. In previously, every node had a unique ID randomly, routing occurs through protocols such as greedy and LP algorithms. Problems incorporated in last investigations are if any opponent were hacked any of the nodes in the network, it can retrieve the packet before sending the destination. And one more consequence is about the topological information of the network, through that it may miss send the packet without permissions of authenticated nodes. To reduce these complications, here introducing the clustering concepts[4] were incorporated i.e. , grouping the nodes in the mesh networks after identifying the misbehaving node move out the effected node from the network again make clustering algorithms to group the nodes using MSR(multipath split routing) protocol. Again to protect data from adversary nodes introducing cryptographic key distributions techniques are integrated. Introducing the clustering algorithms to group the nodes in the mesh networks, giving different ID’s to the nodes. Grouping sensor nodes into clusters has been widely investigated by researchers 353 INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT ISBN: 378 - 26 - 138420 - 5 www.iaetsd.in
  • 3. in order to achieve the network system's scalability and management objectives. Every cluster would have a leader sensor node, often referred to as the cluster-head (CH), which can be fixed or variable. CHs aggregate the data collected by the sensor nodes in its cluster, thus, clustering decreases the number of relayed packets. As the benefits of clustering, it conserves communication bandwidth and avoids redundant exchange of messages among sensor nodes, because of limiting the inter- cluster interactions. Therefore, clustering prolongs the lifetime of WSNs [2][4]. (A).How does a mesh network works? While traditional networks rely on a small number of wired access points or wireless hotspots to connect users, a wireless mesh network spreads a network connection among dozens or even hundreds of wireless mesh nodes that "talk" to each other, sharing the network connection across a large area. Some think of the internet as being the world's largest mesh network. When using the internet, information travels by being bounced automatically from one router to the next until it reaches its destination. The internet has billions of potential paths across which data can travel. 3. PAPER ORGANIZATION: The rest of this paper is organized as follows section 4 discuss the implementation process, section 4.1 introducing the finite state machine to record the details of nodes behavior, section 4.2 presents the clustering algorithm implementation details, section 4.3 discuss key updating process after clustering adversary nodes section 5 concludes the paper with the future discussion. 4. IMPLEMENTATION: Wireless mesh networks integrating a key technology for next generation wireless networks showing rapid progress and numerous applications. In a WMN, high speed routers integrated with each other in a multi-hop fashion over wireless channels and form a broadband backhaul. In the previous analysis of the paper includes that in wireless mesh networks. Due to the delivery of packet from source to destination it should be send through secure path by providing a key to the packet. In WMN’s an adversary node involves in the network can know the details of topological information, obviously the routing details. In order to secure the packet from the opponent we need to reduce the way of adversary nodes about topological information[6] and providing another key to the packet. Here in this paper introducing the clustering and cryptographic key regeneration. Analyzing the node behavior whether it is acting in a normal way or not, it is possible by using finite state machine. Behavior of each node is noted in the table, clustering misbehaving nodes using a unique id and authorized one with another id’s. Upon creating different id’s for misbehaving nodes and authorized node packet details have to 354 INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT ISBN: 378 - 26 - 138420 - 5 www.iaetsd.in
  • 4. be modified. This is re-generating the key to protect data from opponents. Here introducing MSR protocol for generating the maximal disjoint paths in the network, and how the MSR is working upon the selection of routes in the network. To observer the behavior of the nodes incorporating finite state machine model. Examine each and every nodes behavior about the status of packet delivery and soon. The selfish node is identified in the network based on data collected by each node from its local message unit (LMU). Clustering the misbehaving nodes as a group and authorized one’s a group. Although grouping opponents doesn’t made packet in a secured way. Again providing a key is an important task to protect data i.e. re-generating algorithms are introduced to provide a key at the packet header. 4.1 MULTI-PATH SPLIT ROUTING: Multipath Split Routing (MSR) protocol that builds maximally disjoints paths. Multiple routes, of which one is the shortest delay path, are discovered on demand. Established routes are not necessarily of equal length. Data traffic is split into multiple routes to avoid congestion[5] and to use network resources efficiently. We believe providing multiple routes are beneficial in network communications, particularly in mobile wireless networks where routes are disconnected frequently because of mobility and poor wireless link quality. A. ROUTE DISCOVERY OF MSR: Multipath split routing builds multi routes using request/reply cycles. When source needs routes to the destination but no route information is known, it overflows the route request message (RREQ) to the entire network. Due to the packet overflow, several replicate that spanned through different routes to reach the destination. The destination node selects multiple disjoint [5] routes and sends route reply (RREP) packets back to the source through the selected routes. 4.2 THE FINITE STATE MACHINE MODEL: In the proposed mechanism, the messages corresponding to a RREQ flooding and the uni-cast RREP are referred to as a message unit. It is clear that no node in the network can observe all the transmission in a message unit. The subset of a message unit that a node can observe is referred to as the local message unit (LMU). The LMU for a particular node consists of the messages transmitted by the node and its neighbors, and the messages overheard by the node. The selfish node detection is done based on data collected by each node from its observed LMUs. For each message transmission in an LMU, a node maintains a record of its sender, and the receiver, and the neighbor nodes that receive the RREQ broadcast sent by the node itself. The finite state machine depicts various states 355 INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT ISBN: 378 - 26 - 138420 - 5 www.iaetsd.in
  • 5. 1. Init – in intial phase no RREQ is observed. 2. Unexp RREP- receiving a RREP RREQ is not observed. 3. Recv RREQ- acknowledgment of RREQ is observed. 4. Frwd RREQ- distribute of a RREQ is observed. 5. Timeout RREQ – Timeout after receiving RREQ. 6. Recv RREP- Receipt of RREP is observed. 7. LMU complete- forwarding a valid RREP is observed. 8. Timeout RREP-Timeout after receipt of a RREP. In which a node may exist for each LMU [12]. The final states are shaded. Each message sent by a node causes a transition in each of its neighbor’s finite state machine. The finite state machine in one neighbor gives only a local view of the activities of that node. It does not in any way, reflects the overall behavior of the node. The collaboration of each neighbor node makes it possible to get an accurate picture about the monitored node’s behavior. In the rest of the paper, a node being monitored by its neighbors is referred to as a monitored node[8], and its neighbors are referred to as a monitor node. In the protocol, each node plays the dual role of a monitor node and a monitored node. A local message unit (LMU).Each monitor node observes a series of interleaved LMUs for a routing session. Each LMU can be identified by the source-destination pair contained in a RREQ message. At the start of a routing session, a monitored node is at the state 1 in its finite state machine. As the monitor node(s) observes the behavior of the monitored node based on the LMUs, it records transitions form its initial state 1 to one of its possible final states -- 5, 7 and 8. When a monitor node broadcasts a RREQ, it assumes that the monitored node has received it. The monitor node, therefore, records a state transition 1->3 for the monitored node’s finite state machine. If a monitor node observes a monitored node to broadcast a RREQ, then a state transition of 3->4 is recorded if the RREQ message was previously sent by the monitor node to the monitored node; otherwise a transition of 1-> 4 is recorded since in this case, the RREQ was received by the monitored node from some other neighbor. The transition to a timeout state occurs when a monitor node finds no activity of the monitored node for the LMU before the expiry of a timer. When a monitor node observes a monitored node to forward a RREP, it records a transition to the Fig 1 : Finite state machine of a monitored node 356 INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT ISBN: 378 - 26 - 138420 - 5 www.iaetsd.in
  • 6. final state – LMU complete (State No 7). At this state, the monitored node becomes a candidate for inclusion on a routing path. When the final state is reached, the state machine terminates and the state transitions are stored by each node for each neighbor. After sufficient number of events is collected, a statistical analysis is performed to detect the presence of any selfish nodes. Above fig: depicts an example of LMU observed by the node N during the discovery of a route from the source node S to the destination node D indicated by bold lines. Table 1 shows the events observed by node N and the corresponding state transitions for each of its three neighbor nodes X, Y and Z. Neighbor Events State changes X X broadcasts RREQ. N broadcasts RREQ. N sends RREP to X. X sends RREP to S. 1to 4 4to 4 4to 6 6to 7 Y Y broadcasts RREQ. N broadcasts RREQ. Timeout 1to 4 4to 4 4to5 Z N broadcasts RREQ. Z broadcasts RREQ. Z sends RREP to N 1to3 3 to4 4to7 Table 1: The state transitions of the neighbor nodes of node N 4.3 4.3 CLUSTERING ALGORITHM: For clustering mesh networks need to perform two phases clustering setup and clustering maintenance .The first phase is accomplished by choosing some nodes that act as coordinators of the clustering process (cluster heads). Then a cluster is formed by associating a cluster head with some of its neighbors that become the ordinary nodes of the cluster. Based on the ID’ s and the knowledge of the neighbor’s and the obtained clustering has different properties with respect to the initial one. Introducing clustering algorithm suitable for both the clustering set up and maintenance. Distributed Mobility-Adaptive Clustering (DMAC, for short) algorithm we obtain the following properties.  Nodes can move even in the clustering setup DMAC is adaptive it can changes in the topology of the network, remove any node from the network.  DMAC is fully distributed. A node decides its own role (i.e., cluster head or ordinary node) solely knowing its current one hop neighbors.  Every ordinary node always has direct access to at least one cluster head. Thus, the nodes in the cluster are at most two hops apart. This guarantees fast intra-cluster communication and fast inter-cluster exchange of information between any pair of Fig 2: An example local message unit (LMU) observed by node N 357 INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT ISBN: 378 - 26 - 138420 - 5 www.iaetsd.in
  • 7. nodes.  DMAC uses a general mechanism for the selection of the cluster heads. The choice is now based on generic weights associated with the nodes.  The number of cluster heads that are allowed to be neighbors is a parameter of the algorithm 4.4 KEY UPDATING UPON CLUSTERING CHEATER NODES: In the MCBP (minimum cost blocking problems) whether the nodes in the network were attacked by the opponent are identified. Before packet is sending a node has been checking whether the neighboring nodes were attacked by the cheater. If any of the nodes in the network were attacked, then node must comprise and choose another path to send the packet. Even though compromising the node doesn’t changes the cheaters behavior, grasping the topological information, Packet details. So here we are introducing the key update algorithms after clustering the misbehaving node[10] from the authorized ones in the wireless mesh networks. Here in the key update algorithms we are reconstructing the group key, including key pieces algorithm. i. Key Update: Following are several conditions in which the group key needs to be updated. (1) A new mesh router connects to the backbone network. (2) An existing mesh router leaves the backbone network. (3) A cheater is detected in the network before packets are sent by the source, if any attacker present in the network it shows an indication about the opponent. To prevent a mobile attacker from breaking t key pieces, every key piece should be updated within a defined cycle T. Only after at least t key pieces are obtained in the same cycle, can the secret be reconstructed. Key update involves the following four steps: (1) The offline CA (Administrator center) is aroused in the network. (2).The CA constructs a new group key SK and selects new polynomial f (x) .The new key pieces (di, SKi) are calculated and delivered to n selected mesh routers. Then, the CA disconnects itself from the network and remains offline. 3) A mesh router requests (t-1) key pieces from other mesh routers. (4).After t key pieces are collected; the mesh router reconstructs the new group key SK , d which cheater detection and identification can be carried out as described. 5. CONCLUSION: This paper concentrates on avoiding the opponent in the network, identifying the misbehaving nodes within the mesh networks clustering the misbehaving nodes and the authenticated persons separately. By finite state machine observing the states of the adversary nodes in the network, due to these 358 INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY INTERNATIONAL ASSOCIATION OF ENGINEERING TECHNOLOGY FOR SKILL DEVELOPMENT ISBN: 378 - 26 - 138420 - 5 www.iaetsd.in
  • 8. observation defines how it is behaving and comparing both the authorized and opponent. While delivering packet from the source to the destination we need to secure the packet by using some cryptographic techniques by providing key to the packet. Introducing the group key reconstruction algorithms gives betterment in the delivery of packet before clustering the adversary node from the wireless mesh networks. Further we can make simulations on these group key reconstruction algorithms and the earlier algorithms and additional clustering techniques may be introduces. 6. REFERENCES: [1].S. Mueller, R. Tsang, and D. Ghosal, “Multipath routing in mo-bile ad hoc networks: Issues and challenges,” in In Performance Tools and Applications to Networked Systems, volume 2965 of LNCS. Springer- Verlag, 2004, pp. 209–234. [2].Pavan kumar T, Ramesh Babu B, Rajasekhar rao K, Dinesh Gopalni “cluster based routing protocol for cognitive radio wireless mesh networks”. [3].Ann lee and Paul A.S Ward “A study of routing algorithms in wireless mesh networks”. [4]. Nikos Dimokas, Dimitrios Katsaris, Yannis Manolopoulos.”Node clustering in wireless sensor networks by considering structural characteristics of the network graph”. [5].Jaydip Sen. Innovation labs “Security and privacy issues in wireless mesh networks”. [6].“A length-flexible threshold cryptosystem with applications,” in Proceedings of the 8th Australasian conference on Information security and privacy, ser. ACISP’03. Berlin, Heidelberg: Springer-Verlag, 2003, pp. 350– 364. [7]. L. Ertaul and N. Chavan, “Security of ad hoc networks and threshold cryptography,” in Wireless Networks, Communications and Mobile Computing, 2005 International Conference on, vol. 1, June 2005, pp. 69 – 74 [8]. M. A. Moustafa, M. A. Youssef, and M. N. El-Derini, “MSR: A multipath secure reliable routing protocol for WSNs,” in Computer Systems and Applications (AICCSA), 2011 9th IEEE/ACS Interna-tional Conference on, December 2011, pp. 54 –59. [9]. D. Ganesan, R. Govindan, S. Shenker, and D. Estrin, “Highly-resilient, energy- efficient multipath routing in wireless sensor networks,” SIGMOBILE Mob. Comput. Commun. Rev., vol. 5, pp. 11–25, October 2001. [10]. J. R. Douceur, “The Sybil attack,” in Peer-to-Peer Systems, First International Workshop, IPTPS 2002, Cambridge, MA, USA, March 7-8, 2002, Revised Papers. Springer, 2002, pp. 251–260. 359 INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY INTERNATIONAL ASSOCIATION OF ENGINEERING TECHNOLOGY FOR SKILL DEVELOPMENT ISBN: 378 - 26 - 138420 - 5 www.iaetsd.in