SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET ISO 9001:2008 Certified Journal Page 415
CRYPTO MARK SCHEME FOR FAST POLLUTION DETECTION AND
RESISTANCE OVER NETWORKING
G.S.Pugalendhi1
1 Assistant Professor, Department of Computer science and Engineering, V.S.B Engineering College, Karur, Tamilnadu
India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract : Data security and data protection against
pollution attacks with resource efficiency are the
major challenging tasks of networks. Packet dropping
and modifications are also common attacks that can
be launched by an adversary to disrupt
communication in networks. Many schemes have been
proposed to mitigate, prevent those attacks. But very
few can efficiently identify the pollution attackers
with the delay and cost considerations. Even those
schemes could find after the attacks done. Those type
of schemes used packet HOP_VOTE techniques to
investigate and verify the security issue .To address
these issues, the proposed system introduces a simple
and powerful scheme. The scheme which is a rapid
identifier of polluters and this helps to identify
misbehaved data and routes that dropped or modified
packets. And this proposed system also considers the
other type of security issues such as pollution attacks,
packet content modification and packet dropping
attacks. In order to identify and prevent the data from
unauthorized forwarders, the system proposed a new
scheme which is named as HOPVOTE The proposed
system utilizes the HOPVOTE which is an efficient
packet HOPVOTE technique to protect, prevent and
avoid routing misbehaving attacks. In order to identify
and block the nodes which tries to drop or modify the
data, the proposed system has been implemented the
Keybit verification algorithm. The proposed system
also recovers the data which are polluted and
retransmits using cache based recovery concept. The
procedure behind the proposed system is to identify
the key and its value of every packet with secured data
transmission.
Keywords -HOPVOTE; OLSR; TAG_ENCODE_DECODE
key; MARK mechanism
1. INTRODUCTION
Networking is the word basically relating to computers
and their Connectivity. It is often used in world of
computers and their use in different connections. The
term networking implies the link between two or more
computers and their devices with a vital purpose of
sharing data stored in the computers with each other.
Organizations of different structures sizes and budgets
need different types of networks. It can be divided into
two categories:
1.1 Peer to Peer network:
A peer to peer network has no dedicated servers instead a
number of workstations are connected together for the
purpose of sharing information or devices. It is designed to
satisfy the networking needs of home networks of small
companies that do not want to spend a lot of money on a
dedicated server. But still want to have the capability to
share information or devices like in school, college, cyber
café [2] [3].
1.2 Server based networks:
In server based network data files that will be used by all
of the users are stored on the one server. This will help by
giving you a central point to set up missions on the data
files [1]. After compromising one or multiple nodes, an
adversary may launch various attacks to disrupt the in-
network communication. The attacks are commonly
divided into two common problems, which are dropping
packets and modifying Packets. Packets should not be
filtered out while traveling because they should be used as
evidence to infer packet modifiers [4]. So it cannot be used
together with existing packet filtering schemes this is a
major problem of existing system. To deal with packet
droppers and polluters a widely adopted countermeasure
is used, which is multipath forwarding in that each packet
is forwarded along multiple redundant paths and hence
packet dropping in some but not all of these paths can be
tolerated. Inherent weakness of network coding is that it is
particularly vulnerable to pollution attacks. Malicious
nodes can inject corrupted packets into a network, which
get combined and forwarded by downstream nodes, thus
causing a large number of corrupted packets propagating
in the network [2] [6].
2. PROPOSED SCHEME
This module implements the novel HOP_VOTE scheme
along with tag based authentication scheme for effective
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET ISO 9001:2008 Certified Journal Page 416
pollution attack detection, recovery and blocking. This
allows a node to verify if it received packets belong to
specific rule criteria, even if the encrypted key is
expanding over time. Based on the id and tag creation the
data will be routed. The packet filtering mechanism comes
under Enhanced Scheme. This combines the basic schemes
which are tag verification and a packet filtering
mechanism to tolerate, find and eliminate packet polluters
over the network. In this scheme the sender attaches a
single bit of encrypted key in each packet with is named as
HOP_Vote. The authentication key is unique to the packet
and cannot be polluted anymore. Pollution attack is
reduced [11] [10][9].
• Attacker is identified at once attack is made.
• Abnormal packet size is reduced using hopvote scheme.
• Prevention over packet content modification and packet
dropping attacks.
2.1 Feasibility Study
A system is a feasible system only if it is feasible within
limited resource and time. In this system each and every
process can be feasible for the user and also developer. It
proved user friendly input such as device independent
inputs and getting proper solution for the problem [8].
2.2 Technical Feasibility
Technical Feasibility is the assessment of the technical
view of the system. The system is developed for JAVA
environment a platform independent tool is used to
develop the system. The development risk concerns the
probability, the function of all elements and its
performance should be same in all platforms and in the
system that is being developed. This system is developed
according to the standards and the development software
tools are selected to avoid the problems cited above [4]
[7].The software used to develop this system is Windows
XP, visual studio dot net is done efficiently, and the
concept of SQL helps to create the application back end.
These components are also helpful in providing
interactivity to Java applications.
2.3 Behavioral Feasibility
It is common knowledge that computers illustrations have
something to do with turnover transfers, retraining and
changes in user or developer status. The main emphasis is
customer service, personal contacts with customers
Feasibility report is directed towards management. It
evaluates the impact of the proposed changes on the area
in question. The report is a formal document for
management use, brief enough and sufficiently non-
technical to be understood [6].
2.4 Economic Feasibility
Economic feasibility or cost benefit is an assessment of the
economic justification for a computer based system
project. Though this system the administrator can use the
tool from anywhere within their concern. The system is
developed using the existing resources [9] [8]. So the
project is economically feasible. This is the most
frequently used method for evaluating the effectiveness of
a user system. More commonly, known as cost analysis the
procedure is to determine the benefits and savings that
are expected from a candidate system and compare them
with costs.
2.5 Operational Feasibility:
Operational Feasibility deals with the study of prospects of
the system. These systems operationally eliminate all the
tensions of the administrator and helps in effectively
tracking the project progress [5]. This kind of automation
will surely reduce the time and energy, which previously
consumed in manual work. Based on the study, the system
proved to be operationally feasible.
3. NETWORK STRUCTURE ANALYSIS
Client-server computing or networking is a distributed
application architecture that partitions tasks or workloads
between service providers (servers) and service
requesters, called clients. Often clients and servers operate
over a computer network on separate hardware. A server
machine is a high performance host that is running one or
more server programs which share its resources with
clients. A client also shares any of its resources; Clients
therefore initiate communication sessions with servers
which await (listen to) incoming requests. The parameters
to construct a network are, the node name is nothing but
the system name, which can be given by the user. The next
value is host number which can be getting from our
network configuration details. The next one is the IP
address of the system. These can be identified by a simple
command on DOS environment. The command, net stat
helps to get all details about the network configuration.
Fig-1: Node Initialization
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET ISO 9001:2008 Certified Journal Page 417
3.1 Topology Construction:
Here it uses mesh topology because of its unstructured
nature. Topology is constructed by getting the names of
the nodes and the connections among the nodes as input
from the user. While getting each of the nodes, their
associated port and IP address is also obtained. For
successive nodes, the node to which it should be
connected is also accepted from the user. While adding
nodes, comparison will be done so that there would be no
node duplication. Then we identify the source and the
destinations. The node information consists of node names
and the weight between them.
Fig-2: Topology Construction
3.2 Routing Protocol (OLSR)
This module implements the novel OLSR message
authentication code. Link-state routing protocols such as
Open Shortest Path First (OSPF) and ISI Select a designated
router on every link to perform flooding of topology
information. In wireless networks, there is different notion
of a link, packets can and do go out the same interface;
hence, a different approach is needed in order to optimize
the flooding process. Using Hello messages the OLSR
protocol a teach node discovers 2-hop neighbor
information and performs a distribute detection of a set of
multipoint relays (MPRs). Nodes select MPRs such that
there exists a path to each of its 2-hop neighbors via a
node selected as an MPR.
3.3 Message Transmission:
In this module we transmit the message from source to
destination. Here choose a destination and select a
number of intermediate for that destination. Tag creation
and path is calculated by TAG_ENCODE_DECODE
mechanism. It will take minimum node cost an account to
find the path between a source and destination. The
HOP_VOTE key is updated in packet frequently. The source
obtains the keys from the packet and compares. After
receiving a message the destination will send an
acknowledgement to the corresponding source.
3.4 Preventing pollution
HOP_VOTE scheme is introduced in the network to
identify the data attacker nodes. To give data freshness the
TAG_ENCODE_DECODE key is verified in the every hop
node. Whenever the nodes act as a polluter in the next that
node is identified and it is reported to the server node.
Fig-3: Transmission without Attack
Fig-4: Transmission with Attack
4. SIMULATION RESULTS
System implementation is the stage where the theoretical
design turned into the working system. The most crucial
stage the user confidence the new system will work
efficiently and effectively. The performance of reliability of
the system was tested and it gained acceptance. The
system was implemented successfully.
Fig-4: System Architecture Design
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET ISO 9001:2008 Certified Journal Page 418
Proper implementation is essential to provide a reliable
system to meet organization requirements. During the
implementation stage a live demon was undertaken and
made in front of end users. Implementation is a stage of
where the system design is turned into a working system.
This intends for testing the developed program with
sample data, Detection and correction of internal error,
testing the system to meet the user requirement, Feeding
the real time data and retesting. Making necessary
changes as described by the user.
Fig-5: MARK mechanism
Fig-6: Performance
Fig-7: Polluter Node
5. CONCLUSION
I have proposed a Mark based response solution for
pollution attacks in the network. Especially, this approach
considered the potential damages of data attacks and
countermeasures to overcome the pollution activity. In
order to measure the risk of both attacks and data
recovery the MARK mechanism is used. This system
extended the work of pinpointing the attacker node to the
monitor with an attack type. Based on several metrics, this
system is investigated the performance and other security
approach and the experiment results clearly demonstrated
the effectiveness and scalability of this proposed Mark
mechanism approach.
6. FUTURE WORK
This study presents initial work in detecting misbehaving
nodes and other pollution in the wireless networks. This
section is described about some further ideas to explore in
the future. The next goal is to analyze how the routing
extensions perform with flows common to most network
applications. The focus would then change from
measuring throughput, or dropped packets, to measuring
the time to complete a reliable transmission. Security is
such an important feature that it could determine the
success and wide deployment of wireless networks. A
variety of pollution attacks have been identified. Security
must be ensured in the entire system including the
security primitives, such as key management protocols,
since overall security level is determined by the system’s
weakest point.
ACKNOWLEDGMENTS
I take this opportunity to acknowledge with great
Pleasure, deep satisfaction and gratitude, the contribution
of many individuals in the successful completion of this
project.
I express my profound sincerity and heartfelt gratefulness
to chairman Thiru.V.S.Balsamy, B.Sc.,L.L.B., of V.S.B.College
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET ISO 9001:2008 Certified Journal Page 419
of engineering, Karur, for having given me the opportunity
to work and to undertake the project work.
I also express my gratitude to all the faculty members of
Department for their timely support and encouragement. I
thank my beloved parents and friends who have helped
me to complete this project successfully.
REFERENCES
[1] Agrawal.S and Boneh.D (2009), “Homomorphic MACs:
MAC-Based Integrity for Network Coding,” Proc. Intel
Conf. Applied Cryptography and Network Security.
[2] Dong.J, Curtmola.R, and Nita-Rotaru.C (2011),
“Practical Defenses against Pollution Attacks in
Wireless Network Coding,” ACM Trans.Information
and System Security, vol. 14, no. 1, article 7.
[3] Gennaro.R, Katz.J, Krawczyk.H, and Rabin.T (2010),
“Secure Network Coding over the Integers,” Proc. 13th
Intel Conf. Practice and Theory in Public Key
Cryptography (PKC ‟10).
[4] Ho.T, Medard.M, Koetter.R, Karger.D.R, Effros.M, Shi.J,
andLeong.B, (2006) “A Random Linear Network
Coding Approach to Multicast,” IEEE Trans.
Information Theory, vol. 52, no. 10, pp. 4413-4430.
[5] Jaggi.S, Langberg. M,Katti.S,Ho.T, Katabi.D, Medard.M
and Effros.M(2009), “Resilient Network Coding in the
Presence of Byzantine Adversaries,” IEEE Trans.
Information Theory, vol. 54, no. 6, pp. 2596-2603.
[6] Jiang.Y, Zhu.H, Shi.M, Shen.X, and Lin.C (2010), “An
Efficient Dynamic- Identity Based Signature Scheme
for Secure Network Coding,” Computer Networks: The
Intel J. Computer and Telecomm. Networking, vol. 54,
no. 1, pp. 28-40.
[7] Krohn.M, Freedman’s, and Mazieres.D, (2004)“On-the-
Fly VerificationofRateless Erasure Codes for Efficient
Content Distribution,”Proc. IEEE Symp. Security and
Privacy.
[8] XiaohuWu, YinlongXu, ChauYeun and Liping Xiang
(2014), “A Tag encoding scheme against pollution
attack to linear network Coding” networking:
transaction on parallel and distributed systems vol 25,
no1.
[9] Yu.Z, Wei.Y, Ramkumar.B, and Guan.Y (2006), “An
Efficient Signature- Based Scheme for Securing
Network Coding against Pollution Attacks,”Proc. IEEE
INFOCOM.
[10] Yun.A, Cheon.J, and Kim.Y (2010), “On Homomorphic
Signatures for Network Coding,” IEEE Trans.
Computers, vol. 59, no. 9, pp. 1295-1296.
[11] Zhang.P, Jiang.Y, Lin.C, Yao.H, Wasef.A, and Shen.X.S
(2011), “Padding for Orthogonality: Efficient
Subspace Authentication for Network Coding,” Proc.
IEEE INFOCOM.
WEBSITES:
1. http://www.javatpoint.com
2. http://www.stackoverflow.com
3. http://www.codeproject.com
4. http://www.dzone.com
5. http://www.leetcode.com

More Related Content

What's hot

IRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack DetectionIRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack Detection
IRJET Journal
 
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET Journal
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
IRJET Journal
 
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSDESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
IJNSA Journal
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddv
Editor Jacotech
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
IDES Editor
 
Risk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in ManetRisk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in Manet
IOSR Journals
 
J1087181
J1087181J1087181
J1087181
IJERD Editor
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
DMV SAI
 
A review on software defined network security risks and challenges
A review on software defined network security risks and challengesA review on software defined network security risks and challenges
A review on software defined network security risks and challenges
TELKOMNIKA JOURNAL
 
IRJET- A Study of DDoS Attacks in Software Defined Networks
IRJET- A Study of DDoS Attacks in Software Defined NetworksIRJET- A Study of DDoS Attacks in Software Defined Networks
IRJET- A Study of DDoS Attacks in Software Defined Networks
IRJET Journal
 
Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...
Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...
Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...
IRJET Journal
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
eSAT Publishing House
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
Editor IJMTER
 
Enhancing Security in OpenFlow
Enhancing Security in OpenFlowEnhancing Security in OpenFlow
Enhancing Security in OpenFlowNiketa Chellani
 

What's hot (19)

IRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack DetectionIRJET- Software Defined Network: DDOS Attack Detection
IRJET- Software Defined Network: DDOS Attack Detection
 
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
 
IRJET- A Survey on DDOS Attack in Manet
IRJET-  	  A Survey on DDOS Attack in ManetIRJET-  	  A Survey on DDOS Attack in Manet
IRJET- A Survey on DDOS Attack in Manet
 
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNSDESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
DESIGN AND IMPLEMENTATION OF A TRUST-AWARE ROUTING PROTOCOL FOR LARGE WSNS
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddv
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Risk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in ManetRisk Assessment for Identifying Intrusion in Manet
Risk Assessment for Identifying Intrusion in Manet
 
J1087181
J1087181J1087181
J1087181
 
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
A PROJECT REPORT ON SECURED FUZZY BASED ROUTING FRAMEWORK FOR DYNAMIC WIRELES...
 
A review on software defined network security risks and challenges
A review on software defined network security risks and challengesA review on software defined network security risks and challenges
A review on software defined network security risks and challenges
 
IRJET- A Study of DDoS Attacks in Software Defined Networks
IRJET- A Study of DDoS Attacks in Software Defined NetworksIRJET- A Study of DDoS Attacks in Software Defined Networks
IRJET- A Study of DDoS Attacks in Software Defined Networks
 
Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...
Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...
Proactive Population-Risk Based Defense Against Denial of Cyber-Physical Serv...
 
IJAEIT 20
IJAEIT 20IJAEIT 20
IJAEIT 20
 
06558266
0655826606558266
06558266
 
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
Energy efficient ccrvc scheme for secure communications in mobile ad hoc netw...
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
557 562
557 562557 562
557 562
 
Enhancing Security in OpenFlow
Enhancing Security in OpenFlowEnhancing Security in OpenFlow
Enhancing Security in OpenFlow
 
231 236
231 236231 236
231 236
 

Similar to Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking

Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat app
IRJET Journal
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic Secrecy
IRJET Journal
 
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
IRJET Journal
 
publishable paper
publishable paperpublishable paper
publishable paper
chaitanya451336
 
IRJET- Sandbox Technology
IRJET- Sandbox TechnologyIRJET- Sandbox Technology
IRJET- Sandbox Technology
IRJET Journal
 
IRJET- Machine Learning based Network Security
IRJET-  	  Machine Learning based Network SecurityIRJET-  	  Machine Learning based Network Security
IRJET- Machine Learning based Network Security
IRJET Journal
 
An approach of software engineering through middleware
An approach of software engineering through middlewareAn approach of software engineering through middleware
An approach of software engineering through middleware
IAEME Publication
 
IRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring ToolsIRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring Tools
IRJET Journal
 
Cloud data management
Cloud data managementCloud data management
Cloud data managementambitlick
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall techniqueIAEME Publication
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall techniqueIAEME Publication
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall techniqueIAEME Publication
 
Automatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault MappingAutomatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault Mapping
IRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Tal Lavian Ph.D.
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
Angela Hays
 
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...
IRJET Journal
 
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless...
IRJET-  	  An Efficient Dissemination and Dynamic Risk Management in Wireless...IRJET-  	  An Efficient Dissemination and Dynamic Risk Management in Wireless...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless...
IRJET Journal
 

Similar to Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking (20)

Authentication system with Decentralized chat app
Authentication system with Decentralized chat appAuthentication system with Decentralized chat app
Authentication system with Decentralized chat app
 
Wireless Network Intrinsic Secrecy
Wireless Network Intrinsic SecrecyWireless Network Intrinsic Secrecy
Wireless Network Intrinsic Secrecy
 
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...A Decentralized Application for Secure Private and Group Messaging in a Peer-...
A Decentralized Application for Secure Private and Group Messaging in a Peer-...
 
publishable paper
publishable paperpublishable paper
publishable paper
 
IRJET- Sandbox Technology
IRJET- Sandbox TechnologyIRJET- Sandbox Technology
IRJET- Sandbox Technology
 
IRJET- Machine Learning based Network Security
IRJET-  	  Machine Learning based Network SecurityIRJET-  	  Machine Learning based Network Security
IRJET- Machine Learning based Network Security
 
An approach of software engineering through middleware
An approach of software engineering through middlewareAn approach of software engineering through middleware
An approach of software engineering through middleware
 
IRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring ToolsIRJET- Comparative Study on Network Monitoring Tools
IRJET- Comparative Study on Network Monitoring Tools
 
Cloud data management
Cloud data managementCloud data management
Cloud data management
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall technique
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall technique
 
Software defined network based firewall technique
Software defined network based firewall techniqueSoftware defined network based firewall technique
Software defined network based firewall technique
 
Automatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault MappingAutomatic Analyzing System for Packet Testing and Fault Mapping
Automatic Analyzing System for Packet Testing and Fault Mapping
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
Popeye - Using Fine-grained Network Access Control to Support Mobile Users an...
 
Final_Report
Final_ReportFinal_Report
Final_Report
 
1426742816
14267428161426742816
1426742816
 
Critical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems WorldwideCritical Information Infrastructure Systems Worldwide
Critical Information Infrastructure Systems Worldwide
 
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless Sen...
 
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless...
IRJET-  	  An Efficient Dissemination and Dynamic Risk Management in Wireless...IRJET-  	  An Efficient Dissemination and Dynamic Risk Management in Wireless...
IRJET- An Efficient Dissemination and Dynamic Risk Management in Wireless...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Wondering if Your Mercedes EIS is at Fault Here’s How to Tell
Wondering if Your Mercedes EIS is at Fault Here’s How to TellWondering if Your Mercedes EIS is at Fault Here’s How to Tell
Wondering if Your Mercedes EIS is at Fault Here’s How to Tell
Vic Auto Collision & Repair
 
Tyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEATTyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEAT
kshamashah95
 
Empowering Limpopo Entrepreneurs Consulting SMEs.pptx
Empowering Limpopo Entrepreneurs  Consulting SMEs.pptxEmpowering Limpopo Entrepreneurs  Consulting SMEs.pptx
Empowering Limpopo Entrepreneurs Consulting SMEs.pptx
Precious Mvulane CA (SA),RA
 
Digital Fleet Management - Why Your Business Need It?
Digital Fleet Management - Why Your Business Need It?Digital Fleet Management - Why Your Business Need It?
Digital Fleet Management - Why Your Business Need It?
jennifermiller8137
 
Ec330B Lc Excavator Volvo Service Repair.pdf
Ec330B Lc Excavator Volvo Service Repair.pdfEc330B Lc Excavator Volvo Service Repair.pdf
Ec330B Lc Excavator Volvo Service Repair.pdf
Excavator
 
Why Is Your BMW X3 Hood Not Responding To Release Commands
Why Is Your BMW X3 Hood Not Responding To Release CommandsWhy Is Your BMW X3 Hood Not Responding To Release Commands
Why Is Your BMW X3 Hood Not Responding To Release Commands
Dart Auto
 
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
European Service Center
 
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
mymwpc
 
Ec460b lc Excavator Volvo Service Repair.pdf
Ec460b lc Excavator Volvo Service Repair.pdfEc460b lc Excavator Volvo Service Repair.pdf
Ec460b lc Excavator Volvo Service Repair.pdf
Excavator
 
欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】
欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】
欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】
ahmedendrise81
 
What Exactly Is The Common Rail Direct Injection System & How Does It Work
What Exactly Is The Common Rail Direct Injection System & How Does It WorkWhat Exactly Is The Common Rail Direct Injection System & How Does It Work
What Exactly Is The Common Rail Direct Injection System & How Does It Work
Motor Cars International
 
Antique Plastic Traders Company Profile
Antique Plastic Traders Company ProfileAntique Plastic Traders Company Profile
Antique Plastic Traders Company Profile
Antique Plastic Traders
 
Things to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your carThings to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your car
jennifermiller8137
 
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptxStatistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
coc7987515756
 
一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理
一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理
一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理
eygkup
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.docBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
daothibichhang1
 
Core technology of Hyundai Motor Group's EV platform 'E-GMP'
Core technology of Hyundai Motor Group's EV platform 'E-GMP'Core technology of Hyundai Motor Group's EV platform 'E-GMP'
Core technology of Hyundai Motor Group's EV platform 'E-GMP'
Hyundai Motor Group
 
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
Autohaus Service and Sales
 
What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?
Hyundai Motor Group
 
gtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
gtycccccccccccccccccccccccccccccccccccccccccccccccccccccccgtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
gtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
4thzenzstar
 

Recently uploaded (20)

Wondering if Your Mercedes EIS is at Fault Here’s How to Tell
Wondering if Your Mercedes EIS is at Fault Here’s How to TellWondering if Your Mercedes EIS is at Fault Here’s How to Tell
Wondering if Your Mercedes EIS is at Fault Here’s How to Tell
 
Tyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEATTyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEAT
 
Empowering Limpopo Entrepreneurs Consulting SMEs.pptx
Empowering Limpopo Entrepreneurs  Consulting SMEs.pptxEmpowering Limpopo Entrepreneurs  Consulting SMEs.pptx
Empowering Limpopo Entrepreneurs Consulting SMEs.pptx
 
Digital Fleet Management - Why Your Business Need It?
Digital Fleet Management - Why Your Business Need It?Digital Fleet Management - Why Your Business Need It?
Digital Fleet Management - Why Your Business Need It?
 
Ec330B Lc Excavator Volvo Service Repair.pdf
Ec330B Lc Excavator Volvo Service Repair.pdfEc330B Lc Excavator Volvo Service Repair.pdf
Ec330B Lc Excavator Volvo Service Repair.pdf
 
Why Is Your BMW X3 Hood Not Responding To Release Commands
Why Is Your BMW X3 Hood Not Responding To Release CommandsWhy Is Your BMW X3 Hood Not Responding To Release Commands
Why Is Your BMW X3 Hood Not Responding To Release Commands
 
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
 
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
一比一原版(AUT毕业证)奥克兰理工大学毕业证成绩单如何办理
 
Ec460b lc Excavator Volvo Service Repair.pdf
Ec460b lc Excavator Volvo Service Repair.pdfEc460b lc Excavator Volvo Service Repair.pdf
Ec460b lc Excavator Volvo Service Repair.pdf
 
欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】
欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】
欧洲杯比赛投注官网-欧洲杯比赛投注官网网站-欧洲杯比赛投注官网|【​网址​🎉ac123.net🎉​】
 
What Exactly Is The Common Rail Direct Injection System & How Does It Work
What Exactly Is The Common Rail Direct Injection System & How Does It WorkWhat Exactly Is The Common Rail Direct Injection System & How Does It Work
What Exactly Is The Common Rail Direct Injection System & How Does It Work
 
Antique Plastic Traders Company Profile
Antique Plastic Traders Company ProfileAntique Plastic Traders Company Profile
Antique Plastic Traders Company Profile
 
Things to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your carThings to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your car
 
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptxStatistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
 
一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理
一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理
一比一原版(AIS毕业证)奥克兰商学院毕业证成绩单如何办理
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.docBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc
 
Core technology of Hyundai Motor Group's EV platform 'E-GMP'
Core technology of Hyundai Motor Group's EV platform 'E-GMP'Core technology of Hyundai Motor Group's EV platform 'E-GMP'
Core technology of Hyundai Motor Group's EV platform 'E-GMP'
 
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
 
What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?
 
gtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
gtycccccccccccccccccccccccccccccccccccccccccccccccccccccccgtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
gtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
 

Crypto Mark Scheme for Fast Pollution Detection and Resistance over Networking

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 415 CRYPTO MARK SCHEME FOR FAST POLLUTION DETECTION AND RESISTANCE OVER NETWORKING G.S.Pugalendhi1 1 Assistant Professor, Department of Computer science and Engineering, V.S.B Engineering College, Karur, Tamilnadu India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract : Data security and data protection against pollution attacks with resource efficiency are the major challenging tasks of networks. Packet dropping and modifications are also common attacks that can be launched by an adversary to disrupt communication in networks. Many schemes have been proposed to mitigate, prevent those attacks. But very few can efficiently identify the pollution attackers with the delay and cost considerations. Even those schemes could find after the attacks done. Those type of schemes used packet HOP_VOTE techniques to investigate and verify the security issue .To address these issues, the proposed system introduces a simple and powerful scheme. The scheme which is a rapid identifier of polluters and this helps to identify misbehaved data and routes that dropped or modified packets. And this proposed system also considers the other type of security issues such as pollution attacks, packet content modification and packet dropping attacks. In order to identify and prevent the data from unauthorized forwarders, the system proposed a new scheme which is named as HOPVOTE The proposed system utilizes the HOPVOTE which is an efficient packet HOPVOTE technique to protect, prevent and avoid routing misbehaving attacks. In order to identify and block the nodes which tries to drop or modify the data, the proposed system has been implemented the Keybit verification algorithm. The proposed system also recovers the data which are polluted and retransmits using cache based recovery concept. The procedure behind the proposed system is to identify the key and its value of every packet with secured data transmission. Keywords -HOPVOTE; OLSR; TAG_ENCODE_DECODE key; MARK mechanism 1. INTRODUCTION Networking is the word basically relating to computers and their Connectivity. It is often used in world of computers and their use in different connections. The term networking implies the link between two or more computers and their devices with a vital purpose of sharing data stored in the computers with each other. Organizations of different structures sizes and budgets need different types of networks. It can be divided into two categories: 1.1 Peer to Peer network: A peer to peer network has no dedicated servers instead a number of workstations are connected together for the purpose of sharing information or devices. It is designed to satisfy the networking needs of home networks of small companies that do not want to spend a lot of money on a dedicated server. But still want to have the capability to share information or devices like in school, college, cyber café [2] [3]. 1.2 Server based networks: In server based network data files that will be used by all of the users are stored on the one server. This will help by giving you a central point to set up missions on the data files [1]. After compromising one or multiple nodes, an adversary may launch various attacks to disrupt the in- network communication. The attacks are commonly divided into two common problems, which are dropping packets and modifying Packets. Packets should not be filtered out while traveling because they should be used as evidence to infer packet modifiers [4]. So it cannot be used together with existing packet filtering schemes this is a major problem of existing system. To deal with packet droppers and polluters a widely adopted countermeasure is used, which is multipath forwarding in that each packet is forwarded along multiple redundant paths and hence packet dropping in some but not all of these paths can be tolerated. Inherent weakness of network coding is that it is particularly vulnerable to pollution attacks. Malicious nodes can inject corrupted packets into a network, which get combined and forwarded by downstream nodes, thus causing a large number of corrupted packets propagating in the network [2] [6]. 2. PROPOSED SCHEME This module implements the novel HOP_VOTE scheme along with tag based authentication scheme for effective
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 416 pollution attack detection, recovery and blocking. This allows a node to verify if it received packets belong to specific rule criteria, even if the encrypted key is expanding over time. Based on the id and tag creation the data will be routed. The packet filtering mechanism comes under Enhanced Scheme. This combines the basic schemes which are tag verification and a packet filtering mechanism to tolerate, find and eliminate packet polluters over the network. In this scheme the sender attaches a single bit of encrypted key in each packet with is named as HOP_Vote. The authentication key is unique to the packet and cannot be polluted anymore. Pollution attack is reduced [11] [10][9]. • Attacker is identified at once attack is made. • Abnormal packet size is reduced using hopvote scheme. • Prevention over packet content modification and packet dropping attacks. 2.1 Feasibility Study A system is a feasible system only if it is feasible within limited resource and time. In this system each and every process can be feasible for the user and also developer. It proved user friendly input such as device independent inputs and getting proper solution for the problem [8]. 2.2 Technical Feasibility Technical Feasibility is the assessment of the technical view of the system. The system is developed for JAVA environment a platform independent tool is used to develop the system. The development risk concerns the probability, the function of all elements and its performance should be same in all platforms and in the system that is being developed. This system is developed according to the standards and the development software tools are selected to avoid the problems cited above [4] [7].The software used to develop this system is Windows XP, visual studio dot net is done efficiently, and the concept of SQL helps to create the application back end. These components are also helpful in providing interactivity to Java applications. 2.3 Behavioral Feasibility It is common knowledge that computers illustrations have something to do with turnover transfers, retraining and changes in user or developer status. The main emphasis is customer service, personal contacts with customers Feasibility report is directed towards management. It evaluates the impact of the proposed changes on the area in question. The report is a formal document for management use, brief enough and sufficiently non- technical to be understood [6]. 2.4 Economic Feasibility Economic feasibility or cost benefit is an assessment of the economic justification for a computer based system project. Though this system the administrator can use the tool from anywhere within their concern. The system is developed using the existing resources [9] [8]. So the project is economically feasible. This is the most frequently used method for evaluating the effectiveness of a user system. More commonly, known as cost analysis the procedure is to determine the benefits and savings that are expected from a candidate system and compare them with costs. 2.5 Operational Feasibility: Operational Feasibility deals with the study of prospects of the system. These systems operationally eliminate all the tensions of the administrator and helps in effectively tracking the project progress [5]. This kind of automation will surely reduce the time and energy, which previously consumed in manual work. Based on the study, the system proved to be operationally feasible. 3. NETWORK STRUCTURE ANALYSIS Client-server computing or networking is a distributed application architecture that partitions tasks or workloads between service providers (servers) and service requesters, called clients. Often clients and servers operate over a computer network on separate hardware. A server machine is a high performance host that is running one or more server programs which share its resources with clients. A client also shares any of its resources; Clients therefore initiate communication sessions with servers which await (listen to) incoming requests. The parameters to construct a network are, the node name is nothing but the system name, which can be given by the user. The next value is host number which can be getting from our network configuration details. The next one is the IP address of the system. These can be identified by a simple command on DOS environment. The command, net stat helps to get all details about the network configuration. Fig-1: Node Initialization
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 417 3.1 Topology Construction: Here it uses mesh topology because of its unstructured nature. Topology is constructed by getting the names of the nodes and the connections among the nodes as input from the user. While getting each of the nodes, their associated port and IP address is also obtained. For successive nodes, the node to which it should be connected is also accepted from the user. While adding nodes, comparison will be done so that there would be no node duplication. Then we identify the source and the destinations. The node information consists of node names and the weight between them. Fig-2: Topology Construction 3.2 Routing Protocol (OLSR) This module implements the novel OLSR message authentication code. Link-state routing protocols such as Open Shortest Path First (OSPF) and ISI Select a designated router on every link to perform flooding of topology information. In wireless networks, there is different notion of a link, packets can and do go out the same interface; hence, a different approach is needed in order to optimize the flooding process. Using Hello messages the OLSR protocol a teach node discovers 2-hop neighbor information and performs a distribute detection of a set of multipoint relays (MPRs). Nodes select MPRs such that there exists a path to each of its 2-hop neighbors via a node selected as an MPR. 3.3 Message Transmission: In this module we transmit the message from source to destination. Here choose a destination and select a number of intermediate for that destination. Tag creation and path is calculated by TAG_ENCODE_DECODE mechanism. It will take minimum node cost an account to find the path between a source and destination. The HOP_VOTE key is updated in packet frequently. The source obtains the keys from the packet and compares. After receiving a message the destination will send an acknowledgement to the corresponding source. 3.4 Preventing pollution HOP_VOTE scheme is introduced in the network to identify the data attacker nodes. To give data freshness the TAG_ENCODE_DECODE key is verified in the every hop node. Whenever the nodes act as a polluter in the next that node is identified and it is reported to the server node. Fig-3: Transmission without Attack Fig-4: Transmission with Attack 4. SIMULATION RESULTS System implementation is the stage where the theoretical design turned into the working system. The most crucial stage the user confidence the new system will work efficiently and effectively. The performance of reliability of the system was tested and it gained acceptance. The system was implemented successfully. Fig-4: System Architecture Design
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 418 Proper implementation is essential to provide a reliable system to meet organization requirements. During the implementation stage a live demon was undertaken and made in front of end users. Implementation is a stage of where the system design is turned into a working system. This intends for testing the developed program with sample data, Detection and correction of internal error, testing the system to meet the user requirement, Feeding the real time data and retesting. Making necessary changes as described by the user. Fig-5: MARK mechanism Fig-6: Performance Fig-7: Polluter Node 5. CONCLUSION I have proposed a Mark based response solution for pollution attacks in the network. Especially, this approach considered the potential damages of data attacks and countermeasures to overcome the pollution activity. In order to measure the risk of both attacks and data recovery the MARK mechanism is used. This system extended the work of pinpointing the attacker node to the monitor with an attack type. Based on several metrics, this system is investigated the performance and other security approach and the experiment results clearly demonstrated the effectiveness and scalability of this proposed Mark mechanism approach. 6. FUTURE WORK This study presents initial work in detecting misbehaving nodes and other pollution in the wireless networks. This section is described about some further ideas to explore in the future. The next goal is to analyze how the routing extensions perform with flows common to most network applications. The focus would then change from measuring throughput, or dropped packets, to measuring the time to complete a reliable transmission. Security is such an important feature that it could determine the success and wide deployment of wireless networks. A variety of pollution attacks have been identified. Security must be ensured in the entire system including the security primitives, such as key management protocols, since overall security level is determined by the system’s weakest point. ACKNOWLEDGMENTS I take this opportunity to acknowledge with great Pleasure, deep satisfaction and gratitude, the contribution of many individuals in the successful completion of this project. I express my profound sincerity and heartfelt gratefulness to chairman Thiru.V.S.Balsamy, B.Sc.,L.L.B., of V.S.B.College
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 01 | Jan-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET ISO 9001:2008 Certified Journal Page 419 of engineering, Karur, for having given me the opportunity to work and to undertake the project work. I also express my gratitude to all the faculty members of Department for their timely support and encouragement. I thank my beloved parents and friends who have helped me to complete this project successfully. REFERENCES [1] Agrawal.S and Boneh.D (2009), “Homomorphic MACs: MAC-Based Integrity for Network Coding,” Proc. Intel Conf. Applied Cryptography and Network Security. [2] Dong.J, Curtmola.R, and Nita-Rotaru.C (2011), “Practical Defenses against Pollution Attacks in Wireless Network Coding,” ACM Trans.Information and System Security, vol. 14, no. 1, article 7. [3] Gennaro.R, Katz.J, Krawczyk.H, and Rabin.T (2010), “Secure Network Coding over the Integers,” Proc. 13th Intel Conf. Practice and Theory in Public Key Cryptography (PKC ‟10). [4] Ho.T, Medard.M, Koetter.R, Karger.D.R, Effros.M, Shi.J, andLeong.B, (2006) “A Random Linear Network Coding Approach to Multicast,” IEEE Trans. Information Theory, vol. 52, no. 10, pp. 4413-4430. [5] Jaggi.S, Langberg. M,Katti.S,Ho.T, Katabi.D, Medard.M and Effros.M(2009), “Resilient Network Coding in the Presence of Byzantine Adversaries,” IEEE Trans. Information Theory, vol. 54, no. 6, pp. 2596-2603. [6] Jiang.Y, Zhu.H, Shi.M, Shen.X, and Lin.C (2010), “An Efficient Dynamic- Identity Based Signature Scheme for Secure Network Coding,” Computer Networks: The Intel J. Computer and Telecomm. Networking, vol. 54, no. 1, pp. 28-40. [7] Krohn.M, Freedman’s, and Mazieres.D, (2004)“On-the- Fly VerificationofRateless Erasure Codes for Efficient Content Distribution,”Proc. IEEE Symp. Security and Privacy. [8] XiaohuWu, YinlongXu, ChauYeun and Liping Xiang (2014), “A Tag encoding scheme against pollution attack to linear network Coding” networking: transaction on parallel and distributed systems vol 25, no1. [9] Yu.Z, Wei.Y, Ramkumar.B, and Guan.Y (2006), “An Efficient Signature- Based Scheme for Securing Network Coding against Pollution Attacks,”Proc. IEEE INFOCOM. [10] Yun.A, Cheon.J, and Kim.Y (2010), “On Homomorphic Signatures for Network Coding,” IEEE Trans. Computers, vol. 59, no. 9, pp. 1295-1296. [11] Zhang.P, Jiang.Y, Lin.C, Yao.H, Wasef.A, and Shen.X.S (2011), “Padding for Orthogonality: Efficient Subspace Authentication for Network Coding,” Proc. IEEE INFOCOM. WEBSITES: 1. http://www.javatpoint.com 2. http://www.stackoverflow.com 3. http://www.codeproject.com 4. http://www.dzone.com 5. http://www.leetcode.com