SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3032
PRIVACY PRESERVING AND DETECTION TECHNIQUES FOR MALICIOUS
PACKET DROPPING IN WIRELESS ADHOC NETWORKS
Anjaly Joy1
1
Anjaly Joy,M TECH Student, Computer Science and Engineering, Rajadhani Institute of Engineering and
Technology, Kerala, India
2
L M Bernaldu, HOD, Computer Science and Engineering, Rajadhani Institute of Engineering and Technology,
Kerala, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Wireless Ad Hoc Network are network with no
infrastructure where nodes collaborate in supporting the
network functionality. The effect of malicious nodes lead to
Packet Dropping and will disrupt the communications of
between nodes within the ad hoc network. Link errors cause
packet dropping, so does the insider attack, or the combined
effect of link errors and malicious nodes cause packet
dropping. In the most severe form, the malicious node
simply stops forwarding every packet received from
upstream nodes, completely disrupting the path between the
source and the destination. Conventional algorithms based
on detecting the packet loss rate cannot achieve satisfactory
detection accuracy because the packet dropping rate is
comparable to the channel error rate. Hence to improve the
detection accuracy, the correlations between lost packets is
identified. This paper presents a study on packet dropping
attacks and their detection based on auto correlation
function.
Key Words: Packet Dropping, Link Errors, Wireless
adhoc networks, auto correlation function.
1. INTRODUCTION
The wireless ad hoc network is a collection of mobile
nodes with no fixed infrastructure, nodes searches for a
route from source to a destination. Thus the dynamic and
distributed environment is exploited, which requires the
collaboration among nodes. Due to the inherently
vulnerable nature of wireless ad hoc network trust
between the nodes is an issue, in order to communicate or
collaborate with each other. While all the information is
delivered through many hops, eavesdropping, forging or
dropping during transmission can occur.
Thus the cooperative nature of wireless Ad hoc network
can be exploited to launch attacks. A network level denial-
of -service (Dos) attack, physical layer jamming attacks
brings a security breach in the wireless network. Denial of
service attacks aims at the complete disruption of routing
and therefore the whole operation of wireless network.
Whereas, in case of an Information Disclosure attack, the
compromised node may leak confidential information to
unauthorized nodes which includes information regarding
network topology, location of nodes or optimal routes to
unauthorized nodes. In a black hole attack, a malicious
node advertises itself as having a valid route to the
destination. The attacker consumes or intercepts the
packet without forwarding. This cause the network traffic
diverted or dropped. Persistent packet dropping attacks
can degrade the performance of the network.
The solution based on identifying or isolating the
misbehaving nodes that refuses to forward packets in a
wireless ad hoc networks are classified on the basis of
selective and random packet dropping. Once the detection
of malicious node is attained, randomized multi-path
routing algorithms can reduce the effect of insider attacks.
Their threats can be completely eliminated by simply
deleting the nodes from the network’s routing table. The
challenge faced in the detection of selective packet
dropping attacks is the highly dynamic nature of wireless
environment.
The requirement of focusing the location (or hop) the
packet is dropped and to identify whether the drop is
intentional or not. The main reason for packet drop in the
network is due to bad channel conditions such as fading,
noise, interference or the link errors or by the insider
attack. Link errors are significant in packet dropping
considering the insider attack which can camouflage the
technique of packet loss rate.
The packet loss rate cannot accurately identify the cause
of a packet loss. The correlations between the positions of
lost packets is exploited to achieve high detection
accuracy. It can be calculated from the auto-correlation
function (ACF) of packet-loss bitmap (bitmap describes
the lost/received status of each packet in a sequence of
consecutive packet transmissions). Based on the
correlation between the lost packets, one can decide the
reason for packet drop
The packet-loss bitmaps reported by individual nodes
along the route may not be truthful, so it become more
challenging to guarantee the truthfulness. Such
truthfulness is essential for correct calculation of the
correlation between lost packets. This challenge is not
important, because it is a common practice of an attacker
to report false information in order to avoid detection
accuracy.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3033
2. LITERATURE REVIEW
Literature review provides us with various techniques for
detecting malicious packet drops. Also, various
classification techniques have been adopted by the
authors.
R. Rao and G. Kesidis proposed a paper titled “Detecting
malicious packet dropping using statistically regular
traffic patterns in multihop wireless networks” which
observes packet dropping attacks by detecting the traffic
pattern.
The traffic intensity is checked by using sensors. A traffic
transmission patterns is used to find traffic rate for
receiver to verify the traffic .This traffic patterns are used
with MAC to preserves the statistical regularity from node
to node. This general technique for intrusion detection is
only suitable for networks that are not bandwidth limited
and thus the proposed system cannot be implemented in a
bandwidth limited networks.
L. Buttyan and J. P. Hubaux, proposed a paper titled
“Stimulating cooperation in self organizing mobile ad hoc
networks” where a credit system which provides an
incentive for cooperation.
Here each node receives credit by relaying packets for one
node to another, and uses its credit to send its own
packets. As a result the malicious node that drop packets
and will eventually deplete its credit, so that it cannot be
able to send its own traffic. For explaining about the
cooperation among mobile nodes Dynamic Source Routing
(DSR) protocol is used. The security Module prevents
counter from being negative or being modified which is
the main advantage discussed over here and it is very
expensive to integrate it.
Tao Shu, Sisi Liu and Marwan Krunz proposed a paper
titled, “Secure Data Collection in Wireless Sensor
Networks Using Randomized Dispersive Routes” discussed
about a multipath scheme.
Here an adversary acquires the routing algorithm and
using this information the adversary node compute the
same routes known to the source, and hence make
interruption to all information sent over these routes. The
adversary cannot identify the routes traversed by each
packet. The routes generated by these mechanisms are
highly dispersive and energy-efficient. A mechanism for
randomized multipath routes is explained in this paper,
but it is highly expensive to conduct its simulations..
S.Marti, T.Giuli, K.Lai and M.Baker proposed a paper titled,
“Mitigating Routing Misbehavior in Mobile Ad hoc
Network”, discussed about a reputation system that relies
on neighbors to monitor and identify misbehaving nodes.
Node with high packet dropping rate is given a bad
reputation by its neighbors and this Reputation
information is propagated periodically throughout the
network and is used as an important metric in selecting
routes. And finally a malicious node will be excluded from
any of the route. Dynamic Source Routing (DSR) protocol
which uses source routing without relying on routing
table. The ambiguous collision among the misbehaving
node is ailed to be detected in this paper.
Alejandro Proano and Loukas Lazos proposed a paper
titled, “Packet-Hiding Methods for Preventing Selective
Jamming Attacks” where the problem of jamming under an
internal threat model is discussed.
The adversary will be aware about the network secrets
and the implementation details of network protocols. For
launching selective jamming attacks in network the
adversary node will exploit the internal knowledge of
network. In this case the adversary will remain active only
for a short period of time which aims on messages of high
importance. The packet hiding methods are based on
several cryptographic primitives. Hence the computational
and communication overhead become the main issue.
K. Liu, J. Deng, P. Varshney, and K. Balakrishnan proposed
a paper titled, “An acknowledgement-based approach for
the detection of routing misbehavior in MANETs”,
discussed about an acknowledgment based system.
An end-to-end or hop-to-hop acknowledgement which
directly locate the hops where packets are lost. A hop of
high packet loss rate will be excluded from the route and
will improve the performance rate. The receiver will send
back an acknowledgment to the sender side on receiving
data packets. If acknowledgment time take more time than
that of wait of time then whole link will be considered to
be misbehaving which turned to be challenging.
3. PROPOSED DETECTION MECHANISM
Different network metrics change simultaneously and
consequently their combined effect on a specific impact.
Some network metrics like packet loss and network delay
change concurrently when the networking equipment’s
interconnect the applications. The packets are queued in
buffers on traversing through the network and due to the
reason of buffer overflow the packets are being dropped
from time to time. The cause of packet loss can be easily
identified if the drop is made intentional and the
correlation related to the lost packets from each hop of the
path can also be easily be identified. Hence the proposed
mechanism is based on detecting the correlation of the lost
packets over each hop. The correlation of lost packets is
calculated using the auto-correlation function of bitmap.
The accuracy of detecting malicious node can be achieved
by exploiting the correlations between the positions of lost
packets. This can done by calculating the auto-correlation
function (ACF) of the packet-loss bitmap (bitmap
describes the lost/received status of each packet in a
sequence of consecutive packet transmissions). The cause
of packet drop can be detected by calculating the
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3034
correlations between lost packets. The truthfulness of
packet-loss bitmaps reported by individual nodes is a
major challenge faced by this system. Hence auditing is
required to overcome this. Cryptographic primitive is used
to reduce the burden of auditing and detection
homomorphic linear authenticator (HLA). This
development is privacy protect, scam proof and provides
low communication overheads. Hence the proposed
system provides high detection accuracy and privacy-
preserving feature which is attained by a public auditor.
Low communication and storage overheads at
intermediate nodes are being avoided to an extent.
3. DIFFERENT PHASES OF PROPOSED SYSTEM
The proposed mechanism consists of different phases:
3.1 Key Generation Phase
Once the routes are established from source to
destination, say route PSD where S forms the source and D
forms the destination. Source decides a symmetric-key
crypto system and k symmetric keys. Besides the
symmetric key distribution, Source also needs to identify
the HLA keys to generating the HLA signatures. The
homomorphic encryption scheme was originally called a
privacy homomorphism which is based on RSA. The
essence of fully homomorphic encryption allows anyone to
encrypt the intermediate plaintext values. No information
should leak. The inputs, outputs and intermediate values
are always encrypted. Key distribution is also based on the
public-key crypto-system such as the RSA. Every node on
PSD maintains a database which contains the proof-of-
reception status. As a result, every node in the route PSD
obtains the HLA signatures for all packet. These signatures
are then sent together with the packet to the route by
using a one-way chained encryption.
3.2 Audit Phase
The node generates a packet-reception bit-map based on
the information in the database. Node submits these data
to the auditor, as a proof of packets it has received. If the
details given by the node are similar as that of the details
provided by the bit-map then the node can be considered
as legitimate. If not, that particular node which holds
inequality is considered to be the malicious node. The
above mechanism can only guarantee that a node cannot
understate its packet loss and cannot claim the reception
of a packet.
3.3 Detection Phase
The public auditor calculates the autocorrelation function
for the packet loss at each hop. The ACF of the wireless
channel is then compared with the ACF of the block-
reception bitmap reported by each node to detect possible
malicious packet drops. The bitmaps is checked by the
auditor for finding any possible packet loss. The auditor
starts constructing the per-hop packet-loss bitmap based
on the outcome of consistency and is done sequentially
from the first hop. Only the packets lost are accounted by
the auditor. For deciding whether the packet loss is caused
by malicious drop the auditor calculates the
autocorrelation function for each bitmaps and the relative
difference is observed. The HLA construction is publicly
verifiable and privacy preserving so that the auditor
cannot determine the content of the packets transmitted
from source to destination.
3.4 Re-routing Phase
The effect of packet dropping can be re-routed after the
detection of malicious node and it can be also mitigated.
One of the most effective method used is Randomized
dispersive routes .A suitable path is selected in a
randomized manner from the set of multiple paths rather
than using pre-computed set of paths, so that large
number of routes can be generated for each source and
destination.
4. CONCLUSIONS
Detecting malicious packet dropping is a challenging issue
in networks. The conventional detection algorithms face
many challenges that is best suited by the proposed
approach. The accuracy in detecting malicious packet
drops is achieved exploiting the correlation between the
lost packets. A public auditing architecture developed by
HLA which uses cryptographic primitives to ensure
truthfulness and high detection accuracy. The randomized
dispersive routes by detecting the malicious nodes
effectively overcome. Proposed method performs well
based on the experimental result. Issues due to changes in
topology and link-characteristics are to be considered in
future work. In this paper we have assumed the
truthfulness of source and destination and also the
possibility of malicious source and destination is to be
considered. The collaboration of nodes can also be
exploited within the nodes to increase the efficiency of the
routing path chosen.
REFERENCES
[1] R. Rao and G. Kesidis, “Detecting malicious packet
dropping using statistically regular traffic patterns in
multihop wireless networks that are not bandwidth
limited,” in Proc. IEEE GLOBECOM Conf., 2003.
[2] L. Buttyan and J. P. Hubaux, “Stimulating cooperation
in selforganizing mobile ad hoc networks,”
ACM/Kluwer Mobile Netw. Appl., 2003.
[3] A. Proano and L. Lazos, “Selective jamming attacks in
wireless networks,” in Proc. IEEE ICC Conf., 2010.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 06 | June-2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3035
[4] K. Liu, J. Deng, P. Varshney, and K. Balakrishnan, “An
acknowledgement- based approach for the detection
of routing misbehavior in MANETs,” IEEE Trans.
Mobile Comput.,2006.
[5] K. Balakrishnan, J. Deng, and P. K. Varshney,
“TWOACK: Preventing selfishness in mobile ad hoc
networks,” in Proc. IEEE Wireless Commun. Netw.
Conf., 2005.
[6] T. Shu, M. Krunz, and S. Liu, “Secure data collection in
wireless sensor networks using randomized
dispersive routes,” IEEE Trans. Mobile Comput.,
2010.

More Related Content

What's hot

A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...chennaijp
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWIJNSA Journal
 
Paper id 71201999
Paper id 71201999Paper id 71201999
Paper id 71201999IJRAT
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks byjpstudcorner
 
Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detectionjpstudcorner
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
 
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsConsensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsIJCNCJournal
 
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...IRJET Journal
 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET cscpconf
 
A SECURITY SCHEME BASED ON TRUST ATTACK IN MANET
A SECURITY SCHEME BASED ON TRUST ATTACK IN MANETA SECURITY SCHEME BASED ON TRUST ATTACK IN MANET
A SECURITY SCHEME BASED ON TRUST ATTACK IN MANETIAEME Publication
 
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...IAEME Publication
 
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...IJCNCJournal
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsPvrtechnologies Nellore
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 

What's hot (18)

A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...JPN1422  Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
JPN1422 Defending Against Collaborative Attacks by Malicious Nodes in MANETs...
 
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEWPACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
PACKET DROP ATTACK DETECTION TECHNIQUES IN WIRELESS AD HOC NETWORKS: A REVIEW
 
Paper id 71201999
Paper id 71201999Paper id 71201999
Paper id 71201999
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
Defending against collaborative attacks by
Defending against collaborative attacks byDefending against collaborative attacks by
Defending against collaborative attacks by
 
Privacy preserving and truthful detection
Privacy preserving and truthful detectionPrivacy preserving and truthful detection
Privacy preserving and truthful detection
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...
 
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETsConsensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
Consensus Routing And Environmental Discrete Trust Based Secure AODV in MANETs
 
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
Channel Aware Detection of Forwarding Attacks in WSN with Malicious Node Dete...
 
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
 
A SECURITY SCHEME BASED ON TRUST ATTACK IN MANET
A SECURITY SCHEME BASED ON TRUST ATTACK IN MANETA SECURITY SCHEME BASED ON TRUST ATTACK IN MANET
A SECURITY SCHEME BASED ON TRUST ATTACK IN MANET
 
A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...A dynamic approach for improving performance of intrusion detection system ov...
A dynamic approach for improving performance of intrusion detection system ov...
 
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
Ar34261268
Ar34261268Ar34261268
Ar34261268
 
Wormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systemsWormhole attack detection algorithms in wireless network coding systems
Wormhole attack detection algorithms in wireless network coding systems
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 

Similar to Privacy Preserving and Detection Techniques for Malicious Packet Dropping in Wireless ADHOC Networks

“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNIJERA Editor
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETJasmine Culbreth
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in maneteSAT Publishing House
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachIJLT EMAS
 
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET Journal
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
 
IRJET - Security and Privacy by IDS System
IRJET -  	  Security and Privacy by IDS SystemIRJET -  	  Security and Privacy by IDS System
IRJET - Security and Privacy by IDS SystemIRJET Journal
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsijtsrd
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...IRJET Journal
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET Journal
 
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...IJMTST Journal
 
Trust Providence in Delay Tolerant Networks
Trust Providence in Delay Tolerant NetworksTrust Providence in Delay Tolerant Networks
Trust Providence in Delay Tolerant Networkstheijes
 
ANN Based Secured Energy Efficient Routing in Wireless Sensor Networks with D...
ANN Based Secured Energy Efficient Routing in Wireless Sensor Networks with D...ANN Based Secured Energy Efficient Routing in Wireless Sensor Networks with D...
ANN Based Secured Energy Efficient Routing in Wireless Sensor Networks with D...ijtsrd
 
Intrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackIntrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackeSAT Publishing House
 

Similar to Privacy Preserving and Detection Techniques for Malicious Packet Dropping in Wireless ADHOC Networks (20)

B010110514
B010110514B010110514
B010110514
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
 
ant2
ant2ant2
ant2
 
Different Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANETDifferent Prediction Methods For Route Recovery In MANET
Different Prediction Methods For Route Recovery In MANET
 
A novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manetA novel approach for a secured intrusion detection system in manet
A novel approach for a secured intrusion detection system in manet
 
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based ApproachMitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
Mitigating Various Attacks in Mobile Ad-hoc Networks Using Trust Based Approach
 
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
 
IRJET - Security and Privacy by IDS System
IRJET -  	  Security and Privacy by IDS SystemIRJET -  	  Security and Privacy by IDS System
IRJET - Security and Privacy by IDS System
 
Review on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETsReview on Intrusion Detection in MANETs
Review on Intrusion Detection in MANETs
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...Detection and removal of multiple black hole attacks through sending forged p...
Detection and removal of multiple black hole attacks through sending forged p...
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
IRJET- Securing on Demand Source Routing Protocol in Mobile Ad-Hoc Networks b...
 
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
Using Homomorphism Linear Signature Auditing Detection of Routing Packet Drop...
 
Trust Providence in Delay Tolerant Networks
Trust Providence in Delay Tolerant NetworksTrust Providence in Delay Tolerant Networks
Trust Providence in Delay Tolerant Networks
 
ANN Based Secured Energy Efficient Routing in Wireless Sensor Networks with D...
ANN Based Secured Energy Efficient Routing in Wireless Sensor Networks with D...ANN Based Secured Energy Efficient Routing in Wireless Sensor Networks with D...
ANN Based Secured Energy Efficient Routing in Wireless Sensor Networks with D...
 
Intrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaackIntrusion detection system for manets a secure eaack
Intrusion detection system for manets a secure eaack
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 

Recently uploaded (20)

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 

Privacy Preserving and Detection Techniques for Malicious Packet Dropping in Wireless ADHOC Networks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3032 PRIVACY PRESERVING AND DETECTION TECHNIQUES FOR MALICIOUS PACKET DROPPING IN WIRELESS ADHOC NETWORKS Anjaly Joy1 1 Anjaly Joy,M TECH Student, Computer Science and Engineering, Rajadhani Institute of Engineering and Technology, Kerala, India 2 L M Bernaldu, HOD, Computer Science and Engineering, Rajadhani Institute of Engineering and Technology, Kerala, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Wireless Ad Hoc Network are network with no infrastructure where nodes collaborate in supporting the network functionality. The effect of malicious nodes lead to Packet Dropping and will disrupt the communications of between nodes within the ad hoc network. Link errors cause packet dropping, so does the insider attack, or the combined effect of link errors and malicious nodes cause packet dropping. In the most severe form, the malicious node simply stops forwarding every packet received from upstream nodes, completely disrupting the path between the source and the destination. Conventional algorithms based on detecting the packet loss rate cannot achieve satisfactory detection accuracy because the packet dropping rate is comparable to the channel error rate. Hence to improve the detection accuracy, the correlations between lost packets is identified. This paper presents a study on packet dropping attacks and their detection based on auto correlation function. Key Words: Packet Dropping, Link Errors, Wireless adhoc networks, auto correlation function. 1. INTRODUCTION The wireless ad hoc network is a collection of mobile nodes with no fixed infrastructure, nodes searches for a route from source to a destination. Thus the dynamic and distributed environment is exploited, which requires the collaboration among nodes. Due to the inherently vulnerable nature of wireless ad hoc network trust between the nodes is an issue, in order to communicate or collaborate with each other. While all the information is delivered through many hops, eavesdropping, forging or dropping during transmission can occur. Thus the cooperative nature of wireless Ad hoc network can be exploited to launch attacks. A network level denial- of -service (Dos) attack, physical layer jamming attacks brings a security breach in the wireless network. Denial of service attacks aims at the complete disruption of routing and therefore the whole operation of wireless network. Whereas, in case of an Information Disclosure attack, the compromised node may leak confidential information to unauthorized nodes which includes information regarding network topology, location of nodes or optimal routes to unauthorized nodes. In a black hole attack, a malicious node advertises itself as having a valid route to the destination. The attacker consumes or intercepts the packet without forwarding. This cause the network traffic diverted or dropped. Persistent packet dropping attacks can degrade the performance of the network. The solution based on identifying or isolating the misbehaving nodes that refuses to forward packets in a wireless ad hoc networks are classified on the basis of selective and random packet dropping. Once the detection of malicious node is attained, randomized multi-path routing algorithms can reduce the effect of insider attacks. Their threats can be completely eliminated by simply deleting the nodes from the network’s routing table. The challenge faced in the detection of selective packet dropping attacks is the highly dynamic nature of wireless environment. The requirement of focusing the location (or hop) the packet is dropped and to identify whether the drop is intentional or not. The main reason for packet drop in the network is due to bad channel conditions such as fading, noise, interference or the link errors or by the insider attack. Link errors are significant in packet dropping considering the insider attack which can camouflage the technique of packet loss rate. The packet loss rate cannot accurately identify the cause of a packet loss. The correlations between the positions of lost packets is exploited to achieve high detection accuracy. It can be calculated from the auto-correlation function (ACF) of packet-loss bitmap (bitmap describes the lost/received status of each packet in a sequence of consecutive packet transmissions). Based on the correlation between the lost packets, one can decide the reason for packet drop The packet-loss bitmaps reported by individual nodes along the route may not be truthful, so it become more challenging to guarantee the truthfulness. Such truthfulness is essential for correct calculation of the correlation between lost packets. This challenge is not important, because it is a common practice of an attacker to report false information in order to avoid detection accuracy.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3033 2. LITERATURE REVIEW Literature review provides us with various techniques for detecting malicious packet drops. Also, various classification techniques have been adopted by the authors. R. Rao and G. Kesidis proposed a paper titled “Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks” which observes packet dropping attacks by detecting the traffic pattern. The traffic intensity is checked by using sensors. A traffic transmission patterns is used to find traffic rate for receiver to verify the traffic .This traffic patterns are used with MAC to preserves the statistical regularity from node to node. This general technique for intrusion detection is only suitable for networks that are not bandwidth limited and thus the proposed system cannot be implemented in a bandwidth limited networks. L. Buttyan and J. P. Hubaux, proposed a paper titled “Stimulating cooperation in self organizing mobile ad hoc networks” where a credit system which provides an incentive for cooperation. Here each node receives credit by relaying packets for one node to another, and uses its credit to send its own packets. As a result the malicious node that drop packets and will eventually deplete its credit, so that it cannot be able to send its own traffic. For explaining about the cooperation among mobile nodes Dynamic Source Routing (DSR) protocol is used. The security Module prevents counter from being negative or being modified which is the main advantage discussed over here and it is very expensive to integrate it. Tao Shu, Sisi Liu and Marwan Krunz proposed a paper titled, “Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes” discussed about a multipath scheme. Here an adversary acquires the routing algorithm and using this information the adversary node compute the same routes known to the source, and hence make interruption to all information sent over these routes. The adversary cannot identify the routes traversed by each packet. The routes generated by these mechanisms are highly dispersive and energy-efficient. A mechanism for randomized multipath routes is explained in this paper, but it is highly expensive to conduct its simulations.. S.Marti, T.Giuli, K.Lai and M.Baker proposed a paper titled, “Mitigating Routing Misbehavior in Mobile Ad hoc Network”, discussed about a reputation system that relies on neighbors to monitor and identify misbehaving nodes. Node with high packet dropping rate is given a bad reputation by its neighbors and this Reputation information is propagated periodically throughout the network and is used as an important metric in selecting routes. And finally a malicious node will be excluded from any of the route. Dynamic Source Routing (DSR) protocol which uses source routing without relying on routing table. The ambiguous collision among the misbehaving node is ailed to be detected in this paper. Alejandro Proano and Loukas Lazos proposed a paper titled, “Packet-Hiding Methods for Preventing Selective Jamming Attacks” where the problem of jamming under an internal threat model is discussed. The adversary will be aware about the network secrets and the implementation details of network protocols. For launching selective jamming attacks in network the adversary node will exploit the internal knowledge of network. In this case the adversary will remain active only for a short period of time which aims on messages of high importance. The packet hiding methods are based on several cryptographic primitives. Hence the computational and communication overhead become the main issue. K. Liu, J. Deng, P. Varshney, and K. Balakrishnan proposed a paper titled, “An acknowledgement-based approach for the detection of routing misbehavior in MANETs”, discussed about an acknowledgment based system. An end-to-end or hop-to-hop acknowledgement which directly locate the hops where packets are lost. A hop of high packet loss rate will be excluded from the route and will improve the performance rate. The receiver will send back an acknowledgment to the sender side on receiving data packets. If acknowledgment time take more time than that of wait of time then whole link will be considered to be misbehaving which turned to be challenging. 3. PROPOSED DETECTION MECHANISM Different network metrics change simultaneously and consequently their combined effect on a specific impact. Some network metrics like packet loss and network delay change concurrently when the networking equipment’s interconnect the applications. The packets are queued in buffers on traversing through the network and due to the reason of buffer overflow the packets are being dropped from time to time. The cause of packet loss can be easily identified if the drop is made intentional and the correlation related to the lost packets from each hop of the path can also be easily be identified. Hence the proposed mechanism is based on detecting the correlation of the lost packets over each hop. The correlation of lost packets is calculated using the auto-correlation function of bitmap. The accuracy of detecting malicious node can be achieved by exploiting the correlations between the positions of lost packets. This can done by calculating the auto-correlation function (ACF) of the packet-loss bitmap (bitmap describes the lost/received status of each packet in a sequence of consecutive packet transmissions). The cause of packet drop can be detected by calculating the
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3034 correlations between lost packets. The truthfulness of packet-loss bitmaps reported by individual nodes is a major challenge faced by this system. Hence auditing is required to overcome this. Cryptographic primitive is used to reduce the burden of auditing and detection homomorphic linear authenticator (HLA). This development is privacy protect, scam proof and provides low communication overheads. Hence the proposed system provides high detection accuracy and privacy- preserving feature which is attained by a public auditor. Low communication and storage overheads at intermediate nodes are being avoided to an extent. 3. DIFFERENT PHASES OF PROPOSED SYSTEM The proposed mechanism consists of different phases: 3.1 Key Generation Phase Once the routes are established from source to destination, say route PSD where S forms the source and D forms the destination. Source decides a symmetric-key crypto system and k symmetric keys. Besides the symmetric key distribution, Source also needs to identify the HLA keys to generating the HLA signatures. The homomorphic encryption scheme was originally called a privacy homomorphism which is based on RSA. The essence of fully homomorphic encryption allows anyone to encrypt the intermediate plaintext values. No information should leak. The inputs, outputs and intermediate values are always encrypted. Key distribution is also based on the public-key crypto-system such as the RSA. Every node on PSD maintains a database which contains the proof-of- reception status. As a result, every node in the route PSD obtains the HLA signatures for all packet. These signatures are then sent together with the packet to the route by using a one-way chained encryption. 3.2 Audit Phase The node generates a packet-reception bit-map based on the information in the database. Node submits these data to the auditor, as a proof of packets it has received. If the details given by the node are similar as that of the details provided by the bit-map then the node can be considered as legitimate. If not, that particular node which holds inequality is considered to be the malicious node. The above mechanism can only guarantee that a node cannot understate its packet loss and cannot claim the reception of a packet. 3.3 Detection Phase The public auditor calculates the autocorrelation function for the packet loss at each hop. The ACF of the wireless channel is then compared with the ACF of the block- reception bitmap reported by each node to detect possible malicious packet drops. The bitmaps is checked by the auditor for finding any possible packet loss. The auditor starts constructing the per-hop packet-loss bitmap based on the outcome of consistency and is done sequentially from the first hop. Only the packets lost are accounted by the auditor. For deciding whether the packet loss is caused by malicious drop the auditor calculates the autocorrelation function for each bitmaps and the relative difference is observed. The HLA construction is publicly verifiable and privacy preserving so that the auditor cannot determine the content of the packets transmitted from source to destination. 3.4 Re-routing Phase The effect of packet dropping can be re-routed after the detection of malicious node and it can be also mitigated. One of the most effective method used is Randomized dispersive routes .A suitable path is selected in a randomized manner from the set of multiple paths rather than using pre-computed set of paths, so that large number of routes can be generated for each source and destination. 4. CONCLUSIONS Detecting malicious packet dropping is a challenging issue in networks. The conventional detection algorithms face many challenges that is best suited by the proposed approach. The accuracy in detecting malicious packet drops is achieved exploiting the correlation between the lost packets. A public auditing architecture developed by HLA which uses cryptographic primitives to ensure truthfulness and high detection accuracy. The randomized dispersive routes by detecting the malicious nodes effectively overcome. Proposed method performs well based on the experimental result. Issues due to changes in topology and link-characteristics are to be considered in future work. In this paper we have assumed the truthfulness of source and destination and also the possibility of malicious source and destination is to be considered. The collaboration of nodes can also be exploited within the nodes to increase the efficiency of the routing path chosen. REFERENCES [1] R. Rao and G. Kesidis, “Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited,” in Proc. IEEE GLOBECOM Conf., 2003. [2] L. Buttyan and J. P. Hubaux, “Stimulating cooperation in selforganizing mobile ad hoc networks,” ACM/Kluwer Mobile Netw. Appl., 2003. [3] A. Proano and L. Lazos, “Selective jamming attacks in wireless networks,” in Proc. IEEE ICC Conf., 2010.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 06 | June-2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 3035 [4] K. Liu, J. Deng, P. Varshney, and K. Balakrishnan, “An acknowledgement- based approach for the detection of routing misbehavior in MANETs,” IEEE Trans. Mobile Comput.,2006. [5] K. Balakrishnan, J. Deng, and P. K. Varshney, “TWOACK: Preventing selfishness in mobile ad hoc networks,” in Proc. IEEE Wireless Commun. Netw. Conf., 2005. [6] T. Shu, M. Krunz, and S. Liu, “Secure data collection in wireless sensor networks using randomized dispersive routes,” IEEE Trans. Mobile Comput., 2010.