SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.1, January 2012
DOI : 10.5121/ijp2p.2012.3102 11
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC:
STEALTHY ATTACK DETECTION AND
COUNTERMEASURE
Prof. Anil Kadam, Ms. Supriya Ghadage, Ms. Naina Verma , Ms. Nikita Sarvade
And Swati chouhan
Department of Computer Engineering, Pune University, Pune, India.
supriya0633@yahoo.com
kadam_in@yahoo.com
ABSTRACT
In this paper we are providing a implementation details about simulated solution of stealthy packet drop
attack. Stealthy packet drop attack is a suite of four attack types, includes colluding collision, packet
misrouting, identity delegation and power control. Stealthy packet drop attacks disrupts the packet from
reaching to it’s destination through malicious behaviour. These attacks can be easily breakdown the
multi-hop wireless ad-hoc networks. Most widely preferred method for detecting attacks in wireless
network is behaviour based detection method. In this method a normal network overhears
communication from its neighbourhood. Here we are implementing a SADEC protocol which is
proposed solution of stealthy packet drop attacks. SADEC overlaid the base line local monitoring. In
base line local monitoring each neighbour maintains additional information about routing path also it
adds some checking responsibility to all its neighbours. SADEC proves more efficient than baseline local
monitoring to mitigate successfully all the stealthy attack types.
KEYWORDS
Misrouting, colluding collision, , identity delegation, wireless ad-hoc network, local monitoring
1. INTRODUCTION
Now a day’s wireless networks are becoming more preferable platforms in many domains but
security in wireless is very less as compare to wired (traditional) network. They are becoming
important platform for command and control of civilian critical infrastructure and military
warfare. Stealthy packet drop attack is a latest threat to wireless ad-hoc networks. Here
malicious node evades detection and legitimate node treated as malicious node.
It is suite of four attack types which includes:
1. Misrouting: malicious node misroutes the packet to wrong next hop.
2. Colluding collision: Malicious node with help of its colluding partner over flood the
valid next hop resulting in packet drop.
3. Transmission power control: malicious node controls the transmission to its nearest
neighbor which is not valid next hop and results in packet drop.
4. Identity delegation: Delegate the relay responsibility to its colluding partner which is
close to sender.
To detect such attacks such as wormholes and rushing attacks, traditional mechanism like
cryptography alone fails. In this paper we are providing a practical implementation details about
solution of stealthy packet drop attack is SADEC protocol. Most of researchers use a behaviour
based detection mechanism to detect such attacks. Behaviour based detection includes local
monitoring (e.g.[7][8]). SADEC also includes local monitoring but adds some checking
International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.1, January 2012
12
responsibility to each neighbour in wireless ad-hoc network along with each guard nodes over
the network. SADEC improves the efficiency of the wireless ad-hoc network over the base line
local monitoring [1].
Finally, in this paper section 2 contains related work; section 3 contains proposed practical
implementation solution to stealthy packet drop attacks. Section 4 contains technology going to
be used and features of this project and section 5 contains conclusion.
2. RELATED WORK
Recently, researchers have been exploring many mechanisms to ensure the security of data
and traffic in wireless networks. These mechanisms can be divided into the following
categories—integrity services and authentication, protocols that use dedicated hardware,
protocols that needs clear acknowledgments or use numerical methods. The course variety
techniques increase direction strength by first discovering multi way routes [2], [10] and then
using these routes to provide redundancy in the data transmission between a source and a
destination. The data are preset and divided into multiple shares sent to the target through
different paths. Moreover, many of these methods are pricey for resource-constrained networks
due to the data redundancy. Also, these protocols could be in hazard to direction sighting
attacks, such as the Sybil attack, that prevent the discovery of non adversarial paths.
The authors in [11] commence a technique called packet leashes that uses either fixed time
organization or region alertness via GPS hardware. A technique designed to differentiate
malicious behaviour regarding cautious dropping of data, relies on open affirmation for
recognized data using the equal channel [10], or an out-of-band conduit [12]. This method
would cause to be stealthy packet dropping assessable at the end point. The technique incurs
high broadcast overhead and have to be superior with other method for scrutiny and separation
of the malicious nodes.
Statistical dealings have been used by some researchers for discovery of malicious behaviour,
e.g., [13] to detect wormhole attacks. The concern of trust in ad hoc networks has been looked
by many researchers (e.g., [14], [15], [16], [17]). All of them use Dempster-Shafer belief theory
[18] to incorporate second-hand information which is reported by other nodes to make a
standing score of a node. Many approaches which are based on reputation (e.g., [17]) get suffer
from deprived protection against ballot stuffing which means a colluding malicious node
approving another malicious hop or bad mouthing which means a malicious hop implicating a
genuine hop. All the approaches which are based on reputation may get susceptible to
performance where a node is functioning correctly but providing incorrect information about a
further node or other node. All the approaches can undergo through non convergent behaviour.
For mitigating control and data forwarding misbehaviour in multi hop wireless networks, a
broadly used method is cooperative local monitoring [20], [9], [7], [8], [10]. The effort in [10]
provides a mechanism to determine paths with definite desirable properties, such as being node
put out of joint. Also the efforts in [8] provides discovery of a extensive class of control attacks
in opposition to static sensor networks. Though, all the performance-based mechanisms
including both communications based and non communication based, as used by researchers to
date, not succeed to diminish the stealthy packet drop attack. In [18], introduced the stealthy
packet dropping attacks and proposed a protocol called MISPAR to mitigate the attacks.
In this paper, we proposing a practical implementation of isolation of malicious nodes due to
both natural errors and framing. Furthermore, this paper provides a proposed implementation
details to assess the performance of both BLM and SADEC under-Misrouting and transmission
power control attacks.
International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.1, January 2012
13
3. PROPOSED SOLUTION
Figure1. Overview of stealthy attack
3.1. Misrouting
Figure 2(a). Diagram for Misrouting: packet drop attack
Figure 2(b). Expected Diagram to overcome misrouting packet drop
In figure 2(a) shows that source s sends packet (pkt) to next hop but if next hop is a malicious
node then it sends packet to wrong next hop and packet get dropped. To overcome such attack
type, in fig. 2(b), source s sends packet to next hop, even though next hop is malicious it can
not send packet to wrong hop. Packets get transmitted to valid destination. This can be achieved
through SADEC protocol as follows. The guard nodes over the region from source to
International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.1, January 2012
14
destination maintains verification table. Verification table contains the id of all nodes from
source node to destination node i.e. it indicates that which node should transmit packet to its
next valid hop. Take an example as shown in figure 3 that S is sending a data packet to
destination D through a route that includes <A, B, M, X, Y>.
The malicious node M cannot misroute the data packet received from B to another node other
than the next hop which is X as each guard of node M over the link B M has an entry in its
VT (verification table) which indicates X as the correct next hop. This fallout in an additional
scrutiny activity for the guard node involved in local monitoring, verifying that the data packet
is forwarded to the correct next hop, as indicated by the entry in the guard node’s VT.
Additionally, M cannot send another neighbour, say Q, by misrouting the packet to Q. The
guards of Q over M Q do not have an entry like <S, D, A, B, M, Q >.
Figure3. SADEC over misrouting
3.2. Colluding Collision
Figure 4.Diagram for Colluding collision: packet drop attack
International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.1, January 2012
15
3.3. Power control
Figure 5. Diagram for power control: packet drop attack
3.4. Identity delegation
Figure 6. Diagram for identity delegation: packet drop attack
Figure 7.Expected solution to overcome other stealthy attack types
Figure 4 shows colluding collision packet drop attack. In that source node S wants to send
packet to target node T. S sends packet to next hop M1. But as M1 is malicious, it coordinates
International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.1, January 2012
16
its transmission activity to its colluding partner M2. The colluding node M2 creates collision at
T. as a result node T unable to get packet which is relayed by M1 and packet get damaged.
Here, M1 successfully drops the packet and in effect legitimate node T accused of dropping the
packet by some of its guard nodes over the transmission region.
Fig 5 shows power control packet drop attack. Here, source node S sends packet to next hop
M1 which is malicious. M1 sends the packet to next hop but that not reaches to T i.e. controlled
transmission. Similarly in identity delegation packet drop attack as shown in figure 6 , attacker
node delegates the identity and credential of compromised node M1 to colluding node M2
which is close to sender node S. when S sends packet to M1, M2 delegates the identity of node
M1 and sends the packet. As a result target node T can’t hear the message as it not belongs to
region of M2. And legitimate node T gets accused of dropping the packet.
Solution to other three stealthy attack type is as shown in figure 7. We have to increase number
of guard nodes over the transmission region and adding some extra responsibility to each of the
node over network. Each node over the network need to maintain the count of number of
messages transmitted by its neighbour and has to announce number of packet it has transmitted
over particular period of time. Thus, the subset of guard nodes which had got the packet
forwarding would have a greater count than the nodes that did not hear the forwarding of
messages. By forcing a node to broadcast the number of messages it has forwarded over certain
period of time, a malicious node would have the difficulty of fulfilling two sets of neighbours
that look forward to hear different counts through a single broadcast.
4. TECHNOLOGY AND FEATURES
We are going to develop this project in software platform java (jdk1.7.0) with help of JPCAP
libraries. The features of this project are as follows:
1. This project provides security in wireless network from stealthy attack.
2. As stealthy attacks are becoming wide spread attack category, prevention of this attack not
possible with help of only traditional techniques like cryptography. With help of SADEC [1]
protocol efficiency of this project is greater than baseline local monitoring method (BLM).
3. SADEC maintains malicious node detection coverage 90% whereas BLM maintains
malicious node detection coverage < 60%. [1].
4. Legitimate node isolation in SADEC is < 2% whereas in BLM it is 99% <. [1].
5. SADEC can deliver 60% packets to valid destination. Whereas, BLM delivers < 10% packets
to valid destination
5. CONCLUSIONS
As wireless network threats are becoming more dangerous day by day, security in wireless is
most essential. SADEC mitigates all these attacks misrouting, colluding collision, identity
delegation, power control successfully with improved efficiency than base line local monitoring
scheme. SADEC uses local monitoring scheme and requires nodes to keep up supplementary
routing path information and also adds some checking task to each neighbour.
SADEC’s new detection approach expands the set of neighbours that are able to monitor in a
neighbourhood, thus making it more effective than BLM in sparse networks.
ACKNOWLEDGEMENTS
Our thanks to the experts who have contributed towards development of the stealthy attack and
its simulated solution. We would like to thank everyone, just everyone!
International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.1, January 2012
17
REFERENCES
[1] Issa Khalil and Saurabh Bagchi, “Stealthy Attacks in Wireless Ad Hoc Networks: Detection
and Countermeasure” IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO.
8, AUGUST 2011
[2] S.J. Lee and M. Gerla, “Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc
Networks,” Proc. IEEE Int’l Conf. Comm. (ICC ’01), pp. 3201-3205, 2001.
[3] I. Stojmenovic, Handbook of Sensor Networks: Algorithms and Architecture. Wiley, 2005.
[4] F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang, “A Two-Tier Data Dissemination Model for
Large-Scale Wireless Sensor Network,” Proc. Eighth ACM Ann. Conf. Mobile Computing and
Networking,pp. 148-159, 2002.
[5] C. Basile, Z. Kalbarczyk, and R.K. Iyer, “Neutralization of Errors and Attacks in Wireless Ad
Hoc Networks,” Proc. Int’l Conf. Dependable Systems and Networks (DSN ’05), pp. 518-527,
2005.
[7] I. Khalil, S. Bagchi, and N. Shroff, “LITEWORP: A Lightweight Countermeasure for the
Wormhole Attack in Multihop Wireless Networks,” Proc. Int’l Conf. Dependable Systems and
Networks (DSN ’05), pp. 612-621, 2005.
[8] I. Khalil, S. Bagchi, C. Nina-Rotaru, and N. Shroff, “UNMASK: Utilizing Neighbor
Monitoring for Attack Mitigation in MultihopWireless Sensor Networks,” Ad Hoc Networks,
vol. 8, no. 2, pp. 148-164, 2010.
[9] I. Khalil, S. Bagchi, and N.B. Shroff, “MOBIWORP: Mitigation ofthe Wormhole Attack in
Mobile Multihop Wireless Networks,”Ad Hoc Networks, vol. 6, no. 3, pp. 344-362, May 2008.
[10] B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H.Rubens, “ODSBR: An On-
Demand Secure Byzantine Resilient Routing Protocol for Wireless Ad Hoc Networks,” ACM
Trans.Information and System Security, vol. 10, no. 4, 2008.
[11] Y.C. Hu, A. Perrig, and D.B. Johnson, “Packet Leashes: A Defense against Wormhole Attacks
in Wireless Networks,” Proc. IEEE INFOCOM, pp. 1976-986, 2003.
[12] B. Carbunar, I. Ioannidis, and C. Nita-Rotaru, “JANUS: Towards Robust and Malicious
Resilient Routing in Hybrid Wireless Networks,” Proc. ACM Workshop Wireless Security
(WiSe ’04), pp. 11-20, 2004.
[13] “Statistical Wormhole Detection in Sensor Networks,” Lecture Notes in Computer Science, R.
Molva, G. Tsudik, and D. Westhoff, eds., pp. 128-141, 2005.
[14] A.A. Pirzada and C. McDonald, “Establishing Trust in Pure Ad-Hoc Networks,” Proc.
Australasian Conf. Computer Science (ACSC ’04), vol. 26, no. 1, pp. 47-54, 2004.v
[15] S. Buchegger and J.-Y. Le Boudec, “Performance Analysis of the CONFIDANT Protocol:
Cooperation Of Nodes-Fairness in Distributed Ad-Hoc NeTworks,” Proc. ACM MobiHoc, pp.
80-91, 2002.
[16] S. Buchegger and J.L. Boudec, “Robust Reputation System for P2P and Mobile Ad-Hoc
Networks,” Proc. Workshop Economics of Peer-to-Peer Systems, 2004.
[17] S. Ganeriwal, L.K. Balzano, and M.B. Srivastava, “Reputation-Based Framework for High
Integrity Sensor Networks,” ACM Trans. Sensor Networks, vol. 4, no. 3, pp. 1-37,
http://doi.acm.org/10.1145/1362542.1362546, May 2008.
[18] I. Khalil and S. Bagchi, “MISPAR: Mitigating Stealthy Packet Dropping in Locally-Monitored
Multi-Hop Wireless Ad Hoc Networks,” Proc. ACM Int’l Conf. Security and Privacy in Comm.
Networks (SecureComm ’08), http://doi.acm.org/10.1145/1460877.1460913, 2008.
[19] G. Shafer, A Mathematical Theory of Evidence. Princeton Univ., 1976.
International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.1, January 2012
18
[20] Y. Huang and W. Lee, “A Cooperative Intrusion Detection System for Ad Hoc Networks,”
Proc. ACM Workshop Security of Ad Hoc and Sensor Networks (SASN ’03), pp. 135-147,
2003
Authors
Prof. Anil Kadam (M.E.Computer Science), AISSMS College Of Engineering, Pune University, Pune,
Maharashtra, India.
Ms. Supriya N. Ghadage. (B.E.Computer Science), AISSMS College of Engineering, Pune University,
Pune, Maharashtra, India.
supriya0633@yahoo.com
Ms. Naina Verma (B.E. Computer Science), AISSMS College Of Engineering, Pune University, Pune,
Maharashtra, India. nainaverma15@yahoo.com
Ms. Swati Chouhan (B.E .Computer Science), AISSMS College of Engineering, Pune University, Pune,
Maharashtra, India. chouhanswati@yahoo.com
Ms. Nikita Sarvade (B.E. Computer Science), AISSMS College Of Engineering, Pune University, Pune,
Maharashtra, India.

More Related Content

What's hot

Limiting Self-Propagating Malware Based on Connection Failure Behavior
Limiting Self-Propagating Malware Based on Connection Failure Behavior Limiting Self-Propagating Malware Based on Connection Failure Behavior
Limiting Self-Propagating Malware Based on Connection Failure Behavior csandit
 
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETPDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETijsptm
 
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksDDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksIJNSA Journal
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks byranjith kumar
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...chennaijp
 
Limiting self propagating malware based
Limiting self propagating malware basedLimiting self propagating malware based
Limiting self propagating malware basedIJNSA Journal
 
Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...IISTech2015
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
A survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocolA survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocolAlexander Decker
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clusteringidescitation
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 

What's hot (16)

Limiting Self-Propagating Malware Based on Connection Failure Behavior
Limiting Self-Propagating Malware Based on Connection Failure Behavior Limiting Self-Propagating Malware Based on Connection Failure Behavior
Limiting Self-Propagating Malware Based on Connection Failure Behavior
 
I1802046780
I1802046780I1802046780
I1802046780
 
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETPDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
 
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksDDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks by
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
 
Limiting self propagating malware based
Limiting self propagating malware basedLimiting self propagating malware based
Limiting self propagating malware based
 
I1086066
I1086066I1086066
I1086066
 
Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...Defending against collaborative attacks by malicious nodes in manets a cooper...
Defending against collaborative attacks by malicious nodes in manets a cooper...
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
A survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocolA survey on mitigation methods to black hole attack on aodv routing protocol
A survey on mitigation methods to black hole attack on aodv routing protocol
 
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and ClusteringModified AODV Algorithm using Data Mining Process: Classification and Clustering
Modified AODV Algorithm using Data Mining Process: Classification and Clustering
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
B43040610
B43040610B43040610
B43040610
 

Similar to INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNTERMEASURE

PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPIOSR Journals
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Alexander Decker
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSpijans
 
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETSAN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETSIAEME Publication
 
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETSAN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETSIAEME Publication
 
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...pijans
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...ijsrd.com
 
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In ManetAn Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manetidescitation
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetijcsa
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKIJCNCJournal
 
Impact of Black Hole Attack on AODV Routing Protocol
Impact of Black Hole Attack on AODV Routing ProtocolImpact of Black Hole Attack on AODV Routing Protocol
Impact of Black Hole Attack on AODV Routing ProtocolZac Darcy
 
Impact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolImpact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolZac Darcy
 
A Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNA Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNiosrjce
 

Similar to INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNTERMEASURE (20)

PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOPReactive Routing approach for preventing wormhole attack using hybridized WHOP
Reactive Routing approach for preventing wormhole attack using hybridized WHOP
 
K1803036872
K1803036872K1803036872
K1803036872
 
Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...Elimination of wormhole attacker node in manet using performance evaluation m...
Elimination of wormhole attacker node in manet using performance evaluation m...
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKSCLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
CLUSTER BASED FIDELITY TO SECURE DSDV PROTOCOL AGAINST BLACK HOLE ATTACKS
 
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETSAN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
 
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETSAN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
AN ANALYSIS ON COOPERATIVE ATTACKS IN MANETS
 
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...S IMULATION  B ASED  S TUDY OF  C OOPERATIVE  B LACK  H OLE  A TTACK  R ESOLU...
S IMULATION B ASED S TUDY OF C OOPERATIVE B LACK H OLE A TTACK R ESOLU...
 
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
WDA: Wormhole Attack Detection Algorithm based on measuring Round Trip Delay ...
 
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In ManetAn Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
An Analytical Approach To Analyze The Impact Of Gray Hole Attacks In Manet
 
1716 1719
1716 17191716 1719
1716 1719
 
1716 1719
1716 17191716 1719
1716 1719
 
A novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manetA novel defence scheme against selfish Node attack in manet
A novel defence scheme against selfish Node attack in manet
 
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACKPERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
PERFORMANCE EVALUATION OF WIRELESS SENSOR NETWORK UNDER HELLO FLOOD ATTACK
 
ijaerv13n9_59.pdf
ijaerv13n9_59.pdfijaerv13n9_59.pdf
ijaerv13n9_59.pdf
 
Impact of Black Hole Attack on AODV Routing Protocol
Impact of Black Hole Attack on AODV Routing ProtocolImpact of Black Hole Attack on AODV Routing Protocol
Impact of Black Hole Attack on AODV Routing Protocol
 
Impact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolImpact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocol
 
A Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSNA Review of Network Layer Attacks and Countermeasures in WSN
A Review of Network Layer Attacks and Countermeasures in WSN
 

More from ijp2p

International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)ijp2p
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)ijp2p
 
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)ijp2p
 
7th International Conference on Networks, Communications, Wireless and Mobile...
7th International Conference on Networks, Communications, Wireless and Mobile...7th International Conference on Networks, Communications, Wireless and Mobile...
7th International Conference on Networks, Communications, Wireless and Mobile...ijp2p
 
4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022)4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022)ijp2p
 
11th International conference on Parallel, Distributed Computing and Applicat...
11th International conference on Parallel, Distributed Computing and Applicat...11th International conference on Parallel, Distributed Computing and Applicat...
11th International conference on Parallel, Distributed Computing and Applicat...ijp2p
 
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)ijp2p
 
4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022) 4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022) ijp2p
 
CIoT 2022 CFP (1).pdf
CIoT 2022 CFP (1).pdfCIoT 2022 CFP (1).pdf
CIoT 2022 CFP (1).pdfijp2p
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)ijp2p
 
3rd International Conference on Networks, Blockchain and Internet of Things (...
3rd International Conference on Networks, Blockchain and Internet of Things (...3rd International Conference on Networks, Blockchain and Internet of Things (...
3rd International Conference on Networks, Blockchain and Internet of Things (...ijp2p
 
3rd International Conference on NLP & Information Retrieval (NLPI 2022)
3rd International Conference on NLP & Information Retrieval (NLPI 2022)3rd International Conference on NLP & Information Retrieval (NLPI 2022)
3rd International Conference on NLP & Information Retrieval (NLPI 2022)ijp2p
 
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...ijp2p
 
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)ijp2p
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)ijp2p
 
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)ijp2p
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)ijp2p
 
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)ijp2p
 
CALL FOR PAPER - 13th International Conference on Ad hoc, Sensor & Ubiquitous...
CALL FOR PAPER - 13th International Conference on Ad hoc, Sensor & Ubiquitous...CALL FOR PAPER - 13th International Conference on Ad hoc, Sensor & Ubiquitous...
CALL FOR PAPER - 13th International Conference on Ad hoc, Sensor & Ubiquitous...ijp2p
 
SUBMIT YOUR PAPERS - International Journal of peer-to-peer networks (IJP2P)
SUBMIT YOUR PAPERS - International Journal of peer-to-peer networks (IJP2P)SUBMIT YOUR PAPERS - International Journal of peer-to-peer networks (IJP2P)
SUBMIT YOUR PAPERS - International Journal of peer-to-peer networks (IJP2P)ijp2p
 

More from ijp2p (20)

International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
 
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)
 
7th International Conference on Networks, Communications, Wireless and Mobile...
7th International Conference on Networks, Communications, Wireless and Mobile...7th International Conference on Networks, Communications, Wireless and Mobile...
7th International Conference on Networks, Communications, Wireless and Mobile...
 
4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022)4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022)
 
11th International conference on Parallel, Distributed Computing and Applicat...
11th International conference on Parallel, Distributed Computing and Applicat...11th International conference on Parallel, Distributed Computing and Applicat...
11th International conference on Parallel, Distributed Computing and Applicat...
 
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)
 
4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022) 4th International Conference on Internet of Things (CIoT 2022)
4th International Conference on Internet of Things (CIoT 2022)
 
CIoT 2022 CFP (1).pdf
CIoT 2022 CFP (1).pdfCIoT 2022 CFP (1).pdf
CIoT 2022 CFP (1).pdf
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
 
3rd International Conference on Networks, Blockchain and Internet of Things (...
3rd International Conference on Networks, Blockchain and Internet of Things (...3rd International Conference on Networks, Blockchain and Internet of Things (...
3rd International Conference on Networks, Blockchain and Internet of Things (...
 
3rd International Conference on NLP & Information Retrieval (NLPI 2022)
3rd International Conference on NLP & Information Retrieval (NLPI 2022)3rd International Conference on NLP & Information Retrieval (NLPI 2022)
3rd International Conference on NLP & Information Retrieval (NLPI 2022)
 
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...
 
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
 
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)
 
International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)International Journal of peer-to-peer networks (IJP2P)
International Journal of peer-to-peer networks (IJP2P)
 
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)
 
CALL FOR PAPER - 13th International Conference on Ad hoc, Sensor & Ubiquitous...
CALL FOR PAPER - 13th International Conference on Ad hoc, Sensor & Ubiquitous...CALL FOR PAPER - 13th International Conference on Ad hoc, Sensor & Ubiquitous...
CALL FOR PAPER - 13th International Conference on Ad hoc, Sensor & Ubiquitous...
 
SUBMIT YOUR PAPERS - International Journal of peer-to-peer networks (IJP2P)
SUBMIT YOUR PAPERS - International Journal of peer-to-peer networks (IJP2P)SUBMIT YOUR PAPERS - International Journal of peer-to-peer networks (IJP2P)
SUBMIT YOUR PAPERS - International Journal of peer-to-peer networks (IJP2P)
 

Recently uploaded

Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneCall girls in Ahmedabad High profile
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 

Recently uploaded (20)

Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service PuneVIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
VIP Call Girls Pune Madhuri 8617697112 Independent Escort Service Pune
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 

INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNTERMEASURE

  • 1. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.1, January 2012 DOI : 10.5121/ijp2p.2012.3102 11 INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNTERMEASURE Prof. Anil Kadam, Ms. Supriya Ghadage, Ms. Naina Verma , Ms. Nikita Sarvade And Swati chouhan Department of Computer Engineering, Pune University, Pune, India. supriya0633@yahoo.com kadam_in@yahoo.com ABSTRACT In this paper we are providing a implementation details about simulated solution of stealthy packet drop attack. Stealthy packet drop attack is a suite of four attack types, includes colluding collision, packet misrouting, identity delegation and power control. Stealthy packet drop attacks disrupts the packet from reaching to it’s destination through malicious behaviour. These attacks can be easily breakdown the multi-hop wireless ad-hoc networks. Most widely preferred method for detecting attacks in wireless network is behaviour based detection method. In this method a normal network overhears communication from its neighbourhood. Here we are implementing a SADEC protocol which is proposed solution of stealthy packet drop attacks. SADEC overlaid the base line local monitoring. In base line local monitoring each neighbour maintains additional information about routing path also it adds some checking responsibility to all its neighbours. SADEC proves more efficient than baseline local monitoring to mitigate successfully all the stealthy attack types. KEYWORDS Misrouting, colluding collision, , identity delegation, wireless ad-hoc network, local monitoring 1. INTRODUCTION Now a day’s wireless networks are becoming more preferable platforms in many domains but security in wireless is very less as compare to wired (traditional) network. They are becoming important platform for command and control of civilian critical infrastructure and military warfare. Stealthy packet drop attack is a latest threat to wireless ad-hoc networks. Here malicious node evades detection and legitimate node treated as malicious node. It is suite of four attack types which includes: 1. Misrouting: malicious node misroutes the packet to wrong next hop. 2. Colluding collision: Malicious node with help of its colluding partner over flood the valid next hop resulting in packet drop. 3. Transmission power control: malicious node controls the transmission to its nearest neighbor which is not valid next hop and results in packet drop. 4. Identity delegation: Delegate the relay responsibility to its colluding partner which is close to sender. To detect such attacks such as wormholes and rushing attacks, traditional mechanism like cryptography alone fails. In this paper we are providing a practical implementation details about solution of stealthy packet drop attack is SADEC protocol. Most of researchers use a behaviour based detection mechanism to detect such attacks. Behaviour based detection includes local monitoring (e.g.[7][8]). SADEC also includes local monitoring but adds some checking
  • 2. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.1, January 2012 12 responsibility to each neighbour in wireless ad-hoc network along with each guard nodes over the network. SADEC improves the efficiency of the wireless ad-hoc network over the base line local monitoring [1]. Finally, in this paper section 2 contains related work; section 3 contains proposed practical implementation solution to stealthy packet drop attacks. Section 4 contains technology going to be used and features of this project and section 5 contains conclusion. 2. RELATED WORK Recently, researchers have been exploring many mechanisms to ensure the security of data and traffic in wireless networks. These mechanisms can be divided into the following categories—integrity services and authentication, protocols that use dedicated hardware, protocols that needs clear acknowledgments or use numerical methods. The course variety techniques increase direction strength by first discovering multi way routes [2], [10] and then using these routes to provide redundancy in the data transmission between a source and a destination. The data are preset and divided into multiple shares sent to the target through different paths. Moreover, many of these methods are pricey for resource-constrained networks due to the data redundancy. Also, these protocols could be in hazard to direction sighting attacks, such as the Sybil attack, that prevent the discovery of non adversarial paths. The authors in [11] commence a technique called packet leashes that uses either fixed time organization or region alertness via GPS hardware. A technique designed to differentiate malicious behaviour regarding cautious dropping of data, relies on open affirmation for recognized data using the equal channel [10], or an out-of-band conduit [12]. This method would cause to be stealthy packet dropping assessable at the end point. The technique incurs high broadcast overhead and have to be superior with other method for scrutiny and separation of the malicious nodes. Statistical dealings have been used by some researchers for discovery of malicious behaviour, e.g., [13] to detect wormhole attacks. The concern of trust in ad hoc networks has been looked by many researchers (e.g., [14], [15], [16], [17]). All of them use Dempster-Shafer belief theory [18] to incorporate second-hand information which is reported by other nodes to make a standing score of a node. Many approaches which are based on reputation (e.g., [17]) get suffer from deprived protection against ballot stuffing which means a colluding malicious node approving another malicious hop or bad mouthing which means a malicious hop implicating a genuine hop. All the approaches which are based on reputation may get susceptible to performance where a node is functioning correctly but providing incorrect information about a further node or other node. All the approaches can undergo through non convergent behaviour. For mitigating control and data forwarding misbehaviour in multi hop wireless networks, a broadly used method is cooperative local monitoring [20], [9], [7], [8], [10]. The effort in [10] provides a mechanism to determine paths with definite desirable properties, such as being node put out of joint. Also the efforts in [8] provides discovery of a extensive class of control attacks in opposition to static sensor networks. Though, all the performance-based mechanisms including both communications based and non communication based, as used by researchers to date, not succeed to diminish the stealthy packet drop attack. In [18], introduced the stealthy packet dropping attacks and proposed a protocol called MISPAR to mitigate the attacks. In this paper, we proposing a practical implementation of isolation of malicious nodes due to both natural errors and framing. Furthermore, this paper provides a proposed implementation details to assess the performance of both BLM and SADEC under-Misrouting and transmission power control attacks.
  • 3. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.1, January 2012 13 3. PROPOSED SOLUTION Figure1. Overview of stealthy attack 3.1. Misrouting Figure 2(a). Diagram for Misrouting: packet drop attack Figure 2(b). Expected Diagram to overcome misrouting packet drop In figure 2(a) shows that source s sends packet (pkt) to next hop but if next hop is a malicious node then it sends packet to wrong next hop and packet get dropped. To overcome such attack type, in fig. 2(b), source s sends packet to next hop, even though next hop is malicious it can not send packet to wrong hop. Packets get transmitted to valid destination. This can be achieved through SADEC protocol as follows. The guard nodes over the region from source to
  • 4. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.1, January 2012 14 destination maintains verification table. Verification table contains the id of all nodes from source node to destination node i.e. it indicates that which node should transmit packet to its next valid hop. Take an example as shown in figure 3 that S is sending a data packet to destination D through a route that includes <A, B, M, X, Y>. The malicious node M cannot misroute the data packet received from B to another node other than the next hop which is X as each guard of node M over the link B M has an entry in its VT (verification table) which indicates X as the correct next hop. This fallout in an additional scrutiny activity for the guard node involved in local monitoring, verifying that the data packet is forwarded to the correct next hop, as indicated by the entry in the guard node’s VT. Additionally, M cannot send another neighbour, say Q, by misrouting the packet to Q. The guards of Q over M Q do not have an entry like <S, D, A, B, M, Q >. Figure3. SADEC over misrouting 3.2. Colluding Collision Figure 4.Diagram for Colluding collision: packet drop attack
  • 5. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.1, January 2012 15 3.3. Power control Figure 5. Diagram for power control: packet drop attack 3.4. Identity delegation Figure 6. Diagram for identity delegation: packet drop attack Figure 7.Expected solution to overcome other stealthy attack types Figure 4 shows colluding collision packet drop attack. In that source node S wants to send packet to target node T. S sends packet to next hop M1. But as M1 is malicious, it coordinates
  • 6. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.1, January 2012 16 its transmission activity to its colluding partner M2. The colluding node M2 creates collision at T. as a result node T unable to get packet which is relayed by M1 and packet get damaged. Here, M1 successfully drops the packet and in effect legitimate node T accused of dropping the packet by some of its guard nodes over the transmission region. Fig 5 shows power control packet drop attack. Here, source node S sends packet to next hop M1 which is malicious. M1 sends the packet to next hop but that not reaches to T i.e. controlled transmission. Similarly in identity delegation packet drop attack as shown in figure 6 , attacker node delegates the identity and credential of compromised node M1 to colluding node M2 which is close to sender node S. when S sends packet to M1, M2 delegates the identity of node M1 and sends the packet. As a result target node T can’t hear the message as it not belongs to region of M2. And legitimate node T gets accused of dropping the packet. Solution to other three stealthy attack type is as shown in figure 7. We have to increase number of guard nodes over the transmission region and adding some extra responsibility to each of the node over network. Each node over the network need to maintain the count of number of messages transmitted by its neighbour and has to announce number of packet it has transmitted over particular period of time. Thus, the subset of guard nodes which had got the packet forwarding would have a greater count than the nodes that did not hear the forwarding of messages. By forcing a node to broadcast the number of messages it has forwarded over certain period of time, a malicious node would have the difficulty of fulfilling two sets of neighbours that look forward to hear different counts through a single broadcast. 4. TECHNOLOGY AND FEATURES We are going to develop this project in software platform java (jdk1.7.0) with help of JPCAP libraries. The features of this project are as follows: 1. This project provides security in wireless network from stealthy attack. 2. As stealthy attacks are becoming wide spread attack category, prevention of this attack not possible with help of only traditional techniques like cryptography. With help of SADEC [1] protocol efficiency of this project is greater than baseline local monitoring method (BLM). 3. SADEC maintains malicious node detection coverage 90% whereas BLM maintains malicious node detection coverage < 60%. [1]. 4. Legitimate node isolation in SADEC is < 2% whereas in BLM it is 99% <. [1]. 5. SADEC can deliver 60% packets to valid destination. Whereas, BLM delivers < 10% packets to valid destination 5. CONCLUSIONS As wireless network threats are becoming more dangerous day by day, security in wireless is most essential. SADEC mitigates all these attacks misrouting, colluding collision, identity delegation, power control successfully with improved efficiency than base line local monitoring scheme. SADEC uses local monitoring scheme and requires nodes to keep up supplementary routing path information and also adds some checking task to each neighbour. SADEC’s new detection approach expands the set of neighbours that are able to monitor in a neighbourhood, thus making it more effective than BLM in sparse networks. ACKNOWLEDGEMENTS Our thanks to the experts who have contributed towards development of the stealthy attack and its simulated solution. We would like to thank everyone, just everyone!
  • 7. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.1, January 2012 17 REFERENCES [1] Issa Khalil and Saurabh Bagchi, “Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure” IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 8, AUGUST 2011 [2] S.J. Lee and M. Gerla, “Split Multipath Routing with Maximally Disjoint Paths in Ad Hoc Networks,” Proc. IEEE Int’l Conf. Comm. (ICC ’01), pp. 3201-3205, 2001. [3] I. Stojmenovic, Handbook of Sensor Networks: Algorithms and Architecture. Wiley, 2005. [4] F. Ye, H. Luo, J. Cheng, S. Lu, and L. Zhang, “A Two-Tier Data Dissemination Model for Large-Scale Wireless Sensor Network,” Proc. Eighth ACM Ann. Conf. Mobile Computing and Networking,pp. 148-159, 2002. [5] C. Basile, Z. Kalbarczyk, and R.K. Iyer, “Neutralization of Errors and Attacks in Wireless Ad Hoc Networks,” Proc. Int’l Conf. Dependable Systems and Networks (DSN ’05), pp. 518-527, 2005. [7] I. Khalil, S. Bagchi, and N. Shroff, “LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks,” Proc. Int’l Conf. Dependable Systems and Networks (DSN ’05), pp. 612-621, 2005. [8] I. Khalil, S. Bagchi, C. Nina-Rotaru, and N. Shroff, “UNMASK: Utilizing Neighbor Monitoring for Attack Mitigation in MultihopWireless Sensor Networks,” Ad Hoc Networks, vol. 8, no. 2, pp. 148-164, 2010. [9] I. Khalil, S. Bagchi, and N.B. Shroff, “MOBIWORP: Mitigation ofthe Wormhole Attack in Mobile Multihop Wireless Networks,”Ad Hoc Networks, vol. 6, no. 3, pp. 344-362, May 2008. [10] B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H.Rubens, “ODSBR: An On- Demand Secure Byzantine Resilient Routing Protocol for Wireless Ad Hoc Networks,” ACM Trans.Information and System Security, vol. 10, no. 4, 2008. [11] Y.C. Hu, A. Perrig, and D.B. Johnson, “Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks,” Proc. IEEE INFOCOM, pp. 1976-986, 2003. [12] B. Carbunar, I. Ioannidis, and C. Nita-Rotaru, “JANUS: Towards Robust and Malicious Resilient Routing in Hybrid Wireless Networks,” Proc. ACM Workshop Wireless Security (WiSe ’04), pp. 11-20, 2004. [13] “Statistical Wormhole Detection in Sensor Networks,” Lecture Notes in Computer Science, R. Molva, G. Tsudik, and D. Westhoff, eds., pp. 128-141, 2005. [14] A.A. Pirzada and C. McDonald, “Establishing Trust in Pure Ad-Hoc Networks,” Proc. Australasian Conf. Computer Science (ACSC ’04), vol. 26, no. 1, pp. 47-54, 2004.v [15] S. Buchegger and J.-Y. Le Boudec, “Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes-Fairness in Distributed Ad-Hoc NeTworks,” Proc. ACM MobiHoc, pp. 80-91, 2002. [16] S. Buchegger and J.L. Boudec, “Robust Reputation System for P2P and Mobile Ad-Hoc Networks,” Proc. Workshop Economics of Peer-to-Peer Systems, 2004. [17] S. Ganeriwal, L.K. Balzano, and M.B. Srivastava, “Reputation-Based Framework for High Integrity Sensor Networks,” ACM Trans. Sensor Networks, vol. 4, no. 3, pp. 1-37, http://doi.acm.org/10.1145/1362542.1362546, May 2008. [18] I. Khalil and S. Bagchi, “MISPAR: Mitigating Stealthy Packet Dropping in Locally-Monitored Multi-Hop Wireless Ad Hoc Networks,” Proc. ACM Int’l Conf. Security and Privacy in Comm. Networks (SecureComm ’08), http://doi.acm.org/10.1145/1460877.1460913, 2008. [19] G. Shafer, A Mathematical Theory of Evidence. Princeton Univ., 1976.
  • 8. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.1, January 2012 18 [20] Y. Huang and W. Lee, “A Cooperative Intrusion Detection System for Ad Hoc Networks,” Proc. ACM Workshop Security of Ad Hoc and Sensor Networks (SASN ’03), pp. 135-147, 2003 Authors Prof. Anil Kadam (M.E.Computer Science), AISSMS College Of Engineering, Pune University, Pune, Maharashtra, India. Ms. Supriya N. Ghadage. (B.E.Computer Science), AISSMS College of Engineering, Pune University, Pune, Maharashtra, India. supriya0633@yahoo.com Ms. Naina Verma (B.E. Computer Science), AISSMS College Of Engineering, Pune University, Pune, Maharashtra, India. nainaverma15@yahoo.com Ms. Swati Chouhan (B.E .Computer Science), AISSMS College of Engineering, Pune University, Pune, Maharashtra, India. chouhanswati@yahoo.com Ms. Nikita Sarvade (B.E. Computer Science), AISSMS College Of Engineering, Pune University, Pune, Maharashtra, India.