SlideShare a Scribd company logo
1 of 3
Download to read offline
International Journal of Computer Applications Technology and Research 
Volume 3– Issue 11, 682 - 684, 2014 
Ensure Security and Scalable Performance in Multiple 
Relay Networks 
V.Eswaramurthy 
Computer Science and Engineering 
V.S.B Engineering College 
Karur,India 
A.P.V Raghavendra 
Computer Science and Engineering 
V.S.B Engineering College 
Karur,India 
Abstract: A relay network is a broad class of network topology commonly used in networks, where the source and destination are 
interconnected by means of a some nodes. In such a network the source and destination cannot transmit to each other directly because 
the distance between the source and destination is greater than the transmission range of both of them, hence the demand for 
intermediate node(s) to relay. The problem of detecting malicious relay nodes in single source, multi-relay networks has been studied 
in the literature for different relaying schemes. Relay nodes in apply network coding while those in and follow the decode-and-forward 
protocol. The authors consider a peer-to-peer (P2P) network in which peers receive and forward a linear combination of the exogenous 
data packets. To check out the integrity of the received packets, a key signature vector is generated at the source node and broadcasted 
to all nodes where it is used to check the integrity of the received packets. In and several information theoretic algorithms for 
mitigating falsified data injection effects are proposed. The network modeling used in these works is composed of a single source, 
multiple intermediate nodes which utilize network coding. We consider a multiple access relay network where multiple sources send 
independent data to a single destination through multiple relays, which may interject falsified data into the network. To detect the 
malevolent relays and dispose (efface) data from them, trace bits are embedded in the information data at each source node. 
Keywords: Multiple access relay network, trade-off between reliability and security, falsified data injection and forward error 
correction. 
1. INTRODUCTION 
Multiple access relay networks, relay nodes may combine the 
packets received from different sources to generate parity 
symbols (packets) and send them to the destination. Then, the 
destination may usage the network generated parity symbols 
(packets) to enhance the reliability by decoding. While this 
technology is promising in improving communication quality, 
it also represents a new challenge at the physical layer due to 
the dependency of the cooperation. That is, reliance on 
implicit trust relationship among participating nodes makes it 
more vulnerable to falsified data injection. Although this 
might also occur in a traditionalistic system without 
cooperative communication, its effect is far-off more serious 
with cooperative communication. If a false packet is 
interjected into the buffer of a node, the output of the node 
will become improve, and this may soon propagate to the full 
network. 
The problem of detecting malevolent relay nodes in single-source, 
multi-relay networks has been studied in the literature 
for different relaying schemes. Relay nodes in apply network 
coding while those in follow the decode-and-forward 
protocol. In the authors consider a peer-to-peer (P2P) network 
in which peers receive and forward a linear combination of 
the exogenous data packets. To check out the integrity of the 
received packets, a key signature vector is generated at the 
source node and broad-casted to all nodes where it is used to 
check the integrity of the received packets. In lot of 
information theoretic algorithms for mitigating falsified data 
injection effects are proposed. The network modeling used in 
these works is composed of a single source, multiple 
intermediate nodes which utilize network coding. 
In all algorithms proposed in there are two fundamental 
assumptions. First, all exogenous data packets are known at a 
single node to generate the hash or the signature vector. 
Therefore, these algorithms cannot be applied in multi-source 
scenarios because each source generates independent packets 
and thus the packets of all sources are not available at a single 
node. Second, each received packet is decrypted 
independently, and then the integrity from the decoded packet 
is checked using the hash or the signature vector. However, 
when the received packets are combined before decoding, a 
different approach needs to be developed to check the 
credibility (integrity) of the received packets. For example, in 
three-terminal cooperative diversity systems, the packets of 
the source and that from the relay are combined (e.g. using 
maximal ratio combining (MRC)) before decoding the 
message packet and then the integrity is checked on the 
decoded message packet. In the authors consider inserting a 
number of tracing bits in the data stream at the source in a 
cryptographically secure manner in single source scenario. 
The receiver then calculates the ground truth of the tracing 
bits and compares them with the tracing bits received from the 
relay path to determine whether a relay node is adversarial or 
cooperative. If the correlation coefficient between them is 
above a threshold then we decide that the relay node is 
cooperative and, otherwise, it is malevolent. The threshold 
can be chosen to achieve a target false alarm, misdetection, or 
error probability. The authors of propose a statistical detection 
technique in order to mitigate malevolent behavior in adaptive 
decode-and-forward (DF) cooperative diversity. 
To exploit the detection outcome to enhance the reliability of 
decoding by erasing (discarding) the data received from the 
adversarial nodes and correcting the erasures. The motivating 
is that erasures can be corrected twice as many as errors. 
However, the information in the presence of attack may not be 
perfect in practice. The false alarm results in an erasure of 
correct bit, while the miss detecting may result in an error in 
place of an erasure. Since the chance of false alarm and that of 
miss detection depend on the amount of tracing bits and the 
www.ijcat.com 682
International Journal of Computer Applications Technology and Research 
Volume 3– Issue 11, 682 - 684, 2014 
errors-and-erasures correction capability depends on the 
amount of parity bits, we require there exists an optimal 
allocation of the redundancy between tracing bits and parity 
bits that minimizes the probability of decoding error at the 
destination. Here, the tracing bits are to identify the 
malevolent relay nodes and erase the data received by them, 
while the parity bits are to the correct errors caused by 
channel and noise. For a given redundance, more parity bits 
(more reliability) implies less tracing bits (less security), and 
vice versa. That is, there exists a trade-off between reliability 
and security. We enquiry the optimal allocation of a given 
amount of redundancy (trade-off) between tracing bits and 
parity bits. 
Fig. 1 Architecture Flow Diagram 
2. RELATED WORK 
2.1 Multiple Access Relay System 
A multiple access relay network where multiple sources send 
independent data to a single destination through multiple 
relays. Multiple relay systems maintain the current 
information of the sources connection details and the 
respective files details. As per request and response relay 
system communicate with the source systems. In multiple 
access relay networks, relay nodes may combine the 
information’s received from different sources to generate 
scheduling process as per destination request and forward the 
request to respective short listed source. 
2.2 Source Response System 
As per relay node request each source send the periodic 
update information about its connection status and the files 
information. The source generates independent packets after 
get the file request from the relay node then generate source 
key which is based on the contents in the file like 
reference/tracing bits. Then classify the destination system 
form the request packet and route the file to the destination 
system. At each source, the tracing bits are embedded in the k 
message bits using a position key κp which is common for all 
sources and is known to all source nodes and the destination. 
The generation and position keys are assumed to be unknown 
to the relay nodes. So, even if a relay is compromised the 
information on the tracing bits cannot be released to the 
attacker. 
2.3 Destination Request System 
To detect the malevolent relays and discard (erase) data from 
them, tracing bits are embedded in the data at each source 
node. The destination node then computes the ground truth of 
the tracing bits and compares them with the tracing bits 
received from the relay path to determine whether a relay 
node is adversarial or cooperative. Destination system sends 
the file request to the relay node and waits till the file gets 
download. After getting download request from the source 
system, the destination system accept the download request 
and classify the packet for to identify any false data may 
injected and identify the malevolent relay node. 
2.4 False Data Injection Attack Detection 
This module exploit the detection outcome to enhance the 
reliability of decoding by erasing (discarding) the data 
received from the adversarial nodes and correcting the 
erasures. Here, the tracing bits are to identify the malevolent 
relay nodes and erase the data received from them. Generate 
the data references for the content in the received file and 
calculate the distance between the data and find the similarity 
than compare with threshold, finally identify the malevolent 
activity of relay node and the injected data’s. 
Fig. 2 Architecture Design 
3. SECURE AND SCALABLE 
SCHEDULING PROCESS IN RELAY 
NETWORKS 
We believed a multiple access relay network and investigated 
the following three processes: 
 Trade-off between reliability and security under 
falsified data injection attacks 
 Prioritized analog relaying 
 Mitigation by Forwarding Misbehaviors in Multiple 
access relay network 
In the first process, a multiple access relay network where 
multiple sources send independent data to a single destination 
www.ijcat.com 683
International Journal of Computer Applications Technology and Research 
Volume 3– Issue 11, 682 - 684, 2014 
through multiple relays which may inject a falsified data into 
the network. To detect the malevolent relays and discard 
(erase) data from them, tracing bits or secure key or data 
reference are embedded in the data at each source node. The 
performance metrics gains provided by the update optimal 
allocation/scheduling of data forwarding and the tradeoff 
between reliability and security are analyzed. 
In the second process, a multiple access relay network where 
multiple sources send independent data simultaneously to a 
common destination through multiple relay nodes. Relay 
systems maintain update information about the source and its 
data. As per destination request relay system schedule the 
source and send the request packet to the respective source. 
In the third process, a destination layer approach to detect the 
relay node that injects false data or adds channel errors into 
the network encoder in multiple access relay networks. 
The misbehaving relay is detected by using the source key or 
data reference detection rule which is optimal in the sense of 
minimizing the probability of incorrect decision (false alarm 
and miss detection). The proposed schema does not require 
sending extra bits at the source, such as hashish function or 
message authentication check bits, and hence there is no more 
transmission overhead. The side data regarding the presence 
of forwarding misbehavior is exploited at the decoder to 
enhance the reliability of decoding. 
4. CONCLUSION 
Optimal allocation of redundancy between tracing bits and 
parity bits that minimizes the probability of decoding error or 
maximizing the throughput. The generation and position keys 
are assumed to be unknown to the relay nodes. So, even if a 
relay is compromised the information on the tracing bits 
cannot be released to the attacker. When the total amount of 
redundancy (sum of tracing bits and parity bits) is fixed, more 
redundancy should be allocated to the tracing bits for higher 
probability of being malicious and less on the tracing bits for 
lower SNR. Analyzed the energy gain (saving) and the 
throughput gain provided by the optimal redundancy 
allocation. 
5. FUTURE ENHANCEMENT 
To overcome the drawbacks, enhance the system to achieve 
more scalability. If any sources update any file location, it 
needs to update the location information which maintain in 
the relay system thus overcome the false routing. If any 
source goes offline i.e. disconnect from the relay systems thus 
is must indicate offline mode in the relay node if so it must 
not consider for routing. By implementing these steps as our 
enhancement with the system, we overcome the drawbacks 
and get the high scalability as well as certain information 
about the source mode status and files location. 
6. REFERENCES 
[1] Taha A. Khalaf, Sang Wu Kim, and Alaa E. Abdel-Hakim, 
“Tradeoff Between Reliability and Security in Multiple 
Access Relay Networks Under Falsified Data Injection 
Attack” IEEE TRANSACTIONS ON INFORMATION 
FORENSICS AND SECURITY, VOL. 9, NO. 3, MARCH 
2014. 
[2] J. N. Laneman, D. N. C. Tse, and G. Wornell, 
“Cooperative diversity in wireless networks: Efficient 
protocols and outage behavior,” IEEE Trans. Inf. Theory, vol. 
50, no. 12, pp. 3062–3080, Dec. 2004. 
[3] A. Nosratinia, T. E. Hunter, and A. Hedayat, “Cooperative 
communication in wireless networks,” IEEE Commun. Mag., 
vol. 42, no. 10,pp. 74–80, Oct. 2004. 
[4] S. W. Kim, “Cooperative spatial multiplexing in mobile ad 
hoc networks,” in Proc. IEEE Int. Conf. Mobile Ad Hoc 
Sensor Syst. Conf.,Washington, DC, USA, Nov. 2005, pp. 
387–395. 
[5] A. Host-Madsen and A. Nosratinia, “The multiplexing 
gain of wireless networks,” in Proc. IEEE ISIT, Adelaide, SA, 
USA, Sep. 2005,pp. 2065–2069. 
[6] Y. Chen, S. Kishore, and J. Li, “Wireless diversity through 
network coding,” in Proc. IEEE WCNC, Las Vegas, NV, 
USA, Apr. 2006,pp. 1681–1686. 
[7] X. Bao and J. Li, “Matching code-on-graph with 
networks-on-graph: Adaptive network coding for wireless 
relay networks,” in Proc. Allerton Conf. Commun., Control 
Comput., Champaign, IL, USA, Sep. 2005,pp. 1–10. 
[8] C. Hausl and P. Dupraz, “Joint network-channel coding 
for the multipleaccess relay channel,” in Proc. 3rd Annu. 
IEEE Commun. Soc. Sensor Ad Hoc Commun. Netw., Reston, 
VA, USA, Sep. 2006, pp. 817–822. 
www.ijcat.com 684

More Related Content

What's hot

A novel algorithm to protect and manage memory locations
A novel algorithm to protect and manage memory locationsA novel algorithm to protect and manage memory locations
A novel algorithm to protect and manage memory locationsiosrjce
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...IRJET Journal
 
Risk-Aware Response Mechanism with Extended D-S theory
Risk-Aware Response Mechanism with Extended D-S theoryRisk-Aware Response Mechanism with Extended D-S theory
Risk-Aware Response Mechanism with Extended D-S theoryEditor IJCATR
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingIOSR Journals
 
Image Based Relational Database Watermarking: A Survey
Image Based Relational Database Watermarking: A SurveyImage Based Relational Database Watermarking: A Survey
Image Based Relational Database Watermarking: A Surveyiosrjce
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Publishing House
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Journals
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
Ad hoc networks filter based addressing protocol
Ad hoc networks filter based addressing protocolAd hoc networks filter based addressing protocol
Ad hoc networks filter based addressing protocoleSAT Publishing House
 
An efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingAn efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingambitlick
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkIRJET Journal
 
Fault Link Detection in WSN using Link Scanner Approach
Fault Link Detection in WSN using Link Scanner ApproachFault Link Detection in WSN using Link Scanner Approach
Fault Link Detection in WSN using Link Scanner ApproachIRJET Journal
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Networkdbpublications
 
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORKDETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORKIJCI JOURNAL
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
 
Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...Pvrtechnologies Nellore
 

What's hot (17)

A novel algorithm to protect and manage memory locations
A novel algorithm to protect and manage memory locationsA novel algorithm to protect and manage memory locations
A novel algorithm to protect and manage memory locations
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
 
Risk-Aware Response Mechanism with Extended D-S theory
Risk-Aware Response Mechanism with Extended D-S theoryRisk-Aware Response Mechanism with Extended D-S theory
Risk-Aware Response Mechanism with Extended D-S theory
 
Enhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast RoutingEnhance the Throughput of Wireless Network Using Multicast Routing
Enhance the Throughput of Wireless Network Using Multicast Routing
 
Image Based Relational Database Watermarking: A Survey
Image Based Relational Database Watermarking: A SurveyImage Based Relational Database Watermarking: A Survey
Image Based Relational Database Watermarking: A Survey
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
Ad hoc networks filter based addressing protocol
Ad hoc networks filter based addressing protocolAd hoc networks filter based addressing protocol
Ad hoc networks filter based addressing protocol
 
An efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharingAn efficient hybrid peer to-peersystemfordistributeddatasharing
An efficient hybrid peer to-peersystemfordistributeddatasharing
 
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant NetworkDetecting Misbehavior Nodes Using Secured Delay Tolerant Network
Detecting Misbehavior Nodes Using Secured Delay Tolerant Network
 
Fault Link Detection in WSN using Link Scanner Approach
Fault Link Detection in WSN using Link Scanner ApproachFault Link Detection in WSN using Link Scanner Approach
Fault Link Detection in WSN using Link Scanner Approach
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Network
 
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORKDETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
DETECTING PACKET DROPPING ATTACK IN WIRELESS AD HOC NETWORK
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
 
Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...Secure and distributed data discovery and dissemination in wireless sensor ne...
Secure and distributed data discovery and dissemination in wireless sensor ne...
 

Viewers also liked

Certificado - VII Encuentro de Ex-alumnos del Prof. Ivo Pitanguy
Certificado - VII Encuentro de Ex-alumnos del Prof. Ivo PitanguyCertificado - VII Encuentro de Ex-alumnos del Prof. Ivo Pitanguy
Certificado - VII Encuentro de Ex-alumnos del Prof. Ivo PitanguyLuis Cordero
 
Program Aging and Service Crash
Program Aging and Service CrashProgram Aging and Service Crash
Program Aging and Service CrashEditor IJCATR
 
A Review of Image Processing Software Techniques for Early Detection of Plant...
A Review of Image Processing Software Techniques for Early Detection of Plant...A Review of Image Processing Software Techniques for Early Detection of Plant...
A Review of Image Processing Software Techniques for Early Detection of Plant...Editor IJCATR
 
Avaliacao 7tl 1bim
Avaliacao 7tl 1bimAvaliacao 7tl 1bim
Avaliacao 7tl 1bimKezia Maciel
 
How to get more views on you tube – buy youtube views safely
How to get more views on you tube – buy youtube views safelyHow to get more views on you tube – buy youtube views safely
How to get more views on you tube – buy youtube views safelyHarold Bell
 
Certificado - Buenas Prácticas Profesionales
Certificado - Buenas Prácticas ProfesionalesCertificado - Buenas Prácticas Profesionales
Certificado - Buenas Prácticas ProfesionalesLuis Cordero
 
JavaScript and the AST
JavaScript and the ASTJavaScript and the AST
JavaScript and the ASTJarrod Overson
 
State of Web Security RailsConf 2016
State of Web Security RailsConf 2016State of Web Security RailsConf 2016
State of Web Security RailsConf 2016IMMUNIO
 
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANAvoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANEditor IJCATR
 
Aspectos curriculares tecnica en programacion de computadores
Aspectos curriculares   tecnica en programacion de computadoresAspectos curriculares   tecnica en programacion de computadores
Aspectos curriculares tecnica en programacion de computadoresjhonicar-gol2011
 
Graphics Programming for Web Developers
Graphics Programming for Web DevelopersGraphics Programming for Web Developers
Graphics Programming for Web DevelopersJarrod Overson
 
Big Data is today: key issues for big data - Dr Ben Evans
Big Data is today: key issues for big data - Dr Ben EvansBig Data is today: key issues for big data - Dr Ben Evans
Big Data is today: key issues for big data - Dr Ben EvansARDC
 
Evaluación neuropsicológica en niños con autismo
Evaluación neuropsicológica en niños con autismoEvaluación neuropsicológica en niños con autismo
Evaluación neuropsicológica en niños con autismoDanae Torres
 
Natour 2017 Creuse
Natour 2017 CreuseNatour 2017 Creuse
Natour 2017 CreuseMONA
 
Monatour Lot-et-Garonne 09 février 2017
Monatour Lot-et-Garonne 09 février 2017Monatour Lot-et-Garonne 09 février 2017
Monatour Lot-et-Garonne 09 février 2017MONA
 

Viewers also liked (16)

Certificado - VII Encuentro de Ex-alumnos del Prof. Ivo Pitanguy
Certificado - VII Encuentro de Ex-alumnos del Prof. Ivo PitanguyCertificado - VII Encuentro de Ex-alumnos del Prof. Ivo Pitanguy
Certificado - VII Encuentro de Ex-alumnos del Prof. Ivo Pitanguy
 
Program Aging and Service Crash
Program Aging and Service CrashProgram Aging and Service Crash
Program Aging and Service Crash
 
A Review of Image Processing Software Techniques for Early Detection of Plant...
A Review of Image Processing Software Techniques for Early Detection of Plant...A Review of Image Processing Software Techniques for Early Detection of Plant...
A Review of Image Processing Software Techniques for Early Detection of Plant...
 
Projeto master
Projeto masterProjeto master
Projeto master
 
Avaliacao 7tl 1bim
Avaliacao 7tl 1bimAvaliacao 7tl 1bim
Avaliacao 7tl 1bim
 
How to get more views on you tube – buy youtube views safely
How to get more views on you tube – buy youtube views safelyHow to get more views on you tube – buy youtube views safely
How to get more views on you tube – buy youtube views safely
 
Certificado - Buenas Prácticas Profesionales
Certificado - Buenas Prácticas ProfesionalesCertificado - Buenas Prácticas Profesionales
Certificado - Buenas Prácticas Profesionales
 
JavaScript and the AST
JavaScript and the ASTJavaScript and the AST
JavaScript and the AST
 
State of Web Security RailsConf 2016
State of Web Security RailsConf 2016State of Web Security RailsConf 2016
State of Web Security RailsConf 2016
 
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LANAvoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
Avoiding Man in the Middle Attack Based on ARP Spoofing in the LAN
 
Aspectos curriculares tecnica en programacion de computadores
Aspectos curriculares   tecnica en programacion de computadoresAspectos curriculares   tecnica en programacion de computadores
Aspectos curriculares tecnica en programacion de computadores
 
Graphics Programming for Web Developers
Graphics Programming for Web DevelopersGraphics Programming for Web Developers
Graphics Programming for Web Developers
 
Big Data is today: key issues for big data - Dr Ben Evans
Big Data is today: key issues for big data - Dr Ben EvansBig Data is today: key issues for big data - Dr Ben Evans
Big Data is today: key issues for big data - Dr Ben Evans
 
Evaluación neuropsicológica en niños con autismo
Evaluación neuropsicológica en niños con autismoEvaluación neuropsicológica en niños con autismo
Evaluación neuropsicológica en niños con autismo
 
Natour 2017 Creuse
Natour 2017 CreuseNatour 2017 Creuse
Natour 2017 Creuse
 
Monatour Lot-et-Garonne 09 février 2017
Monatour Lot-et-Garonne 09 février 2017Monatour Lot-et-Garonne 09 février 2017
Monatour Lot-et-Garonne 09 février 2017
 

Similar to Ensure Security and Scalable Performance in Multiple Relay Networks

A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...Pvrtechnologies Nellore
 
Tradeoff between reliability and security in multiple access relay networks u...
Tradeoff between reliability and security in multiple access relay networks u...Tradeoff between reliability and security in multiple access relay networks u...
Tradeoff between reliability and security in multiple access relay networks u...Shakas Technologies
 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...1crore projects
 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...1crore projects
 
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...Pvrtechnologies Nellore
 
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKSDESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKScscpconf
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...IEEEBEBTECHSTUDENTSPROJECTS
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...IEEEGLOBALSOFTSTUDENTPROJECTS
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...eSAT Journals
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)Mumbai Academisc
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...IRJET Journal
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACEScscpconf
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...nooriasukmaningtyas
 
Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd Iaetsd
 
Security Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsSecurity Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsIJTET Journal
 

Similar to Ensure Security and Scalable Performance in Multiple Relay Networks (20)

A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...A lightweight secure scheme for detecting provenance forgery and packet drop ...
A lightweight secure scheme for detecting provenance forgery and packet drop ...
 
Tradeoff between reliability and security in multiple access relay networks u...
Tradeoff between reliability and security in multiple access relay networks u...Tradeoff between reliability and security in multiple access relay networks u...
Tradeoff between reliability and security in multiple access relay networks u...
 
B010110514
B010110514B010110514
B010110514
 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
 
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
Privacy-Preserving and Truthful Detection of Packet Dropping Attacks in Wirel...
 
Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...Privacy preserving and truthful detection of packet dropping attacks in wirel...
Privacy preserving and truthful detection of packet dropping attacks in wirel...
 
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKSDESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
 
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
2014 IEEE JAVA NETWORK SECURITY PROJECT Tradeoff between reliability and secu...
 
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...
IEEE 2014 JAVA NETWORK SECURITY PROJECTS Tradeoff between reliability and sec...
 
zebra curtain
zebra curtainzebra curtain
zebra curtain
 
best jewelry
best jewelrybest jewelry
best jewelry
 
ijaerv13n9_59.pdf
ijaerv13n9_59.pdfijaerv13n9_59.pdf
ijaerv13n9_59.pdf
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
 
A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)A wireless intrusion detection system and a new attack model (synopsis)
A wireless intrusion detection system and a new attack model (synopsis)
 
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
A Distributed Approach for Detecting Wormhole Attack in Wireless Network Codi...
 
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACESDATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
DATA FORWARDING IN OPPORTUNISTIC NETWORK USING MOBILE TRACES
 
Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...Secure dynamic source routing protocol for defending black hole attacks in mo...
Secure dynamic source routing protocol for defending black hole attacks in mo...
 
I1802046780
I1802046780I1802046780
I1802046780
 
Iaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme inIaetsd a survey on enroute filtering scheme in
Iaetsd a survey on enroute filtering scheme in
 
Security Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETsSecurity Enhancement using Trust Management in MANETs
Security Enhancement using Trust Management in MANETs
 

More from Editor IJCATR

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineEditor IJCATR
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in EducationEditor IJCATR
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
 

More from Editor IJCATR (20)

Text Mining in Digital Libraries using OKAPI BM25 Model
 Text Mining in Digital Libraries using OKAPI BM25 Model Text Mining in Digital Libraries using OKAPI BM25 Model
Text Mining in Digital Libraries using OKAPI BM25 Model
 
Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendly
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in Nigeria
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation Conditions
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source Site
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in Education
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
 

Recently uploaded

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Ensure Security and Scalable Performance in Multiple Relay Networks

  • 1. International Journal of Computer Applications Technology and Research Volume 3– Issue 11, 682 - 684, 2014 Ensure Security and Scalable Performance in Multiple Relay Networks V.Eswaramurthy Computer Science and Engineering V.S.B Engineering College Karur,India A.P.V Raghavendra Computer Science and Engineering V.S.B Engineering College Karur,India Abstract: A relay network is a broad class of network topology commonly used in networks, where the source and destination are interconnected by means of a some nodes. In such a network the source and destination cannot transmit to each other directly because the distance between the source and destination is greater than the transmission range of both of them, hence the demand for intermediate node(s) to relay. The problem of detecting malicious relay nodes in single source, multi-relay networks has been studied in the literature for different relaying schemes. Relay nodes in apply network coding while those in and follow the decode-and-forward protocol. The authors consider a peer-to-peer (P2P) network in which peers receive and forward a linear combination of the exogenous data packets. To check out the integrity of the received packets, a key signature vector is generated at the source node and broadcasted to all nodes where it is used to check the integrity of the received packets. In and several information theoretic algorithms for mitigating falsified data injection effects are proposed. The network modeling used in these works is composed of a single source, multiple intermediate nodes which utilize network coding. We consider a multiple access relay network where multiple sources send independent data to a single destination through multiple relays, which may interject falsified data into the network. To detect the malevolent relays and dispose (efface) data from them, trace bits are embedded in the information data at each source node. Keywords: Multiple access relay network, trade-off between reliability and security, falsified data injection and forward error correction. 1. INTRODUCTION Multiple access relay networks, relay nodes may combine the packets received from different sources to generate parity symbols (packets) and send them to the destination. Then, the destination may usage the network generated parity symbols (packets) to enhance the reliability by decoding. While this technology is promising in improving communication quality, it also represents a new challenge at the physical layer due to the dependency of the cooperation. That is, reliance on implicit trust relationship among participating nodes makes it more vulnerable to falsified data injection. Although this might also occur in a traditionalistic system without cooperative communication, its effect is far-off more serious with cooperative communication. If a false packet is interjected into the buffer of a node, the output of the node will become improve, and this may soon propagate to the full network. The problem of detecting malevolent relay nodes in single-source, multi-relay networks has been studied in the literature for different relaying schemes. Relay nodes in apply network coding while those in follow the decode-and-forward protocol. In the authors consider a peer-to-peer (P2P) network in which peers receive and forward a linear combination of the exogenous data packets. To check out the integrity of the received packets, a key signature vector is generated at the source node and broad-casted to all nodes where it is used to check the integrity of the received packets. In lot of information theoretic algorithms for mitigating falsified data injection effects are proposed. The network modeling used in these works is composed of a single source, multiple intermediate nodes which utilize network coding. In all algorithms proposed in there are two fundamental assumptions. First, all exogenous data packets are known at a single node to generate the hash or the signature vector. Therefore, these algorithms cannot be applied in multi-source scenarios because each source generates independent packets and thus the packets of all sources are not available at a single node. Second, each received packet is decrypted independently, and then the integrity from the decoded packet is checked using the hash or the signature vector. However, when the received packets are combined before decoding, a different approach needs to be developed to check the credibility (integrity) of the received packets. For example, in three-terminal cooperative diversity systems, the packets of the source and that from the relay are combined (e.g. using maximal ratio combining (MRC)) before decoding the message packet and then the integrity is checked on the decoded message packet. In the authors consider inserting a number of tracing bits in the data stream at the source in a cryptographically secure manner in single source scenario. The receiver then calculates the ground truth of the tracing bits and compares them with the tracing bits received from the relay path to determine whether a relay node is adversarial or cooperative. If the correlation coefficient between them is above a threshold then we decide that the relay node is cooperative and, otherwise, it is malevolent. The threshold can be chosen to achieve a target false alarm, misdetection, or error probability. The authors of propose a statistical detection technique in order to mitigate malevolent behavior in adaptive decode-and-forward (DF) cooperative diversity. To exploit the detection outcome to enhance the reliability of decoding by erasing (discarding) the data received from the adversarial nodes and correcting the erasures. The motivating is that erasures can be corrected twice as many as errors. However, the information in the presence of attack may not be perfect in practice. The false alarm results in an erasure of correct bit, while the miss detecting may result in an error in place of an erasure. Since the chance of false alarm and that of miss detection depend on the amount of tracing bits and the www.ijcat.com 682
  • 2. International Journal of Computer Applications Technology and Research Volume 3– Issue 11, 682 - 684, 2014 errors-and-erasures correction capability depends on the amount of parity bits, we require there exists an optimal allocation of the redundancy between tracing bits and parity bits that minimizes the probability of decoding error at the destination. Here, the tracing bits are to identify the malevolent relay nodes and erase the data received by them, while the parity bits are to the correct errors caused by channel and noise. For a given redundance, more parity bits (more reliability) implies less tracing bits (less security), and vice versa. That is, there exists a trade-off between reliability and security. We enquiry the optimal allocation of a given amount of redundancy (trade-off) between tracing bits and parity bits. Fig. 1 Architecture Flow Diagram 2. RELATED WORK 2.1 Multiple Access Relay System A multiple access relay network where multiple sources send independent data to a single destination through multiple relays. Multiple relay systems maintain the current information of the sources connection details and the respective files details. As per request and response relay system communicate with the source systems. In multiple access relay networks, relay nodes may combine the information’s received from different sources to generate scheduling process as per destination request and forward the request to respective short listed source. 2.2 Source Response System As per relay node request each source send the periodic update information about its connection status and the files information. The source generates independent packets after get the file request from the relay node then generate source key which is based on the contents in the file like reference/tracing bits. Then classify the destination system form the request packet and route the file to the destination system. At each source, the tracing bits are embedded in the k message bits using a position key κp which is common for all sources and is known to all source nodes and the destination. The generation and position keys are assumed to be unknown to the relay nodes. So, even if a relay is compromised the information on the tracing bits cannot be released to the attacker. 2.3 Destination Request System To detect the malevolent relays and discard (erase) data from them, tracing bits are embedded in the data at each source node. The destination node then computes the ground truth of the tracing bits and compares them with the tracing bits received from the relay path to determine whether a relay node is adversarial or cooperative. Destination system sends the file request to the relay node and waits till the file gets download. After getting download request from the source system, the destination system accept the download request and classify the packet for to identify any false data may injected and identify the malevolent relay node. 2.4 False Data Injection Attack Detection This module exploit the detection outcome to enhance the reliability of decoding by erasing (discarding) the data received from the adversarial nodes and correcting the erasures. Here, the tracing bits are to identify the malevolent relay nodes and erase the data received from them. Generate the data references for the content in the received file and calculate the distance between the data and find the similarity than compare with threshold, finally identify the malevolent activity of relay node and the injected data’s. Fig. 2 Architecture Design 3. SECURE AND SCALABLE SCHEDULING PROCESS IN RELAY NETWORKS We believed a multiple access relay network and investigated the following three processes:  Trade-off between reliability and security under falsified data injection attacks  Prioritized analog relaying  Mitigation by Forwarding Misbehaviors in Multiple access relay network In the first process, a multiple access relay network where multiple sources send independent data to a single destination www.ijcat.com 683
  • 3. International Journal of Computer Applications Technology and Research Volume 3– Issue 11, 682 - 684, 2014 through multiple relays which may inject a falsified data into the network. To detect the malevolent relays and discard (erase) data from them, tracing bits or secure key or data reference are embedded in the data at each source node. The performance metrics gains provided by the update optimal allocation/scheduling of data forwarding and the tradeoff between reliability and security are analyzed. In the second process, a multiple access relay network where multiple sources send independent data simultaneously to a common destination through multiple relay nodes. Relay systems maintain update information about the source and its data. As per destination request relay system schedule the source and send the request packet to the respective source. In the third process, a destination layer approach to detect the relay node that injects false data or adds channel errors into the network encoder in multiple access relay networks. The misbehaving relay is detected by using the source key or data reference detection rule which is optimal in the sense of minimizing the probability of incorrect decision (false alarm and miss detection). The proposed schema does not require sending extra bits at the source, such as hashish function or message authentication check bits, and hence there is no more transmission overhead. The side data regarding the presence of forwarding misbehavior is exploited at the decoder to enhance the reliability of decoding. 4. CONCLUSION Optimal allocation of redundancy between tracing bits and parity bits that minimizes the probability of decoding error or maximizing the throughput. The generation and position keys are assumed to be unknown to the relay nodes. So, even if a relay is compromised the information on the tracing bits cannot be released to the attacker. When the total amount of redundancy (sum of tracing bits and parity bits) is fixed, more redundancy should be allocated to the tracing bits for higher probability of being malicious and less on the tracing bits for lower SNR. Analyzed the energy gain (saving) and the throughput gain provided by the optimal redundancy allocation. 5. FUTURE ENHANCEMENT To overcome the drawbacks, enhance the system to achieve more scalability. If any sources update any file location, it needs to update the location information which maintain in the relay system thus overcome the false routing. If any source goes offline i.e. disconnect from the relay systems thus is must indicate offline mode in the relay node if so it must not consider for routing. By implementing these steps as our enhancement with the system, we overcome the drawbacks and get the high scalability as well as certain information about the source mode status and files location. 6. REFERENCES [1] Taha A. Khalaf, Sang Wu Kim, and Alaa E. Abdel-Hakim, “Tradeoff Between Reliability and Security in Multiple Access Relay Networks Under Falsified Data Injection Attack” IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 3, MARCH 2014. [2] J. N. Laneman, D. N. C. Tse, and G. Wornell, “Cooperative diversity in wireless networks: Efficient protocols and outage behavior,” IEEE Trans. Inf. Theory, vol. 50, no. 12, pp. 3062–3080, Dec. 2004. [3] A. Nosratinia, T. E. Hunter, and A. Hedayat, “Cooperative communication in wireless networks,” IEEE Commun. Mag., vol. 42, no. 10,pp. 74–80, Oct. 2004. [4] S. W. Kim, “Cooperative spatial multiplexing in mobile ad hoc networks,” in Proc. IEEE Int. Conf. Mobile Ad Hoc Sensor Syst. Conf.,Washington, DC, USA, Nov. 2005, pp. 387–395. [5] A. Host-Madsen and A. Nosratinia, “The multiplexing gain of wireless networks,” in Proc. IEEE ISIT, Adelaide, SA, USA, Sep. 2005,pp. 2065–2069. [6] Y. Chen, S. Kishore, and J. Li, “Wireless diversity through network coding,” in Proc. IEEE WCNC, Las Vegas, NV, USA, Apr. 2006,pp. 1681–1686. [7] X. Bao and J. Li, “Matching code-on-graph with networks-on-graph: Adaptive network coding for wireless relay networks,” in Proc. Allerton Conf. Commun., Control Comput., Champaign, IL, USA, Sep. 2005,pp. 1–10. [8] C. Hausl and P. Dupraz, “Joint network-channel coding for the multipleaccess relay channel,” in Proc. 3rd Annu. IEEE Commun. Soc. Sensor Ad Hoc Commun. Netw., Reston, VA, USA, Sep. 2006, pp. 817–822. www.ijcat.com 684